## Working of Encryption

The symmetric key is also known as ‘secret key.’ In symmetric vital ciphers, a single key is used, that could be shared with another entity or person that can also decrypt the data. The widely used symmetric cipher is AES(Advanced Encryption Standard), that is mostly used to secure government classified information and data.

Asymmetric encryption is slower than symmetric encryption as symmetric is faster but the sender must exchange the key that was used to encrypt data with the receiver before he can perform decryption. Most of the cryptographic processes are encrypted using a symmetric algorithm to distribute and manage a large number of keys securely, but keys are exchanged using an asymmetric algorithm.

Asymmetric encryption also referred to as public key cryptography, uses two keys, one is public, and the other is private. Encrypter can share the public key with anyone, while the private key is kept secret. The most widely used public key algorithm is RSA, public and private keys, both could be used to encrypt a message. The opposite form of key is used to decrypt the message that was used to code it. This property gives a technique for guaranteeing privacy, as well as the uprightness, credibility, and nonreputability of electronic interchanges and information very still using computerized marks.

### Encryption Types

#### Triple DES

#### RSA

RSA uses a public encryption key algorithm and also used as a standard for sending encrypted data over the internet. RSA is an asymmetric algorithm because of its use of a pair of keys. A public key is used to encrypt the message, and a private key is used to decrypt the message. RSA encryption results in a large batch that is difficult for an attacker to break it.

#### Blowfish

#### Twofish

#### AES(Advanced Encryption Standard)

AES also uses 192 and 256 bits for heavy encryption, but it’s most efficient in 128-bit form. AES is considered to be the invulnerable algorithm to all types of attacks instead of brute force because it tries to decrypt the message by using all possible combinations in 128,192 and 256-bit cipher.

### History Of Encryption

In 700 B.C., the Spartans wrote psychic messages on a letter strip wrapped around some sticks. When the tape is removed, the characters become meaningless, but if you have the strip of the same diameter, you can again get the real message. After this Romans used the Caesar Shift Cipher, a monoalphabetic cipher in which an agreed number shifts each letter. For example, if the accepted figure is 3, then the text ‘Hello World’ would become ‘Khoor Zruog.’ In the middle age, people saw the emergence of polyalphabetic substitutions, which uses multiple substitutions alphabetic to limit the use of frequency analysis to crack a cipher. In the 1970s encryption took a major step to conceal the information. Before this, all encryption schemes used the same secret for encrypting and decrypting messages that is a symmetric key. In 1976, Whitfield Diffie and Martin Hellman’s paper “New Directions in Cryptography’ solved one of the real problems of cryptography, that was how to distribute the encryption key to those who need it securely. RSA explained this breakthrough, that was an implementation of public key cryptography using asymmetric algorithms.