Copyright

Ch 6: Types of Encryption

About This Chapter

Use this set of computer security lessons to discover all there is to know about the different types of encryption. This chapter explains the definition of several types of encryptions, procedural information, protocols, industry standards, and more.

Types of Encryption: Chapter Summary

Before you can master computer security, you'll need to know more than just the basics of the encryption process, such as technical information related to the types of encryption currently available. This chapter addresses each encryption type individually and includes extensive definitions, real-world examples, and explanations about their typical uses. These lessons give you a list of the most well-used encryption programs today, which can improve your skills and expand your knowledge base significantly.

The instructors who design our lessons are experts in the field of computer technology and security. They make sure to keep themselves up-to-date about the latest concerns in information security, breakthroughs in technology, and other key industry trends. You can rest easy knowing that our instructors include the most accurate and relevant information available, which you can immediately apply at your current place of employment.

Topics discussed in this chapter include:

  • Definitions and examples of TLS and SSL encryption
  • Advantages and types of symmetric encryption
  • Description of email and end-to-end encryptions
  • Examples of Blowfish, Public Key, and BitLocker Drive encryption
  • Uses for the RSA and RC4 encryption algorithms
  • Types and functions of encryption keys
  • Various types of WEP, Wi-Fi, and HTTPS encryption
  • Purpose of transparent data encryption (TDE)
  • Homomorphic encryption and elliptic curve cryptography (ECC)
  • Software necessary for data at rest encryption
  • Overview of 2048-Bit, Link, IPsec, On-the-Fly, and Polymorphic
  • Protocols for VPN encryption and off-the-record (OTR) messaging
  • One-time pad encryption and types of Kerberos encryption

29 Lessons in Chapter 6: Types of Encryption
Test your knowledge with a 30-question chapter practice test
What is TLS Encryption?

1. What is TLS Encryption?

In this lesson, we will provide a basic understanding of TLS (Transport Layer Security) Encryption and how to avoid ongoing challenges to TLS standards.

What is SSL Encryption? - Definition & Explanation

2. What is SSL Encryption? - Definition & Explanation

In this lesson, we will briefly define SSL encryption and explain how it is used to create a secure connection for the purpose of protecting sensitive personal or financial information between a web server and a user.

Symmetric Encryption: Definition & Example

3. Symmetric Encryption: Definition & Example

This lesson will cover symmetric encryption, a well-known standard for data encryption. It is a shared-key methodology, meaning the key used to encrypt the data is the same key used to decrypt it. Data Encryption Standard (DES) is also explained.

Symmetric Encryption: Types & Advantages

4. Symmetric Encryption: Types & Advantages

In today's world, where many aspects of our lives are public, encryption is behind the scenes protecting us. In this lesson, we'll take a look at a specific method, symmetric encryption. At the end of the lesson, you should have a good understanding of this useful technology.

Blowfish Encryption: Strength & Example

5. Blowfish Encryption: Strength & Example

This lesson will cover the Blowfish encryption method, which is a license-free method available for all types of users and uses. We'll discuss the benefits of Blowfish, as well as some examples of real-world applications.

End-to-End Encryption: Email & Android

6. End-to-End Encryption: Email & Android

Email and cell phones make up a big part of most people's lives, and as such require security. In this lesson, we'll take a look at end-to-end encryption, and how it applies to email and Android devices.

End-to-End Encryption Software

7. End-to-End Encryption Software

Information needs to be protected for various reasons these days. In this lesson, we'll take a look at one of the methods we can use, encryption, and a specific variant, end-to-end.

What is Email Encryption? - Definition & Methods

8. What is Email Encryption? - Definition & Methods

In this lesson, we will define email encryption, and we will also look at examples of current encryption methods. Even though there are robust tools for securing email, it is an ever-evolving science.

What is BitLocker Drive Encryption?

9. What is BitLocker Drive Encryption?

In this lesson, we will cover BitLocker drive encryption, a feature in Windows products that encrypts drives and protects the machine from unauthorized modifications to startup and system files.

Public Key Encryption: Definition & Example

10. Public Key Encryption: Definition & Example

Protecting information transfers and e-commerce transactions is of vital importance these days. And with the ever-increasing number, that is sure to continue. In this lesson, we'll take a look at commonly use method, public key encryption, and how it works.

RSA Algorithm: Encryption & Example

11. RSA Algorithm: Encryption & Example

With the ever increasing instances of Internet-based commerce, it makes sense that protecting those transactions will become more and more important. In this lesson, we'll take a look at a commonly used algorithm, RSA, how it works, and where it is used.

What is WEP Encryption? - Process & Types

12. What is WEP Encryption? - Process & Types

In this lesson, we'll explore the history of encryption using WEP and discuss how your Internet access is influenced by what standard of encryption your router uses to access the Internet.

Types of Encryption Keys

13. Types of Encryption Keys

Ecommerce is a major component of business today, and with that comes the need for protection. In this lesson, we'll look at the protection used in ecommerce, encryption keys - what they are, the different types, and examples of when they are used.

RC4 Encryption Algorithm

14. RC4 Encryption Algorithm

Encryption plays a major role in many things these days. In this lesson, we'll take a look at one of the basic algorithms, RC4. At the end of this lesson, you should have a good understanding of how it works, and when it might be used.

Wi-Fi Encryption: Types, Security & Standards

15. Wi-Fi Encryption: Types, Security & Standards

In this lesson you'll learn about the different types of Wi-Fi encryption standards and which one works best when trying to secure your home or office Wi-Fi network.

HTTPS Encryption

16. HTTPS Encryption

With the rise of the Internet, it makes sense that there would be those out there that want to take advantage. Some at the expense of others. In this lesson, we'll take a look at a technology that is helping to keep us safe - HTTPS.

What is Transparent Data Encryption (TDE)?

17. What is Transparent Data Encryption (TDE)?

This lesson will define Transparent Data Encryption (TDE) and how it works within database administration systems. TDE protects data at the file level, making it transparent to the end user.

Homomorphic Encryption: Example & Definition

18. Homomorphic Encryption: Example & Definition

We hear news about information leaks and compromises constantly. In this lesson, we'll take a look at an important method used to combat this, homomorphic encryption. We'll also look at what it is and how it works.

Elliptic Curve Cryptography (ECC): Encryption & Example

19. Elliptic Curve Cryptography (ECC): Encryption & Example

Security methods and strength are increasing at a rate that matches the processing power and capabilities computers can bring to bear. In this lesson, we'll look at one such method, public key encryption, and an improvement, elliptic curve cryptography.

Data at Rest Encryption: Software & Requirements

20. Data at Rest Encryption: Software & Requirements

Information moves during the course of a day. This is a fact. But at times, it simply sits. In this lesson, we'll take a look at a stationary protection mechanism, Data at Rest Encryption, plus some software and requirements used by this important area.

VPN Encryption: Types & Protocols

21. VPN Encryption: Types & Protocols

VPN (Virtual Private Network) encryption is used to ensure secure communications over data networks. In this lesson, we'll look at some of the different protocols that make up a VPN and the types of encryption that are used within a VPN.

What is 2048-Bit Encryption?

22. What is 2048-Bit Encryption?

The number of online transactions increase yearly, and in conjunction, the need for security. In this lesson, we'll take a look at 2048-bit encryption, what it is, and the advantage/disadvantage of using it. At the end, you should have a good understanding of this important technology.

One-Time Pad Encryption: Example & Definition

23. One-Time Pad Encryption: Example & Definition

With the increased use of the Internet, there is a corresponding need for security. In this lesson, we'll take a look at one type of security measure, one-time pad encryption, and how it works.

Off-the-Record Messaging (OTR) & Encryption

24. Off-the-Record Messaging (OTR) & Encryption

Everyone seems to use instant messaging these days. In this lesson, we'll take a look at off-the-record messaging, encryption, and how these technologies are related.

What is Link Encryption?

25. What is Link Encryption?

Information security is only getting tougher to manage, as the need for security increases as our use of the Internet increases. In this lesson, we'll take a look at one form of security measure, link encryption, and see how it works.

What is IPsec Encryption?

26. What is IPsec Encryption?

IPsec encryption is a fundamental part of network communication. In this lesson, we'll see how it works. We will also discuss how networks function to illustrate how IPsec Encryption fits into the scheme of things.

Kerberos Encryption Types

27. Kerberos Encryption Types

Security is important in today's world. Events such as the Olympics bring it front and center. In this lesson, we'll take a look at Kerberos Encryption and the encryption types associated with it.

What is On-the-Fly Encryption?

28. What is On-the-Fly Encryption?

Security and protection are becoming an ever-increasing part of our technology-based lives. In this lesson, we'll take a look at encryption, what it is, and what on-the-fly means with respect to it.

What is Polymorphic Encryption?

29. What is Polymorphic Encryption?

Encryption is an important topic these days, with the exploding use of the Internet. In this lesson, we'll take a look at a specific type, polymorphic, what it is, some of its advantages, and disadvantages.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support