O'Reilly logo

CISSP in 21 Days by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of encryption

As cryptography is based on algorithms and the keys that operate on them, types of encryption or decryption are based on these two factors (algorithms and keys). There are three types of encryption that are predominantly used in government as well as business.

Symmetric key encryption

In this type, only one key is used. The name "symmetric" implies that the key used for encryption as well as for decryption, is the same. This type of encryption is also known as Secret Key Cryptography (SKC).

Symmetric key encryption is categorized into two types based on the algorithm used.

If the algorithm that is used operates on a single bit or byte, or computer word such that the key is changed constantly, it is called stream cipher. For ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required