What Is Encryption?

Encryption is the process of transforming readable data (plaintext) into an unreadable scrambled format (ciphertext) using a mathematical algorithm and a key. Only someone with the correct decryption key can reverse the process and read the original data. Encryption is the foundation of secure communication, data storage, and authentication across the internet - It underpins HTTPS/TLS, VPNs, and end-to-end messaging.

Symmetric vs Asymmetric Encryption

PropertySymmetricAsymmetric
Keys usedOne shared key for both encrypt and decryptKey pair: public key encrypts, private key decrypts
SpeedVery fast - Suitable for bulk dataSlow - Typically 100-1000x slower
Key distribution problemYes - How do you securely share the key?No - Public key can be shared openly
Common algorithmsAES-256, ChaCha20, 3DESRSA-2048/4096, ECC (P-256, X25519), ElGamal
Typical useEncrypting files, VPN data tunnels, disk encryptionTLS handshake, email signing, SSH authentication

Common Encryption Algorithms and Their Strength

AlgorithmKey SizeStatusUse Case
AES-256256 bitsSecure - RecommendedFile encryption, VPNs, TLS data
AES-128128 bitsSecure - Widely usedTLS, disk encryption (FileVault, BitLocker)
ChaCha20-Poly1305256 bitsSecure - Recommended for mobileTLS 1.3, WireGuard VPN
RSA-20482048 bitsAcceptable (4096 preferred)TLS certificates, SSH, PGP
RSA-10241024 bitsInsecure - DeprecatedLegacy only; do not use
DES / 3DES56 / 112 bitsInsecure - DeprecatedLegacy systems only
MD5 / SHA-1Hash functionsBroken for signaturesDo not use for integrity or signatures

Encryption at Rest vs In Transit

  • Encryption in transit protects data as it travels over the network - HTTPS/TLS is the standard for web traffic. Verify any site's certificate with our SSL checker.
  • Encryption at rest protects data stored on disk - BitLocker (Windows), FileVault (macOS), and LUKS (Linux) are common tools.
  • End-to-end encryption (E2EE) means only the communicating parties can decrypt the data - Not even the service provider. Signal, ProtonMail, and WhatsApp (with caveats) offer E2EE.
  • Encrypting data in transit but not at rest is a common gap - If a server is breached, unencrypted stored data is exposed. Combine with a firewall and VPN for layered protection.