Reply To: OCU C)OST C Discussion Lesson 05
So there are several types of encryption used to protect data, each suited to different scenarios. One is Advanced Encryption Standard (AES) which is a symmetric encryption method meaning the same key is used to both encrypt and decrypt data. It’s ideal for securing data to rest, such as files stored on a hard drive or customer information in a database. Next is Rivest Shamir-Adleman (RSA) which is a asymmetric encryption method that uses a public key for encryption and a private key for decryption. This makes it well suited to securely transmitting data over the internet, like encrypting emails or setting up secure website connections through HTTPS. Last is Elliptic Curve Cryptography. It is another asymmetric encryption technique that provides strong security with smaller key sizes, making it highly efficient. ECC is especially appropriate for use in mobile devices, IoT systems, and cryptocurrency applications where computing power and battery life are limited. Each encryption method has it’s strength and is chosen based on specific needs of the situation.