About This Chapter
Encryption Basics: Chapter Summary
Increase your knowledge of computer and information security with these lessons on basic encryption methods. You'll learn how to encrypt and safeguard files as well as see the tools and algorithms used to do so. This chapter also helps you learn about the difference between hashing and encryption and provides an overview of encryption standards and the history of encryption.
Our lessons are taught by professional and experienced instructors, so you know you are getting a thorough and good quality learning experience. Before you move on to other lessons or chapters, test your encryption knowledge by taking the interactive, multiple-choice quizzes that follow every lesson. There is even a comprehensive exam at the end of the chapter to test you on everything you learned.
Use these lessons to boost your understanding of the following topics:
- Methods of basic encryption
- Encryption history
- Software and tools used for file encryption
- Advanced encryption standard (AES) and data encryption standard (DES)
- Full disk encryption
- The tiny encryption algorithm
- Differences between hashing, tokenization and encryption
1. Basic Encryption Methods
Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.
2. The History of Encryption
Did you know that modern data encryption has roots that can be traced back almost 4,000 years? Encryption works equally well for military secrets and trade secrets as it does for love notes.
3. File Encryption: Software & Tools
It is important that we protect ourselves. Not just our bodies, but the personal information we freely place on the Internet, and information we store locally. That is the focus of this lesson, and file encryption is one way we can do that.
4. What is Advanced Encryption Standard (AES)? - Definition & Overview
In this lesson, we'll take a look at the Advanced Encryption Standard (AES), its purpose, its basic characteristics, and its strength. At the end of this lesson, you should have a good understanding of the fundamentals of this technology.
5. What is The Data Encryption Standard (DES)?
The Data Encryption Standard (DES) is a pioneering encryption algorithm that helped revolutionize encryption. In this lesson, we'll come to understand the current and historic significance of the Data Encryption Standard, and look at two basic encryption methods.
6. What is Full Disk Encryption?
Full disk encryption (FDE) is a security mechanism used to protect data at rest on storage devices and provides a level of protection against loss of data if the device itself is lost or stolen.
7. Tiny Encryption Algorithm (TEA)
The Tiny Encryption Algorithm (TEA) is a significant departure from more traditional encryption methods that you might know. Easy to use and with wide applications, it is a widely used encryption technique. In this lesson, we'll learn what exactly it is and some of its uses.
8. Hashing vs. Encryption
Hashing and encryption are two processes that are similar and often go together. However, they differ greatly in what they actually do. In this lesson, we'll take a look at hashing and encryption, their similarities, and their differences.
9. Tokenization vs. Encryption
Tokenization and encryption are two vastly different security measures that both offer solid security. We'll look at the characteristics and differences of each in this lesson.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Information & Computer Security Training course