In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
34 KB (3,645 words) - 13:17, 2 July 2025
Symmetric-key algorithm (redirect from Symmetric encryption)
algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical...
15 KB (1,540 words) - 21:14, 19 June 2025
Public-key cryptography (redirect from Asymmetric key encryption algorithm)
Diffie–Hellman key exchange, public-key key encapsulation, and public-key encryption. Public key algorithms are fundamental security primitives in modern cryptosystems...
40 KB (4,551 words) - 02:52, 17 July 2025
Authenticated encryption (AE) is any encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
19 KB (2,087 words) - 17:43, 16 July 2025
Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic...
50 KB (5,679 words) - 09:32, 6 July 2025
as cascade encryption, cascade ciphering, multiple encryption, and superencipherment. Superencryption refers to the outer-level encryption of a multiple...
9 KB (1,144 words) - 03:29, 1 July 2025
End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including...
42 KB (4,094 words) - 10:00, 15 July 2025
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. The resulting...
42 KB (4,692 words) - 23:00, 1 April 2025
Probabilistic encryption is the use of randomness in an encryption algorithm, so that when encrypting the same message several times it will, in general...
4 KB (583 words) - 19:08, 11 February 2025
Dynamic Encryption is a cryptographic principle that enables two parties to change the encryption algorithm for every transaction. The principle of Dynamic...
4 KB (358 words) - 15:20, 10 June 2025
Block cipher mode of operation (redirect from Encryption mode)
itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of bits called a block. A mode...
52 KB (5,828 words) - 02:00, 11 July 2025
Pretty Good Privacy (redirect from Pgp encryption)
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing...
57 KB (6,319 words) - 03:18, 9 July 2025
Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information...
10 KB (1,132 words) - 20:18, 10 July 2025
Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may...
14 KB (1,675 words) - 16:44, 26 June 2025
Common Encryption (abbreviated MPEG-CENC) refers to a set of two MPEG standards governing different container formats: for ISOBMFF, Common encryption in ISO...
2 KB (197 words) - 20:37, 17 October 2021
A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a...
7 KB (897 words) - 16:46, 18 June 2025
Transport Layer Security (redirect from Transport layer encryption)
authenticated encryption ciphers, used mainly for Galois/Counter Mode (GCM) and CCM mode of Advanced Encryption Standard (AES) encryption. TLS Extensions...
178 KB (17,513 words) - 15:28, 16 July 2025
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is...
29 KB (3,198 words) - 00:32, 1 June 2025
BitLocker (redirect from Bitlocker Drive Encryption)
volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for...
37 KB (3,534 words) - 03:51, 24 April 2025
Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents...
30 KB (3,772 words) - 11:25, 5 December 2024
RSA cryptosystem (redirect from RSA encryption)
That system was declassified in 1997. In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret...
60 KB (7,807 words) - 07:54, 19 July 2025
Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes...
17 KB (2,194 words) - 00:15, 20 June 2025
The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of...
60 KB (6,717 words) - 14:31, 5 July 2025
Cryptography prior to the modern age was effectively synonymous with encryption, converting readable information (plaintext) to unintelligible nonsense...
100 KB (11,081 words) - 03:44, 17 July 2025
HTTPS (redirect from HTTPS encryption)
(HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on...
42 KB (4,314 words) - 21:55, 12 July 2025
In cryptography, the ElGamal encryption system is a public-key encryption algorithm based on the Diffie–Hellman key exchange. It was described by Taher...
10 KB (1,467 words) - 01:36, 20 July 2025
In cryptography, format-transforming encryption (FTE) refers to encryption where the format of the input plaintext and output ciphertext are configurable...
2 KB (200 words) - 06:44, 8 August 2023
Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage...
7 KB (609 words) - 17:41, 12 November 2024
Caesar cipher (redirect from Caesar encryption)
Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in...
19 KB (2,076 words) - 00:10, 17 July 2025
Point-to-point encryption (P2PE) is a standard established by the PCI Security Standards Council. Payment solutions that offer similar encryption but do not...
7 KB (1,000 words) - 07:24, 16 July 2025