What is Encryption and Decryption in Cryptography

Encryption of cryptography

In today’s time, Encryption and Decryption have become very popular, while its history is hundreds of years old.

The only difference is that earlier the messages written in the letter were encrypted. Today digital data encryption is done.

Today, its need and technology have evolved greatly, sometimes we do not even know that we are using encryption like iPhone, Pixel phones or other new mobiles now come with Encryption facility.

You can start using the passcode whenever you want. All this was possible due to the best technology. Which runs very smoothly that the user does not know that he is using encryption.

Well, an interesting fact is that the credit of Cryptography in India goes to a Mlecchita vikalp chapter in the 64 arts of Vatsyayana’s Kamasutra.

In which secret writing related to communication is described, this method is about how to communicate secretly between two Lovers.

So now before knowing the cryptography history of Rome and Egypt, also remember your country, which teaches the secret thing to use in secret place !!

Let us now talk about the modern data encryption technique.

The thought of writing this post came to me when I was resetting my WordPress admin password from Phpmyadmin in my Cpanel under an Experiment.

Where my Password was Encrypted in MD5 hash code.

Since Hashcode encryption is not reverse, it is Oneway encryption because it does not have a key share to decrypt.

So you do not get the previous code in the original form, so you have to create a new one.

From there I thought that a post on encryption might be written that my Hindi readers might like.

Friends, encryption technique depends on what type of key is used in it, what is the key length, what is the size of encrypted data blocks.

The higher the key size, the stronger the encryption will be. For example, a 256-bit key size generates stronger codes than a 128-bit key size.

Decoding them back also requires a fast and powerful computing process. By the way, today’s systems also come powerful.

So let’s divide it into different headings and share information on all aspects of Encryption.

What is an Encryption?

Changing the data into such special codes that the unauthorised person cannot access it in its original form is called Encryption.

The ciphertext is commonly used in the process of data encryption. This process is performed by the Data Sender.

That is, it is a process of converting plain text into a scramble (Ciphertext). It uses the special Mathematical Algorithm of computers. Which makes data meaningless and impractical.


Like we sent a message of ‘hello now when we see it after Encryption, it will be something like’ Mtd * &% ‘! Now we cannot do anything about it.

The encryption process uses an encryption keys which is a mathematical computer algorithm.


What is Decryption?

The process of converting encrypted data back to its original form is called Decryption. Which is completed by a Decryption key?

These are performed by the Process Data Receiver. In this, Ciphertext is converted to plain text.

Commonly two types of methods are adopted for the process of encryption. Which are as follows

● Asymmetric Encryption
● Symmetric Encryption

What is Asymmetric Encryption?

Asymmetric encryption is also known as Public-key Encryption. It uses one of the Pair keys. One to encrypt the data while the other key decrypts the data.

A key is called a private key, while a second key is called a public key. The public key is shared. The private key is kept secret.

Encrypted data from the private key can be decrypted from the public key itself.

Asymmetric encryption is the basic technology of SSL technology. Which we use on our blogs and sites.

Read this post to know about it, you will get great information here.

What is Symmetric Encryption?

In Symmetric encryption, Single Key is used for both functions, encrypting, and decrypting data.

The data processing speed of symmetric encryption is Faster and better performance as compared to Asymmetric.

This is the reason that this method is used more in the functions of Payment Applications, heavy data encryption, etc.

Symmetric encryption also has two types which are as follows-

1- Block Algorithms

With the help of the secret key, bits of a specific length of data are saved in the block after encryption and the memory of the system keeps the data until all the blocks are full until all the data is in the system.

2-Stream Algorithms

In this algorithm, data such as flow is also encrypted at the same time. This way the system does not incur additional load.

Examples of Symmetric Encryption algorithm 

1- AES (Advanced Encryption Standard)

There were 2 Cryptographers making it named Jon Daemen and Vincent Rijmen.

2- Twofish

This method was created by Counterpane Labs and it was never patented, it is open-source technology.

3- DES (Data Encryption Standard)

DES was removed in 2000 with the arrival of the AES algorithm.
DES algorithm used to encrypt the PIN numbers of ATM machines in the US.
DES also launched more Secure versions called 3DES.

Modern Cryptography

In 1970 IBM formed the Crypto group which was Block Cipher technology. It used to encrypt the data of the company’s customers.

It was later taken over by the US government and used for encryption of government data.

In 1997, this technology was successfully cracked by hackers after which it was removed and as you read above it was replaced by AES technology.

Well, today RSA (Rivest-Shamir-Adleman) is one of the strongest encryption technology. It is not the name of anyone but the joint name of three people.

Since it is a very strong encryption technology and is an asymmetric algorithm, so is Slow.

At the same time, the most common encryption technique is AES which is most commonly used and it is also fast due to being a Symmetric algorithm.

Network Encryption

Network encryption is implemented by Internet Protocol Security (IPSec).

It is a standard made by the Internet Engineering Task Force (IETF). This creates a framework for private communication and operation over IP (Internet protocol).

Network encryption is a bit complex, compared to data encryption.

Pro and Cons of Data Encryption

Pro- Encryption keeps our data encrypted. Cons- but data cannot be protected from cyberattacks without encryption. After Pro- Encryption, it helps to transfer data securely.

If the Decryption key is not shared at the time of cons- transfer, the data cannot be converted to Plaintext.

You can start it easily by just setting a passcode for Pro-Encryption.

In Cons- Encryption there is an extra load on the computer’s Processor.

To Encrypt the data of Android Phones, go to Setting and open the Security tab, select Encrypt, and set your PIN.

Please read the notification carefully.
Use your PIN whenever you want to decrypt the data.

Remember that data cannot be decrypted if you forget the PIN for encrypted data. To completely delete the data, Restore factory settings have to be processed.

The encryption option varies according to the mobile interface of each company but within the Security tab.

Friends! Hopefully, you must have liked this post on Encryption.

If there is any question or suggestion, please mention it in the Comment box. Thank you.


Roshan Mehta

Get the latest technology news and updates across the world on captaintechno. Our Blog will provide you all the latest technology-related updates from all over the world.

Leave a Comment