answersLogoWhite

0

Encryption is a way of making data unreadable to someone who is not supposed to be seeing that data. For example, if I wanted to send you the data "ABC", but I didn't want anyone who intercepts that data to be able to read it, then I would tell you beforehand that I am going to increase each letter one place in the alphabet. So I would send you "BCD" and you would un-encrypt my information back to "ABC". This is, of course, a very simple example, but at its core, that is what encryption is.

User Avatar

Wiki User

15y ago

What else can I help you with?

Continue Learning about Computer Science
Related Questions

Where encryption done?

If we want to transmit the most secret data, we can use encryption process and transmit the data to the receiver. this process is called as encryption. regds nataraj


Which type of encryption process uses the same key for encryption and decryption?

A: Symmetric


What is conclusion of encryption?

The result of encryption of plaintext is cyphertext. When cyphertext is translated back to plaintext, the process is called decryption.


What is the process that makes data unreadable unless or until it is decrypted?

the encryption process


What is the difference between decryption and encryption?

encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext).In many contexts, the word encryption also implicit encryption is the process of transforming informationWhereas decryption is the process of changing the encrypted text back into plaintext


What is a secure process for keeping confidential information private?

Encryption.


Is a secure process for keeping confidential information private?

Encryption.


What is an accurate description of an asymmetric encryption technology?

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.


What is the process of encoding information in a way so that only someone with a key can encode it?

Encryption is the answer


What is the significance of the keyword "ccp 673" in the context of data encryption algorithms?

In the context of data encryption algorithms, the keyword "ccp 673" signifies a specific parameter or value used in the encryption process. This keyword may refer to a key length, algorithm variant, or other important aspect of the encryption method being used. Understanding and properly implementing this keyword is crucial for ensuring the security and effectiveness of the encryption process.


The process of encoding data and information into an unreadable form?

encryption


What is the process of converting readable data into unreadable characters to prevent unauthorized access?

You would either encrypt the data, or and, encrypt the folder or hard drive, flash drive, etc.

Trending Questions
Write a pascal program that compute an area of a triangle? What are the Conclusion of five generations of computers? A component or device on a system board that can be replaced without sending it back to the manufacturer is called? Block diagram of analog computer define each block plz answer this question as soon as possible .i have to make an assignment on this topic i will appriciate if pictures added plz reply my question.pl? Why is UDP considered unreliable? Is there a website that is unblocked at school that you can play battle gear? Learning the Linsky Wireless Router Setup? Why is it important that teachers are competent users of computers? What is the nearest recycling center to crystal palace where bigger items such as old computers can be recycled? Can another account access Firefox without the download? What is a common implementation for the IPSec protocol? The device that reconciles the difference between computers and phones is the? Does Vodafone have CDMA or GSM facility? What are good names for upcycling projects? Show you a model for ieee format for paper presentation for engineering presentation? How many songs can you store on a 4gb flash drive? Does the country Philippines have a supercomputer? What is the difference between semi block and blocked letter? What protocol is associated with satellites functional networks? Annabelle uses a computer to run her graphic design business. She uses a number of different software programs everyday. She depends on her computer to be reliable and support her livelihood. How ofte?