Encryption
Definition
The process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and key, protecting it from unauthorized access.
Encryption transforms readable data into an unreadable format that can only be decrypted by someone with the correct key. It is the cornerstone of digital security, protecting everything from online banking transactions to private messages and stored passwords.
There are two main types: symmetric encryption (same key for encryption and decryption, faster, used for data at rest) and asymmetric encryption (different public and private keys, more secure for key exchange, used in SSL/TLS). Common algorithms include AES (symmetric), RSA (asymmetric), and ChaCha20 (stream cipher).
End-to-end encryption means data is encrypted on the sender's device and can only be decrypted on the recipient's device, with no intermediary (including the service provider) able to read the data. This is used by messaging apps, email services, and cloud storage providers to protect user privacy.
Related Calculators
Related Terms
Hash
techA fixed-length string of characters generated from input data by a hash function, used for data integrity verification, password storage, and digital signatures.
SSL/TLS (Secure Sockets Layer / Transport Layer Security)
techCryptographic protocols that provide secure communication over computer networks, encrypting data between a web server and browser.
JWT (JSON Web Token)
techA compact, URL-safe token format used for securely transmitting information between parties as a JSON object, commonly used for authentication.
Base64
techA binary-to-text encoding scheme that converts binary data into a string of ASCII characters, commonly used for embedding data in web pages and emails.
Related Articles
JSON Formatting Best Practices: Write Clean, Valid JSON
Master JSON formatting with best practices for syntax, nesting, and validation. Learn common errors, debugging tips, and how to write clean JSON data.
Regex Cheat Sheet: Essential Patterns Every Developer Needs
A practical regex reference guide with common patterns for emails, URLs, phone numbers, and more. Includes syntax explanations and real-world examples.
How to Generate Secure Passwords: Best Practices for 2026
Learn how to create strong, secure passwords that protect your accounts. Covers password length, complexity, managers, and multi-factor authentication.
Guide to QR Codes: How They Work, Types & Best Uses
Learn how QR codes work, the different types available, and best practices for creating and using them in marketing, payments, and information sharing.