About This Chapter
Comparing Encryption Types: Chapter Summary
With so many different types of encryption available for information and computer security, it is important to know which types are needed for which functions. This chapter gives you a thorough overview of the different types of encryption currently used in the information security field. In addition, each lesson offers further details about these encryption types, as well as several side-by-side comparisons.
With a mobile-friendly platform, you can use practically any Internet-ready device to quickly access this information everywhere you go. Furthermore, if you have any questions about the uses of a particular encryption type, you can send your questions directly to our experts, and they will get back to you as soon as possible.
By going through this chapter, you should learn about the following topics:
- Asymmetric vs. symmetric encryption
- SSL encryption strength comparisons
- Benefits of IPsec over SSL
- Properties of AES and DES encryption
- Differences among WPA, WPA2, and WEP encryption
- Choosing between SHA1 and SHA2 encryption
- Distinguishing features of DES and Triple DES
- Probabilistic vs. deterministic encryption
1. Symmetric vs. Asymmetric Encryption
Encryption, as you know, protects data. Almost every form of encryption can be described as either symmetric or asymmetric. In this lesson, we look at typical uses for each as well as an easy to remember way to tell the difference.
2. SSL Encryption Strength: 128-Bit vs. 256-Bit
In this lesson, we will look at the differences between 128-bit and 256-bit encryption for Secure Socket Layer Certificates and discuss the issues involved in using encryption strength as a selection criteria.
3. IPsec vs. SSL
This lesson will cover two encryption methods used to secure data: IPSec and SSL. These methods are mainly used to allow connections to secure networks from otherwise insecure sources.
4. AES vs. DES Encryption
With the explosion of commerce on the Internet, it makes sense that various methods would be devised to secure the information involved. In this lesson, we'll take a look at two important technologies, DES, and its younger sibling, AES.
5. WPA vs. WPA2 Encryption
Explore how your router is protected from prying eyes and the hands of hackers. WPA and WPA2 are both methods to implement to block unsanctioned visitors from accessing your computer. Let's investigate their differences.
6. WPA vs. WEP Encryption
Explore how to protect your router and keep unauthorized attackers from gaining access to your internet and Wi-Fi with encryption methods WEP and WPA.
7. SHA1 vs. SHA2 Encryption
Encryption is a big part of information processing these days, and with it, the need to confirm encrypted results. In this lesson, we'll take a look at SHA1, SHA2, and their relationship to encryption.
8. DES vs. Triple DES Encryption
This lesson will compare two encryption methods: DES (Data Encryption Standard) and Triple DES (or 3DES). 3DES is an improvement over DES, but each has their benefits and opportunities for improvement.
9. Deterministic vs. Probabilistic Encryption
Privacy is important. We each have many things we wish to keep to ourselves. In this lesson, we'll look at a couple of methods, deterministic and probabilistic encryption, and why we would use one of the other.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.