encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext).
In many contexts, the word encryption also implicit encryption is the process of transforming information
Whereas decryption is the process of changing the encrypted text back into plaintext
how to convert encryption to decryption using VB
A: Symmetric
Symmetric
Conventional encryption ciphers rely on a single key for both encryption and decryption. Modern protocols will use a private key for encryption and a different public key for decryption. These two keys are mathematically related in a fashion that allows them to encrypt/decrypt the same data successfully.
The result of encryption of plaintext is cyphertext. When cyphertext is translated back to plaintext, the process is called decryption.
Encryption and decryption algorithms are called ciphers in cryptography
Decryption is the reversal of encryption, producing plaintext as a function of the cypher and the key.
Using the same (or different) hardware will work with AES as long as the encryption and decryption use the same key. AES relies on the symmetric encryption key which means the same key is used to lock and unlock the data. The hardware that uses it does not matter.
Encryption (decryption).
Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.
"Evaluating cryptography is difficult since without 'breaking' the encryption its hard to say whether one encryption is better or not. Pretty Good Encryption (PGP) is asymmetric, that is the encryption and decryption keys are different which may give it an edge on symmetric encryption."
Twofish, Advanced Encryption Standard, Blowfish, Serpent, CAST 5, RC4, TDES, and IDEA are all examples of symmetric encryption methods. In short, any algorithm that uses the same or similar cryptographic keys for encryption and decryption is a symmetric encryption method. Symmetric encryption methods are also divided into two different categories, stream ciphers and block ciphers. These two encryption methods are much like the difference between an interpreter and a compiler in programming. Stream encrypts individual bytes one at a time, while Block encrypts volumes as a whole.