Movatterモバイル変換


[0]ホーム

URL:


Encyclopedia Britannica
Encyclopedia Britannica
SUBSCRIBE
SUBSCRIBE
SUBSCRIBE
History & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & Culture
Ask the Chatbot Games & Quizzes History & Society Science & Tech Biographies Animals & Nature Geography & Travel Arts & Culture ProCon Money Videos
Britannica AI Icon
verifiedCite
While every effort has been made to follow citation style rules, there may be some discrepancies.Please refer to the appropriate style manual or other sources if you have any questions.
Select Citation Style
Feedback
Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).
Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

data encryption

cryptology
Also known as:encipherment, encryption

data encryption, the process of disguising information as “ciphertext,” ordata unintelligible to an unauthorized person. Conversely,decryption, or decipherment, is the process of converting ciphertext back into its original format. Manual encryption has been used since Roman times, but the term has become associated with the disguising of information via electronic computers. Encryption is a process basic tocryptology.

Computers encrypt data by applying analgorithm—i.e., a set of procedures or instructions for performing a specified task—to a block of data. A personal encryptionkey, or name, known only to the transmitter of the message and its intended receiver, is used to control the algorithm’s encryption of the data, thus yielding unique ciphertext that can be decrypted only by using the key.

Since the late 1970s, two types of encryption have emerged. Conventionalsymmetric encryption requires the same key for both encryption and decryption. A common symmetric encryption system is theAdvanced Encryption Standard (AES), an extremely complexalgorithm approved as a standard by theU.S. National Institute of Standards and Technology.Asymmetric encryption, or public-key cryptography, requires a pair of keys; one for encryption and one for decryption. It allows disguised data to be transferred between allied parties at different locations without also having to transfer the (not encrypted) key. A common asymmetric encryption standard is theRSA (Rivest-Shamir-Adleman) algorithm.

Also called:
encryption or encipherment
A botanical illustration from the Voynich manuscript, a codex, scientific or magical text in an unidentified language, in cipher; end of the 15th or during the 16th century (?).
Britannica Quiz
Codes, Secrets, and Ciphers Quiz

Encryption keys selected at random and of sufficient length are considered almost impregnable. A key 10 characters long selected from the 256 availableASCII characters could take roughly 40 billion centuries to decode, assuming that the perpetrator was attempting 10,000 different keys per second.

This article was most recently revised and updated byErik Gregersen.

[8]ページ先頭

©2009-2026 Movatter.jp