Reply To: OCU C)OST A Discussion Lesson 05
A technique for protecting data is encryption, which transforms data into a format that is unintelligible without the right decryption key. It is frequently used to safeguard private information in systems for authentication, storage, and communication (Kaushik et al., 2023). The three main forms of encryption are shown here, along with the circumstances in which each is most suitable..
1. Symmetric Encryption (e.g., AES)
Symmetric encryption encrypts and decrypt data using a single common key. Sarkar et al., (2024) says because of its speed and robust security, AES (Advanced Encryption Standard) is the most widely used symmetric algorithm.
Useful Applications: AES can be used to encrypt big files, safeguard hard drives, preserve database data, and secure wireless networks. It works best in settings where the same secret key may be safely shared by both parties.
2. Asymmetric Encryption (e.g., RSA)
Two keys are used in asymmetric encryption: a private key for decryption and a public key for encryption. One of the most popular algorithms in this area is RSA .
Use: Digital signatures, encrypted communications, secure key exchange, and creating secure web connections like HTTPS are all suitable applications for RSA (Banoth & Regar, 2023). It works well in circumstances where parties who have never met before need to communicate securely.
3. Hashing (e.g., SHA-256)
Data is transformed into an irreversible, fixed-length code using hashing. Abdullahi et al., (2023) suggests that instead of concealing information, it is utilized to confirm it.SHA-256 is used appropriately for storing passwords, verifying file integrity, confirming block-chain transactions, and making sure that data hasn’t been tampered with.