Encryption: Everything you want to know about encryption, Types, Info, Sortwares, Importance ..

Encryption…. The most important part of our day-to-day life. In this article I’m going to tell you about encryption, what is it, why it is important, what are the types of encryption and much more. So let’s get started,

What is Encryption?


It define as, The process of converting information or data into a code, especially to prevent unauthorized access by someone.

Means if you want to send some message to someone but its secret and you don’t want to show it to anyone then you can encrypt it and then you can send to another person. And if someone gets that message then that person will unable to read it coz after encrypting it converts in Alpha numeric and some special characters from.

For e.x. I want to send this message to my brother”Hey my bank password is d8f6rbc956f.”  (This is normal form ). And after encrypting it looks like this: “Ln3PyKozc7x]c6vRUeySKZYTSENN9GkuqFYwe64Q4m7eNI]mPnVL9hTT1iL8TTW98)Nf3SY!”  now if someone gets this coded text he will not understand the exact msg which i want to give. Without any proper key.


  • The first thing is it protects your privacy. Only you and the another person (receiver) will know the exact message.It Protects sensitive information. Mostly because of cyber attacks Companies and the Governments are encrypting their sensitive or personal data so other 3rd party won’t get it. until decryption.
  • In mobiles companies like Android and Ios are giving options to Encrypt their phone. And if you didn’t did that please do it. After doing it no one can unlock your phone without proper password or passcode.


  • If you lose your phone then the thief won’t get any data from it. Means all your private photos, conversations, contacts and emails remains safe. The thief won’t able to use untill proper password or he can use after formatting the phone.


There are two main ways:

  • The first kind of encryption, called symmetric cryptography or shared secret encryption, has been used since ancient Egyptian times. This form of encryption uses a secret key, called the shared secret, to scramble the data into unintelligible gibberish. The person on the other end needs the shared secret (key) to unlock the data.
  • Asymmetric Encryption is a form of encryption where keys come in pairs. What one key encrypts, only the other can decrypt.Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it.


  • DES : This is the ‘Data Encryption Standard’. This is a cipher that operates on 64-bit blocks of data, using a 56-bit key. It is a ‘private key’ system.
  • RSA: RSA is a public-key system.HASH : this algorithm is used for computing a condensed representation of a fixed length message or a file or documents. This is sometimes known as a ‘message digest’, or a ‘fingerprint’
  • MD5 : it is a 128 bit message digest function.
  • AES: it known as Advanced Encryption standards. (Which is the most powerful encryption and using widely) using the Rijndeal block chiper.
  • SHA 1: it is another hashing algorithm similar in structure to MD5, but producing a digest of 160 bits (20 bytes).Because of the large digest size, it is less likely that two different messages will have the same SHA-1 message digest. For this reason SHA-1 is recommended in preference to MD5.

 Available Softwares:

  • Bitlocker
  • True crypt
  • pretty Good Privacy
  • Vera Crypt
  • AX Crypt
  • Cipher shed
  • Private DiskSSE (available on playstore).

Final Thoughts:

It’s a great way to protect our privacy. Everyday cyber crimes are increasing and no one would like to share their privacy. In this case we will use this technique and say safe.

Ok guys i hope you understand what is encryption and how important it is to our day-to-day life.  share this article with your family and friends and subscribe our blog via email. Have a nice day..


Leave a Reply

Your email address will not be published. Required fields are marked *