Ch 5: Encryption Basics

About This Chapter

This chapter can help you learn more about encryption basics. By reviewing these engaging lessons, you can upgrade your computer skills as you learn about file encryption tools and full disk encryption.

Encryption Basics: Chapter Summary

Increase your knowledge of computer and information security with these lessons on basic encryption methods. You'll learn how to encrypt and safeguard files as well as see the tools and algorithms used to do so. This chapter also helps you learn about the difference between hashing and encryption and provides an overview of encryption standards and the history of encryption.

Our lessons are taught by professional and experienced instructors, so you know you are getting a thorough and good quality learning experience. Before you move on to other lessons or chapters, test your encryption knowledge by taking the interactive, multiple-choice quizzes that follow every lesson. There is even a comprehensive exam at the end of the chapter to test you on everything you learned.

Use these lessons to boost your understanding of the following topics:

  •  Methods of basic encryption
  • Encryption history
  • Software and tools used for file encryption
  • Advanced encryption standard (AES) and data encryption standard (DES)
  • Full disk encryption
  • The tiny encryption algorithm
  • Differences between hashing, tokenization and encryption

9 Lessons in Chapter 5: Encryption Basics
Test your knowledge with a 30-question chapter practice test
Basic Encryption Methods

1. Basic Encryption Methods

Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.

The History of Encryption

2. The History of Encryption

Did you know that modern data encryption has roots that can be traced back almost 4,000 years? Encryption works equally well for military secrets and trade secrets as it does for love notes.

File Encryption: Software & Tools

3. File Encryption: Software & Tools

It is important that we protect ourselves. Not just our bodies, but the personal information we freely place on the Internet, and information we store locally. That is the focus of this lesson, and file encryption is one way we can do that.

What is Advanced Encryption Standard (AES)? - Definition & Overview

4. What is Advanced Encryption Standard (AES)? - Definition & Overview

In this lesson, we'll take a look at the Advanced Encryption Standard (AES), its purpose, its basic characteristics, and its strength. At the end of this lesson, you should have a good understanding of the fundamentals of this technology.

What is The Data Encryption Standard (DES)?

5. What is The Data Encryption Standard (DES)?

The Data Encryption Standard (DES) is a pioneering encryption algorithm that helped revolutionize encryption. In this lesson, we'll come to understand the current and historic significance of the Data Encryption Standard, and look at two basic encryption methods.

What is Full Disk Encryption?

6. What is Full Disk Encryption?

Full disk encryption (FDE) is a security mechanism used to protect data at rest on storage devices and provides a level of protection against loss of data if the device itself is lost or stolen.

Tiny Encryption Algorithm (TEA)

7. Tiny Encryption Algorithm (TEA)

The Tiny Encryption Algorithm (TEA) is a significant departure from more traditional encryption methods that you might know. Easy to use and with wide applications, it is a widely used encryption technique. In this lesson, we'll learn what exactly it is and some of its uses.

Hashing vs. Encryption

8. Hashing vs. Encryption

Hashing and encryption are two processes that are similar and often go together. However, they differ greatly in what they actually do. In this lesson, we'll take a look at hashing and encryption, their similarities, and their differences.

Tokenization vs. Encryption

9. Tokenization vs. Encryption

Tokenization and encryption are two vastly different security measures that both offer solid security. We'll look at the characteristics and differences of each in this lesson.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support