Meet the Guide Editor
Message from the Editor:
Encryption has been around for centuries. Julius Ceasar used it. Queen Elizabeth discovered a plot against her, and the Germans in World War II had the Enigma machine. Now it is used in business to make Internet transactions secure, and to verify a user as being who he says he is.
Editor Article Picks:
Encryption Contributors

Guide to Encryption & Cyphertext

When changing the appearance of text into a scrambled, unreadable format, one uses cryptography. These are ancient schemes that can change letters using keys. Encryption, on the other hand, refers to mathematical algorithmic schemes that change the plain text into an unreadable form. This form is cyphertext. It can provide security and/or privacy. At the receiving end, the encrypted text is decrypted with a "key". This returns it to its original text form. The operation succeeds because the key is the triggering mechanism with the algorithm. Encryption is used by businesses, governments, and private individuals. The Bright Hub guide to encryption will give users information through articles about the science of encryption.



Image: Microsoft


Latest Articles on Encryption
All You Want to Know About Encryption

Encryption is a key process in network security, and very often indispensable when transmitting sensitive data. A good knowledge of encryption practices is part of keeping a home network...

Understanding the Difference between Symmetric and Asymmetric Encryption

Here all you want to know symmetric encryption and asymmetric encryption, the fundamental types of encryption schemes. This article also features stream ciphers, blocks ciphers and...

AES Encryption Explained in a Nutshell

Here’s all you want to know about AES Encryption, the Advanced Encryption Standard which implements symmetric cryptography by means Rijndael algorithm in key lengths of 128, 192...

The Differences between Twofish and Blowfish Encryption in a Nutshell

Here’s all you want to know about Bruce Schneier’s Blowfish encryption as well as all about Twofish, an AES finalist, and successor of Blowfish. Both, Blowfish and Twofish...

Most Popular Articles on Encryption
More About Encryption
Types of Encryption - Conventional Methods

Are you looking for ways to secure your information? Are you concerned about security of your important data? If yes, then you are not the first one! Data tampering is not...

What is Stored Data Encryption?

It's a dangerous world out there for data, and it's only getting more so as the hacking techniques becoming more and more finessed. This article provides an overview to one...