Encryption Glossary : Data Protection Services & Solutions

Select Questions

What is Encryption?

Encryption is a method of scrambling information so only approved keyholders can comprehend the data. Encryption takes decipherable information and...

What is Decryption?

A process which reverses the process of encryption. Using the key, the ciphertext will be converted back to plaintext.

What is an Encryption Algorithm?

Encryption algorithms are a mathematical formula which, with the help of a key, change plaintext into ciphertext. They also make...

What is Tokenization? How does it work?

More often than not, organizations utilize encryption to protect data-at-rest. While encryption is a valid method of protecting data, there are others, like...

What is Data Masking?

Data masking is the process of replacing original production data with structurally similar, inauthentic data. The format of the data...

What is Secure Shell (SSH)?

SSH or Secure Shell or Secure Socket Shell is a network protocol is how users, sysadmins can access other computers...

What is TLS/SSL?

When we use HTTPS to communicate with a web server, we use asymmetric encryption. For asymmetric encryption, we would need...

What is an API?

Application Programming Interface (API) is a software intermediatory which allows two separate applications to communicate with each other. These two...

What are Secrets?

Secrets are privileged credentials that act as a key to unlock protected resources or sensitive data.

What is AES? How does it work?

Table of Contents Why was AES developed? Choosing the Rjindael cipher Understanding AES key size differences Attacks on AES Who...

What is RSA? Who uses RSA?

Table of Contents How does RSA work? Who uses RSA encryption? RSA Vulnerabilities The Rivest-Shamir-Adleman (RSA) encryption algorithm is an asymmetric encryption algorithm that...

What is Blowfish? Who uses Blowfish?

Table of Contents Products that use Blowfish Comparison Table Blowfish is the first symmetric encryption algorithm created by Bruce Schneier in 1993....

What is Twofish? Is Twofish secure?

Table of Contents Is Twofish secure? What uses Twofish for encryption? Twofish is the successor to Blowfish, and, like its predecessor,...

What is RC4?

Table of Contents How secure is RC4? Variants of the RC4 cipher Advantages and Disadvantages Rivest Cipher 4, or RC4,...

Self-Signed Certificates

A self-signed certificate is a digital certificate not signed by any publicly trusted Certificate Authority (CA). Self-signed certificates include SSL/TLS...

What is a Certificate Authority?

A Certificate Authority, or CA, is a highly trusted entity given the responsibility of signing and generating digital certificates. CAs...

What are the two types of CA?

Public CAs are organizations which issue certificates to other organizations. Public CAs are generally trusted so certificates issued by them...

What is Certificate Scanning?

The Discovery of digital certificates installed on the endpoints of the network would require certificate scanning. Scanning would store details...

What is Public Key Cryptography?

Asymmetric cryptography or public key cryptography is where 2 keys are used to establish a secure connection between 2 entities...

Where is PKI used?

PKI is helping us create secure networks. It uses asymmetric encryption to secure data-in-transit. A PKI also issues certificates, which...

X.509 standard and certificate

X.509 is a standard used for public-key certificates or digital documents. An assigned cryptographic key pair is paired with a...

What does BYOK mean?

Bring Your Own Key (BYOK) is an approach where the on prem keys are placed in a cloud service provider environment,...

What is BYOE?

BYOE, or Bring your own Encryption, is also known as Hold your own Key, or HYOK. BYOE is used when...

What is a Master Key?

A Master Key is a key, typically in an HSM, that encrypts all other keys within that HSM.

What is Software Key Management?

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure...

What is Secret Management?

Secret Management refers to tools or methods that are used to manage authentication credentials(or secrets) which may include passwords, access...