Encryption
EncryptionEncryptionEncryption: Purpose:** Protects data confidentiality by converting information into an unreadable format that can only be decrypted with the correct key. Techniques:** * *Symmetric Encryption*: Uses the same key for both encryption and decryption (e.g., AES). * *Asymmetric Encryption*: Uses a pair of keys, one for encryption (public key) and one for decryption (private key) (e.g., RSA). * *End-to-End Encryption*: Ensures data is encrypted from the sender to the receiver, preventing interm:
- Purpose: Protects data confidentiality by converting information into an unreadable format that can only be decrypted with the correct key.
- Techniques:
- Symmetric Encryption: Uses the same key for both encryption and decryption (e.g., AES).
- Asymmetric Encryption: Uses a pair of keys, one for encryption (public key) and one for decryption (private key) (e.g., RSA).
- End-to-End Encryption: Ensures data is encrypted from the sender to the receiver, preventing intermediaries from accessing it.