Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext.
To encrypt more than a small amount of data, symmetric encryption is used. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of ciphertext, the key that was used to encrypt the data must be used (Learn more about Asymmetric Crypto-system for a better concept).
The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated ciphertext without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of ciphertext without possessing the key.
It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose one that has been in use for several years and has successfully resisted all attacks.
In computers, Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage.
Decoding is the opposite process, The conversion of an encoded format back into the original sequence of characters.
Note: Encoding and decoding are used in data communications, networking, and storage. The term is especially applicable to radio (wireless) communications systems.
TCP/IP is an industry-standard protocol suit for Wide Area Networks (WANs) developed in the 1970s and 1980 by the U.S Department of Defense (DoD).Read More
Network Topology is the schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection.Read More
In networking and telecommunications, it cannot be read by unauthorized users. Cryptography comes from the Greek words "secret writing".Read More
It's a special area where you can find special questions and answers for CSE students or IT professionals. Also, In this section, we try to explain a topic in a very deep way.