What is encryption?

  • (noun): The activity of converting from plain text into code.
    Synonyms: encoding

Encryption

In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext, should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm, to randomly produce keys.

Read more about Encryption.

Some articles on encryption:

Transparent Data Encryption
... Transparent Data Encryption (often abbreviated to TDE) is a technology employed by both Microsoft and Oracle to encrypt database content ... TDE offers encryption at a column, table, and tablespace level ... Oracle TDE addresses encryption requirements associated with public and private privacy and security mandates such as PCI and California SB 1386 ...
Encryption
... In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized ... In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext ... This is usually done with the use of an encryption key, which specifies how the message is to be encoded ...
Cold Boot Attack - Mitigations - Power Management
... Shutting down a computer causes a number of well-known encryption software packages to dismount encrypted data and delete the encryption keys from memory ... When a machine is shut down or loses power and encryption has not been terminated (such as in the event of sudden loss of power) data may remain readable from tens of ... For systems using the hibernation feature (ACPI state S4), the encryption system must either dismount all encrypted disks when entering hibernation, or the hibernation file or partition would need to ...
List Of Software Bugs - Encryption
... it, threatening many applications that rely on encryption such as S/MIME, Tor, SSL or TLS protected connections and SSH ...