Using encryption, you can encode a simple and understandable message (for example, “Anwork is cool!”) In an encrypted message that will be incomprehensible to those who see it in an encoded form. The encrypted message is transmitted via the Internet, and after its delivery, the recipient using the encryption key converts an encrypted message to the source format (“Anwork is cool!”).
There are two data encryption systems:
- Algorithms with a symmetrical key. In systems with a symmetrical key for encryption and decryption, close or identical encryption keys are used.
- Algorithms with an asymmetric key. In systems with an asymmetric key, which are also called open key encryption systems, different keys are used for encryption and decryption. One key is publicly available and can be used by anyone (hence the name “Crystation with an open key”), and the other is kept secret. Due to that, the system with an asymmetric key is safer than with symmetrical, since hackers or cybercriminals cannot copy the key during its transmission.