{"id":22070,"date":"2023-12-07T17:51:48","date_gmt":"2023-12-07T17:51:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22070"},"modified":"2024-01-04T17:21:01","modified_gmt":"2024-01-04T17:21:01","slug":"types-of-encryption","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/","title":{"rendered":"Types of Encryption, Methods &amp; Use Cases"},"content":{"rendered":"\n<p>Encryption scrambles data to make it unreadable to those without decryption keys. Proper use of encryption preserves secrecy and radically lowers the potential damage of a successful cybersecurity attack.<\/p>\n\n\n\n<p>The understanding of different encryption types will often be confused by the many possible, inconsistent, and confusing ways that \u201cencryption type\u201d can be used. To minimize confusion, this article explains and classifies encryption types, explores what encryption will be best for which situation, and discusses how to effectively use encryption through the following topics:<\/p>\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6da4bf2807\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6da4bf2807\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#Classifications-of-Encryption-Types\" title=\"Classifications of Encryption Types\">Classifications of Encryption Types<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#Encryption-Category-Types\" title=\"Encryption Category Types\">Encryption Category Types<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#Encryption-Algorithm-Types\" title=\"Encryption Algorithm Types\">Encryption Algorithm Types<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#Encryption-Tool-Types\" title=\"Encryption Tool Types\">Encryption Tool Types<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#How-to-Choose-an-Encryption-Type-or-Algorithm\" title=\"How to Choose an Encryption Type or Algorithm\">How to Choose an Encryption Type or Algorithm<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#Bottom-Line-Encryption-Adds-a-Strong-Layer-to-a-Security-Stack\" title=\"Bottom Line: Encryption Adds a Strong Layer to a Security Stack\">Bottom Line: Encryption Adds a Strong Layer to a Security Stack<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p>For a more basic overview of encryption, consider reading: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption\/\">What Is Encryption? Definition, How it Works, &amp; Examples<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Classifications-of-Encryption-Types\"><\/span>Classifications of Encryption Types<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To avoid confusion, let\u2019s examine the different ways \u2018type\u2019 can be applied to encryption and how we will cover them in this article:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encryption category types<\/strong> will explain the overarching and basic categories of classification for encryption, including the two most important: symmetric and asymmetric encryption.<\/li>\n\n\n\n<li><strong>Encryption algorithm types<\/strong> will provide an overview of the mathematical algorithms used to encrypt data (AES, RSA, etc.), their significance, and their pros and cons.<\/li>\n\n\n\n<li><strong>Encryption tool types<\/strong> will discuss the major classifications of encryption tools available for use by an organization.<\/li>\n<\/ul>\n\n\n\n<p>Although each is a \u2018type\u2019 of encryption, some sources mix these together, which can be confusing for those trying to understand encryption. We provide the additional distinctions to help better explain how encryption works and to better illustrate the tool to use for specific use cases.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encryption-Category-Types\"><\/span>Encryption Category Types<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>An encryption category type provides an overarching classification that encompasses multiple encryption algorithms or tool types. These conceptual buckets provide definitions that help to define the inherent weaknesses and strengths of families of algorithms and tools.<\/p>\n\n\n\n<p>The two most important encryption categories are symmetric and asymmetric encryption. These critical encryption concepts encompass the vast majority of encryption algorithms and tools currently in wide use and can be used in combination for secure communication.<\/p>\n\n\n\n<p>Other important categories of encryption categories include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Homomorphic encryption<\/strong>, which continues to rise in importance with the processing of sensitive and regulated data.<\/li>\n\n\n\n<li><strong>Block ciphers<\/strong> process plain text in fixed-sized chunks for encryption.<\/li>\n\n\n\n<li><strong>Format-preserving encryption (FPE)<\/strong> used to create encrypted fields with specific formatting and length requirements for databases.<\/li>\n\n\n\n<li><strong>Stream ciphers<\/strong> process data as it passes through the algorithm and is used in communication.<\/li>\n<\/ul>\n\n\n\n<p>We will also briefly discuss hashing, which is often associated with encryption but is not actually a type of encryption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Symmetric Cryptography: Best for Speed<\/h3>\n\n\n\n<p>Symmetric cryptography uses the same concept as shared keys for a house \u2014 one or more individuals use an identical key to unlock the lock for access. Symmetric encryption works much the same way \u2014 to encrypt and decrypt messages with a single, shared key.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"511\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_TypesOfEncryption01_23_DA_rnd1_Symmetric-1024x511.png\" alt=\"Symmetric Key Encryption uses the same key for encryption and decryption\" class=\"wp-image-33356\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_TypesOfEncryption01_23_DA_rnd1_Symmetric-1024x511.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_TypesOfEncryption01_23_DA_rnd1_Symmetric-300x150.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_TypesOfEncryption01_23_DA_rnd1_Symmetric-768x383.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_TypesOfEncryption01_23_DA_rnd1_Symmetric-1536x766.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_TypesOfEncryption01_23_DA_rnd1_Symmetric-2048x1021.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">How symmetric key encryption works using the same key.<\/figcaption><\/figure>\n\n\n\n<p>Users can establish a symmetric key to share private messages through a secure channel, like a password manager. Unfortunately, while symmetric encryption is a faster method, it is also less secure because sharing the key exposes it to theft.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">Phishing<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering<\/a> are common ways threat actors can obtain a symmetric key, but cryptanalysis and brute force attempts can also break symmetric key ciphers. Symmetric encryption is often used for drive encryption, WiFi encryption, and other use cases where speed performance is paramount and a password can be safely shared.<\/p>\n\n\n\n<p>Modern algorithms use variable input, variable key lengths, and multiple rounds to compensate for symmetric key weaknesses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Asymmetric Cryptography: Best for Sharing<\/h3>\n\n\n\n<p>Asymmetric cryptography works more like providing a code to unlock a small panel in an otherwise locked door for deliveries. The shared public key of asymmetric cryptology can encrypt documents, but decryption requires the use of a private key that is not intended to be shared.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"532\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_KeyTypesOfEncryption02_23_DA_rnd2_Asymmetric-1024x532.png\" alt=\"How Asymmetric Key Encryption uses large prime numbers for encryption and decryption.\" class=\"wp-image-33358\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_KeyTypesOfEncryption02_23_DA_rnd2_Asymmetric-1024x532.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_KeyTypesOfEncryption02_23_DA_rnd2_Asymmetric-300x156.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_KeyTypesOfEncryption02_23_DA_rnd2_Asymmetric-768x399.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_KeyTypesOfEncryption02_23_DA_rnd2_Asymmetric-1536x799.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_KeyTypesOfEncryption02_23_DA_rnd2_Asymmetric-2048x1065.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">How asymmetric encryption uses different large prime numbers in encryption and decryption.<\/figcaption><\/figure>\n\n\n\n<p>Although more complicated and expensive to implement, asymmetric encryption ensures secure communications over distributed networks without exposing the encryption keys to theft. Asymmetric encryption does not use multiple rounds for encryption but instead uses variable-length, large sized prime numbers.<\/p>\n\n\n\n<p>The larger key sizes and prime number calculations can take much longer to process than symmetric encryption; however, asymmetric algorithm public keys can be published to enable much more secure sharing of encrypted files.<\/p>\n\n\n\n<p>The asymmetry of the algorithm enables either of the keys to encrypt the data, but that same key cannot be used for decryption. Typical examples of use include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sender encrypts data with recipient\u2019s public key; recipient decrypts data with their private key.<\/li>\n\n\n\n<li>Sender encrypts data with their own private key to verify the source of a document and re-encrypts the data with the recipient\u2019s public key for security; the recipient uses their private key to access the message and uses the sender\u2019s public key to decrypt the message.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\"><\/th><th class=\"has-text-align-center\" data-align=\"center\">Symmetric<\/th><th class=\"has-text-align-center\" data-align=\"center\">Asymmetric<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Keys<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">1 \u2013 Private<\/td><td class=\"has-text-align-center\" data-align=\"center\">2 \u2013 Public and Private<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Bits<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">128 \u2013 192 \u2013 256<\/td><td class=\"has-text-align-center\" data-align=\"center\">2,048 \u2013 4,096<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Speed<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">Faster<\/td><td class=\"has-text-align-center\" data-align=\"center\">Slower<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Overhead<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">Less complex and expensive and use less memory and processing power<\/td><td class=\"has-text-align-center\" data-align=\"center\">More complex and expensive and use more memory and processing power<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Security Risk<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">Vulnerable to key theft, should not be used for sharing encrypted data,<br>quantum computers can guess keys<\/td><td class=\"has-text-align-center\" data-align=\"center\">Quantum computers can guess keys<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Examples<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">AES, Blowfish, 3DES<\/td><td class=\"has-text-align-center\" data-align=\"center\">DHM, RSA, ECC<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Use Cases<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">Full drive encryption, WiFi data encryption<\/td><td class=\"has-text-align-center\" data-align=\"center\">Website communication, proving identity&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Symmetric + Asymmetric Encryption<\/h3>\n\n\n\n<p>Software developers and organizations increasingly use both symmetric and asymmetric encryption methods to give users speed and security in communication. A common example is the standard Transfer Layer Security (TLS) protocol used to enable secure website browsing.<\/p>\n\n\n\n<p>Also known as hybrid encryption, the bundle of the two methods usually starts with a handshake between users through asymmetric cryptography to establish security. Within the asymmetric connection, parties then securely share symmetric algorithms keys to enable faster processing of messages.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Homomorphic Encryption<\/h3>\n\n\n\n<p><a href=\"https:\/\/digitalprivacy.ieee.org\/publications\/topics\/types-of-homomorphic-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">Homomorphic encryption<\/a> allows for a set of limited operations on ciphertext without decrypting the message. Homomorphic models include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Partial homomorphic encryption (PHE)<\/strong> for algorithms that can perform a single operation on encrypted data.<\/li>\n\n\n\n<li><strong>Somewhat homomorphic encryption (SHE)<\/strong> for algorithms capable of performing two operations on encrypted data.<\/li>\n\n\n\n<li><strong>Fully homomorphic encryption (FHE)<\/strong> for algorithms capable of the broadest range of operations on encrypted data.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\">Google, IBM, and Microsoft continue to explore FHE<\/a> capabilities to process specific data while maintaining its secrecy and have released open-source encryption libraries. However, these techniques lack widespread adoption or incorporation into commercial tools.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Block Ciphers<\/h3>\n\n\n\n<p>Encryption algorithms operate on chunks of data to render them unreadable without a proper decryption key. Block cipher encryption uses fixed-sized blocks of data such as 128 or 64 bit blocks. Many symmetric algorithms are block ciphers; asymmetric algorithms use different key lengths, so technically they are not block ciphers because there is a variable block length between the public and private keys.<\/p>\n\n\n\n<p>When the plaintext to be encrypted is shorter than the block length, the data is padded by the algorithm to reach the block length before encryption. Data longer than the block length will be broken into smaller blocks prior to encryption and also padded if the smaller blocks fall below the block size.<\/p>\n\n\n\n<p>A weakness of block ciphers is that encryption of identical, full-sized plaintext blocks can yield identical encrypted blocks, which can enable brute force detection of keys. Algorithms avoid this issue by using multiple passes of different block sizes or by applying <a href=\"https:\/\/cseweb.ucsd.edu\/~mihir\/papers\/lpe.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">variable-input-length<\/a> algorithms to the data before it is processed by the encryption algorithm.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Format-Preserving Encryption (FPE)<\/h3>\n\n\n\n<p>The category of format-preserving encryption addresses the storage of encrypted data in legacy databases with strictly defined formats and field lengths. These databases cannot tolerate variances caused by many encryption algorithms that intentionally add padding to short encryption to obscure the length of the original data or convert both letters and numbers into hexadecimal code.<\/p>\n\n\n\n<p>For example, the Social Security number \u201c111-11-1111\u201d might be encoded into the plaintext numeric code of \u201c049049 049049 049049 049049 049,\u201d which cannot be used in a database with a limit of 9 characters. Format preserving algorithms will instead transform the number into a 9-character numeric string so that the database utility will be preserved.<\/p>\n\n\n\n<p>Format-preserving encryption can use existing encryption algorithms, such as AES (see below). However, programmers typically incorporate specially designed algorithms so specialized that we will not cover them in more detail in this article, such as the <a href=\"https:\/\/cseweb.ucsd.edu\/~mihir\/papers\/lpe.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Thorp Shuffle<\/a>, <a href=\"https:\/\/cseweb.ucsd.edu\/~mihir\/papers\/lpe.pdf\">Variable Input Length<\/a> (VIL) Ciphers, and the <a href=\"https:\/\/www.princeton.edu\/~rblee\/HPC\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hasty Pudding Cipher<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Streaming Ciphers<\/h3>\n\n\n\n<p>When sending data through a high-speed router or switch, the full size of the data will be unknown. Storing the data until it reaches a specific block size can cause unacceptable delays for processing and transmission.<\/p>\n\n\n\n<p>Streaming ciphers solve the problem by using a key to encrypt data one bit at a time. Streaming ciphers are symmetric algorithms that use a secret key to feed a random number generator. Asymmetric keys cannot usually be used for streaming encryption because the block sizes cannot be known. The wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) algorithms incorporate streaming ciphers to encode Wi-fi data transmissions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Not Really Encryption: Hashing<\/h3>\n\n\n\n<p>Although associated with the verification of the integrity of a file, hashing algorithms such as the 128-bit message digest algorithm (MD-5) or the eight 32-bit-word secure hash algorithm (SHA-256) do not change the data of a file. Instead, the algorithm analyzes the bits of the contents to create a single number that represents the contents.<\/p>\n\n\n\n<p>An added space or deleted letter will create a completely different hash value for a file, so hash values will often be used to verify that a file has not been altered during a copying or transmission process. However, since hashing algorithms leave the data in plaintext, hashing does not defend the data against unauthorized access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encryption-Algorithm-Types\"><\/span>Encryption Algorithm Types<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Encryption algorithms are defined by the specific math formulas and the process required to perform an encryption transformation. While cryptologists develop many different algorithms, this article will focus on the main encryption algorithms adopted for use in IT data encryption:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DES<\/li>\n\n\n\n<li>3DES<\/li>\n\n\n\n<li>Blowfish<\/li>\n\n\n\n<li>Twofish<\/li>\n\n\n\n<li>DHM<\/li>\n\n\n\n<li>RSA<\/li>\n\n\n\n<li>AES<\/li>\n\n\n\n<li>ECC<\/li>\n\n\n\n<li>Post-quantum<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">DES: The Data Encryption Standard<\/h3>\n\n\n\n<p>The need for a government-wide standard to encrypt sensitive information became evident as early as 1973. The U.S. National Bureau of Standards (now the National Institute of Standards and Technology, or NIST) made a public request for potential ciphers.<\/p>\n\n\n\n<p>IBM and lead cryptographer Horst Feistel soon proposed a symmetric-key block cipher algorithm that became called the Data Encryption Standard (DES). By the 1990s, DES received wide criticism for its vulnerability to brute force attacks and its short key size.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> First US national encryption standard<\/li>\n\n\n\n<li><strong>Pros:<\/strong> Fast, easy to use<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Vulnerable to brute force attacks as early as the 1990s<\/li>\n\n\n\n<li><strong>Used for:<\/strong> Obsolete, replaced by TDES<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">Key Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Block Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Rounds<\/th><th class=\"has-text-align-center\" data-align=\"center\">Structure<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">56 bits<br>(+ 1 bit for parity)<\/td><td class=\"has-text-align-center\" data-align=\"center\">64 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">16<\/td><td class=\"has-text-align-center\" data-align=\"center\">Feistel<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">TDES: The Triple Data Encryption Standard<\/h3>\n\n\n\n<p>Triple DES (TDES), or 3-DES, improves upon the original DES encryption algorithm with three stages of encryption using three different keys:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stage 1:<\/strong> Key 1 used to encrypt plaintext data.<\/li>\n\n\n\n<li><strong>Stage 2:<\/strong> Key 2 used to decrypt the encrypted data from step 1 to create a new document (does not reproduce original document; it will not be readable in this form).<\/li>\n\n\n\n<li><strong>Stage 3:<\/strong> Key 3 used to re-crypt the data from step 2 to produce another encrypted document.<\/li>\n<\/ul>\n\n\n\n<p>The symmetric block cipher TDES provides a dramatic improvement in strength over DES, but TDES has since been replaced by AES (see below). New applications no longer use TDES, but TDES-encrypted data can be found in legacy environments and Microsoft only retired 3DES from use within Office 365 in 2019.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> Replaced DES<\/li>\n\n\n\n<li><strong>Pros:<\/strong> Much stronger than DES<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Remains vulnerable to brute force attacks, quantum attacks<\/li>\n\n\n\n<li><strong>Used for:<\/strong> Obsolete, replaced by AES, however, legacy use remains for ATM pins, UNIX passwords, older payment systems<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">Key Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Block Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Rounds<\/th><th class=\"has-text-align-center\" data-align=\"center\">Structure<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">112 or 168 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">64 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">16 rounds per stage&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">Feistel<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Blowfish<\/h3>\n\n\n\n<p>Bruce Schneier developed the symmetric block cipher Blowfish to replace the DES in 1993. The Blowfish encryption algorithm was released to the public without a required license and is known for its flexibility, speed, and resilience compared to other older encryption standards.<\/p>\n\n\n\n<p>The algorithm uses 64-bit block sizes and encrypts them individually over 16 rounds using a key length between 32 and 448 bits. Each round consists of four actions that further scramble the data for encryption processing. This standard is not recommended to be used on files greater than 4 GB due to its small block size.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> Early open-source encryption tool, replaced by Twofish<\/li>\n\n\n\n<li><strong>Pros:<\/strong> Fast, fairly secure, free<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Vulnerable to brute force and quantum attacks, slow for key changes<\/li>\n\n\n\n<li><strong>Used for:<\/strong> Still in use for password management; file and disk encryption; older Secure Shell (SSH) protocol tools (OpenSSH, PuTTY, etc.); and is embedded in Linux and OpenBSD operating systems<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">Key Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Block Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Rounds<\/th><th class=\"has-text-align-center\" data-align=\"center\">Structure<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">32 to 448 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">64 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">16<\/td><td class=\"has-text-align-center\" data-align=\"center\">Feistel&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Twofish<\/h3>\n\n\n\n<p>Twofish offers a next generation version of Blowfish developed in 1998 that uses keys between 128 and 256 bits long, block sizes between 128 and 256 bits, and 16 rounds of encryption. While more complex than Blowfish, the symmetric block cipher encryption is optimized for 32 bit CPUs, which enables better performance.<\/p>\n\n\n\n<p>As with Blowfish, Twofish has also been made available in the public domain, allowing free use and incorporation of the algorithm into applications. While competitive with AES in speed on generic hardware, AES can be significantly faster using AES hardware acceleration.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> Replaced Blowfish, but remains smaller in adoption<\/li>\n\n\n\n<li><strong>Pros:<\/strong> Stronger encryption than Blowfish, fast performance<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Not as fast as AES with hardware accelerators, theoretically vulnerable to quantum brute force attacks<\/li>\n\n\n\n<li><strong>Used for:<\/strong> File and folder encryption<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">Key Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Block Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Rounds<\/th><th class=\"has-text-align-center\" data-align=\"center\">Structure<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">128, 192, or 256 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">128 to 256 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">16<\/td><td class=\"has-text-align-center\" data-align=\"center\">Feistel<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">DHM: Diffie-Hellman-Merkle Introduces Key Exchange<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"511\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Webo.DiffieHellman.jpeg\" alt=\"Merkle (left), Hellman (center), and Diffie (right) at Stanford in 1977. (Chuck Painter \/ Stanford News Service)\" class=\"wp-image-22076\" style=\"width:200px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Webo.DiffieHellman.jpeg 360w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Webo.DiffieHellman-211x300.jpeg 211w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Webo.DiffieHellman-150x213.jpeg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Webo.DiffieHellman-300x426.jpeg 300w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><figcaption class=\"wp-element-caption\">Merkle (left), Hellman (center), and Diffie (right) at Stanford in 1977. (Chuck Painter \/ Stanford News Service)<\/figcaption><\/figure>\n\n\n\n<p>Shortly after the release of DES, three computer scientists \u2013 Whitfield Diffie, Martin Hellman, and Ralph Merkle \u2013 published their research on public-private key cryptography in 1976. Their Diffie-Hellman-Merkle (DHM) key exchange pioneered asymmetric encryption and supported much longer key lengths of 2,048 to 4,096 bits.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> First asymmetric encryption algorithm published<\/li>\n\n\n\n<li><strong>Pros:<\/strong> More secure for sharing information than symmetric algorithms<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Not widely adopted, more resource intensive, vulnerable to brute force attack<\/li>\n\n\n\n<li><strong>Used for:<\/strong> Not widely adopted<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">RSA Encryption<\/h3>\n\n\n\n<p>A year after DHM\u2019s release, three cryptographers \u2013 Ron Rivest, Adi Shamir, and Leonard Adleman \u2013 developed the asymmetric RSA public-key cryptosystem. The three innovators and MIT patented the RSA algorithm, a proprietary system available through RSA Security until its public release in 2000. The RSA algorithm remains the most popular public key cryptographic system today and introduced the concept of digital signatures for authentication outside of academia.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"690\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders.jpeg\" alt=\"The RSA algorithm originators (right to left): Adi Shamir, Ron Rivest, and Leonard Adleman.\" class=\"wp-image-22078\" style=\"width:500px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders.jpeg 1200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders-300x173.jpeg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders-1024x589.jpeg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders-768x442.jpeg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders-150x86.jpeg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders-696x400.jpeg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.RSAFounders-1068x614.jpeg 1068w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><figcaption class=\"wp-element-caption\">The RSA algorithm originators (right to left): Adi Shamir, Ron Rivest, and Leonard Adleman.<\/figcaption><\/figure>\n\n\n\n<p>RSA depends on multiplying two very large randomized prime numbers to create a third, even larger prime number. While it\u2019s very difficult for most computers to factor these prime numbers quickly, the algorithm has been found vulnerable to quantum computing attacks and tends to be a slow algorithm to implement. The algorithm is now in the public domain and <a href=\"https:\/\/www.cs.drexel.edu\/~popyack\/Courses\/CSP\/Fa17\/notes\/10.1_Cryptography\/RSA_Express_EncryptDecrypt_v2.html\" target=\"_blank\" rel=\"noreferrer noopener\">RSA calculators websites<\/a> can be used to examine how the process works.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> First commercially available public key, asymmetric algorithm<\/li>\n\n\n\n<li><strong>Pros:<\/strong> Enables secure sharing<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Slow to implement, vulnerable to brute force attacks (especially quantum-powered)<\/li>\n\n\n\n<li><strong>Used for:<\/strong> Secure messaging, payments, small encrypted files<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">AES: The Advanced Encryption Standard<\/h3>\n\n\n\n<p>In 1997, the NIST renewed its call to the public cryptography community for the successor to DES. Two Dutch cryptographers \u2013 Joan Daemen and Vincent Rijmen \u2013 submitted the eventual pick known as Rijndael. By 2001, the NIST dubbed it the Advanced Encryption Standard (AES) and officially replaced the use of DES. AES offered larger and different key sizes with a family of ciphers to choose from and remains one of the most popular standards over 20 years later. AES encrypts data over 10-14 rounds in block sizes of 128 bits and with key sizes between 128 and 256 bits.<\/p>\n\n\n\n<p>While both DES and AES use symmetric block ciphers, AES uses a substitution-permutation network wherein plaintext goes through multiple rounds of substitution (S-box) and permutation (P-box) before finalizing the ciphertext block. Similarly, a client or application can decrypt the AES message by reversing these S-box and P-box transformations.<\/p>\n\n\n\n<p>Most organizations use one of the AES algorithms for file encryption, full-disk encryption, application encryption, wifi transmission encryption, virtual public network (VPN) encryption, and encrypted protocols such as transport layer security (TLS).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> Most widely adopted symmetric, block cipher algorithm<\/li>\n\n\n\n<li><strong>Pros:<\/strong> More secure than legacy encryption, faster than asymmetric options<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Vulnerable to key theft and brute force attacks<\/li>\n\n\n\n<li><strong>Used for:<\/strong> Protocols, VPN, full-disk encryption, Wi-Fi transmission encryption<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">Key Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Block Sizes<\/th><th class=\"has-text-align-center\" data-align=\"center\">Rounds<\/th><th class=\"has-text-align-center\" data-align=\"center\">Structure<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">128, 192, 256 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">128 bits<\/td><td class=\"has-text-align-center\" data-align=\"center\">10, 12, 14<\/td><td class=\"has-text-align-center\" data-align=\"center\">SP-network&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">ECC: Elliptic-Curve Cryptography<\/h3>\n\n\n\n<p>Professors at the University of Washington and Columbia University independently published research in 1985 on elliptic curve cryptography (ECC), but it didn\u2019t come into widespread implementation until the mid-2000s. Like RSA, ECC is an asymmetric encryption algorithm, but instead of using prime numbers, it uses elliptic curves to generate public and private keys.<\/p>\n\n\n\n<p>The use of elliptic curves enables equivalent security with smaller key sizes than RSA, which enables faster execution of the encryption and decryption algorithms. ECC has proven to be a popular alternative choice to RSA but has also been found to be vulnerable to threats such as twist-security and side-channel attacks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Significance:<\/strong> Popular asymmetric encryption alternative to RSA<\/li>\n\n\n\n<li><strong>Pros:<\/strong> Faster than RSA and uses smaller key sizes, more secure for sharing than symmetric encryption algorithms<\/li>\n\n\n\n<li><strong>Cons:<\/strong> Vulnerable to twist-security, side-channel, and quantum-powered attacks<\/li>\n\n\n\n<li><strong>Used for:<\/strong> Email encryption, cryptocurrency digital signatures, internet communication protocols<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">What Is Next? Post-Quantum Cryptography<\/h3>\n\n\n\n<p>Based on quantum mechanics rather than mathematical operations, quantum computers can utilize Shor\u2019s algorithm to find prime factors much more rapidly than traditional computers. This allows an attacker with access to a large enough quantum computer to break asymmetric standards like DHM, RSA, and ECC by determining an organization\u2019s private key from the public key.<\/p>\n\n\n\n<p>Although not commonly available, the development of quantum computers is seen as a near future certainty. Data stolen today may be securely encrypted using today\u2019s standards and uncrackable for the next 5-10 years. However, if the attacker who stole the information gains access to affordable quantum computing resources in the future, the encryption may easily be broken.<\/p>\n\n\n\n<p>Post-quantum cryptography (PQC) describes research, algorithms, and vendors developed to address quantum attacks and secure the next generation of IT environments and data. The NIST and the US National Security Agency (NSA) started to <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" target=\"_blank\" rel=\"noreferrer noopener\">release algorithms<\/a> and <a href=\"https:\/\/www.nsa.gov\/Cybersecurity\/Post-Quantum-Cybersecurity-Resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">resources<\/a> in 2022 against quantum threats.<\/p>\n\n\n\n<p>Still, research remains in early stages, so initial standards remain in draft form and a full mitigation architecture for federal agencies isn\u2019t expected until the 2030s. Currently, the four recognized algorithms include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CRYSTALS-Kyber (<a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/203\/ipd\" target=\"_blank\" rel=\"noreferrer noopener\">FIPS 203<\/a>)<\/strong> defines an algorithm incorporated into an asymmetric key encapsulation mechanism (KEM) standard designed to allow for quantum-resistant sharing of secure keys over public channels.<\/li>\n\n\n\n<li><strong>CRYSTALS-Dilithium (<a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/204\/ipd\" target=\"_blank\" rel=\"noreferrer noopener\">FIPS 204<\/a>)<\/strong> defines an algorithm incorporated into a standard to create quantum-resistant digital signature schemes to verify sources and identities.<\/li>\n\n\n\n<li><strong>SPHINCS+ (<a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/205\/ipd\" target=\"_blank\" rel=\"noreferrer noopener\">FIPS 205<\/a>)<\/strong> defines an algorithm incorporated into a stateless hash-based, quantum-resistant digital signature standard to verify sources and identities.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/falcon-sign.info\/\" target=\"_blank\" rel=\"noreferrer noopener\">FALCON<\/a> (FIPS pending)<\/strong> will define an algorithm and a digital signature standard based on fast-fourier lattices.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encryption-Tool-Types\"><\/span>Encryption Tool Types<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Information technology uses encryption to protect data at rest and data in transit in <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">many different ways<\/a>. The broadest applications of encryption include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encrypted data transmission protocols<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-full-disk-software-products\/\">Full disk encryption<\/a><\/li>\n\n\n\n<li>File encryption<\/li>\n\n\n\n<li>Email encryption<\/li>\n\n\n\n<li>Application Embedded Encryption<\/li>\n\n\n\n<li>Digital certificates<\/li>\n<\/ul>\n\n\n\n<p>While these are the solutions most often purchased and deployed, encryption can also be found incorporated into security solutions such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/casb-security-vendors\/\">cloud access security brokers<\/a> (CASB), <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">next-generation firewalls<\/a> (NGFW), <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password managers<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">virtual private networks<\/a> (VPN), and <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-web-application-firewall-waf-vendors\/\">web application firewalls<\/a> (WAF).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Encrypted Data Transmission Protocols<\/h3>\n\n\n\n<p>Many fundamental protocols incorporate encryption into their programming to provide universal protection invisible to most users. Major protocols include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dkim\/\"><strong>DomainKeys Identified Mail<\/strong><\/a><strong> (DKIM)<\/strong> enables the authentication of email senders by hosting a public key for an encrypted block of text in sent emails.<\/li>\n\n\n\n<li><strong>Internet protocol security (IPSec)<\/strong> provides encryption at the IP packet level and creates a secure tunnel for packets belonging to multiple users and hosts.<\/li>\n\n\n\n<li><strong>Kerberos<\/strong> provides single sign-on and user authentication against a central authentication and key distribution server by distributing authenticated tickets for securing and supporting authentication on a local area network.<\/li>\n\n\n\n<li><strong>Layer 2 Tunneling Protocol (L2TP)<\/strong> provides a framework for doubly-encrypted transmission of data using an encrypted tunnel between devices.<\/li>\n\n\n\n<li><strong>Secure\/Multipurpose Internet Mail Extension (S\/MIME)<\/strong> upgrades email security.<\/li>\n\n\n\n<li><strong>Secure Shell (SSH)<\/strong> secures remote terminals and provides support for single sign-on and secure tunneling for TCP streams.<\/li>\n\n\n\n<li><strong>Transmission Control Protocol (TCP)<\/strong> adds encryption, server authentication, and client authentication to communication between devices and applications and enables HTTPS connections.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Full Disk Encryption<\/h3>\n\n\n\n<p>To protect data at rest, an entire hard drive can be encapsulated within an encrypted container. This feature can be included in firmware, in operating systems, or as a feature in <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-full-disk-software-products\/\">open-source, shareware, or commercial applications<\/a>.<\/p>\n\n\n\n<p>Full-disk encryption protects against the theft of the device or hard drive when they are powered down by rendering the contents of the device unreadable without the security key. However, these applications typically use symmetric encryption and are vulnerable to stolen keys. Additionally, full-disk encryption does not protect against data theft from the device when the device is powered on and the data is unencrypted for use.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">File Encryption<\/h3>\n\n\n\n<p>File encryption protects data at rest while the device is powered on and the data is otherwise available for use. Encryption is applied on either a folder or individual file basis and decryption is applied as needed when the information is required.<\/p>\n\n\n\n<p>File encryption tends to require more user interaction and is more difficult to apply on a universal basis than full disk encryption. File encryption can add strong security, but it remains vulnerable to stolen passwords and can be more vulnerable to lost passwords than full disk encryption, which may have an admin password established by IT.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Encryption<\/h3>\n\n\n\n<p>Email encryption places email content in encrypted containers for safe transmission using unencrypted email protocols. Email encryption options exist within major email tools, but many organizations choose to deploy additional tools with more robust options for deployment or encryption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Application Embedded Encryption<\/h3>\n\n\n\n<p>Applications such as databases, websites, and other programs can incorporate encryption within the programming to protect data. Databases offer the most varied types of encryption for fields, columns, or entire database storage instances. Other types of encryption can detect and encrypt specific data types, such as credit card numbers and Social Security numbers, throughout the application.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Digital Certificates<\/h3>\n\n\n\n<p>Digital certificates provide publicly published keys that can be used to verify identity or to encrypt and decrypt information. Certificates must be maintained with current information and replaced before they expire.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-to-Choose-an-Encryption-Type-or-Algorithm\"><\/span>How to Choose an Encryption Type or Algorithm<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When selecting encryption types, enterprises should first consider their security requirements based upon the organization\u2019s risk. Risk defines the most important data in the organization from a financial, operational, and regulatory perspective, which aids in determining where and how encryption can protect that data.<\/p>\n\n\n\n<p>Effective risk analysis requires effective classification of data, an accurate inventory of data locations, and an effective picture of how the most important data flows through the organization. The risk analysis will determine the security needs, and then a range of encryption solutions should be considered, not just the type of tool that is most commonly used or the most convenient to apply.<\/p>\n\n\n\n<p>The top features of a commercial tool (other than cost) to consider include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Centralized policy management<\/li>\n\n\n\n<li>Speed of the tool<\/li>\n\n\n\n<li>Key management and automation<\/li>\n\n\n\n<li>Support for hardware-based cryptographic acceleration<\/li>\n\n\n\n<li>Ability to report for compliance<\/li>\n\n\n\n<li>Monitoring, logging, and auditing capabilities<\/li>\n\n\n\n<li>Operating system (OS) support<\/li>\n\n\n\n<li>Installation and configuration processes<\/li>\n\n\n\n<li>Impact on operations and user experience<\/li>\n\n\n\n<li>Encryption algorithm options<\/li>\n\n\n\n<li>Legacy encryption support<\/li>\n<\/ul>\n\n\n\n<p>Unfortunately, encryption can result in loss of functionality, decreased performance, and even lost data, depending upon factors such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User error<\/li>\n\n\n\n<li>Memory and hard drive requirements vs. available resources<\/li>\n\n\n\n<li>Required changes to infrastructure&nbsp;<\/li>\n\n\n\n<li>Required changes to devices&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Solutions that require extensive changes to the infrastructure and end user devices should generally be used only when other options cannot meet the enterprise\u2019s security needs. After selecting a tool, an organization may have the option to select from multiple available security algorithms. They should consider whether this algorithm is current or obsolete, is validated or untested, and suits the use case.<\/p>\n\n\n\n<p>In addition to tool and algorithm considerations, an organization should also consider the way in which the encryption can be obtained and the economic consequences:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Direct tool purchase<\/strong> offers the potential for one-time pricing and professional customer support but can become obsolete or may be narrowly focused.<\/li>\n\n\n\n<li><strong>Open-source software<\/strong> will generally be free but will lack professional customer support, require the most resources to implement, may become obsolete, and will usually be narrowly focused on how it can be used.<\/li>\n\n\n\n<li><strong>Add-on encryption<\/strong> is often a service provided by specific vendors for specific use cases, such as a cloud provider\u2019s cloud storage encryption added to protect cloud resources.<\/li>\n\n\n\n<li><strong>Encryption as a service<\/strong> offers a broad range of encryption options, will be continuously updated, and requires the least effort to manage; however, this option involves giving up control of company secrets to an outside party.<\/li>\n<\/ul>\n\n\n\n<p>The selection of a tool can be a collaborative and iterative process. Affected users should be involved in testing encryption tools and deployment can be rolled out in stages to avoid disruptions and data loss. As with security, encryption should be applied in layers appropriate for the use: database, local file, email, or entire drives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bottom-Line-Encryption-Adds-a-Strong-Layer-to-a-Security-Stack\"><\/span>Bottom Line: Encryption Adds a Strong Layer to a Security Stack<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Encryption may be required by compliance standards and customers expect important data will be encrypted for protection and to guard against theft. However, encryption alone will not fully protect valuable data. Encryption provides a very strong layer of defense, but it should complement a full security stack of solutions and services to protect servers, endpoints, network connections, applications, and more.<\/p>\n\n\n\n<p>To read more about encryption, consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/tokenization-vs-encryption\/\">Tokenization vs Encryption: Pros and Cons<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/disk-vs-file-encryption-which-is-best-for-you\/\">Disk vs File Encryption: Which Is Best For You?<\/a><\/li>\n<\/ul>\n\n\n\n<p><em>This article was originally written by <a href=\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\">Sam Ingalls<\/a> and published on May 26, 2022. It was updated by <a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\">Chad Kime<\/a> on December 7, 2023.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6da4bedd13-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6da4bedd13\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6da4bedd13\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6da4bedd13\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6da4bedd13\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6da4bedd13\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6da4bedd13\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Each type of encryption has its advantages. Discover which encryption type you should use when protecting your organization&#8217;s data.<\/p>\n","protected":false},"author":271,"featured_media":33115,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,23,14,17,15,16],"tags":[5225,860,4464],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[136,137,432,66,383,377,67,140,77,143,375,409,144,148,31775,491,88,392],"class_list":["post-22070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-compliance","category-networks","category-products","category-threats","category-trends","tag-cryptography","tag-encryption","tag-rsa","b2b_audience-awareness-and-consideration","b2b_product-applications","b2b_product-communications","b2b_product-data-management","b2b_product-development","b2b_product-encryption-data-loss-prevention","b2b_product-gateway-and-network-security","b2b_product-it","b2b_product-mobile","b2b_product-mobile-development","b2b_product-security","b2b_product-security-management","b2b_product-server-software","b2b_product-servers","b2b_product-web","b2b_product-web-applications-security","b2b_product-web-design","b2b_product-web-development-development","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Types of Encryption, Methods &amp; Use Cases<\/title>\n<meta name=\"description\" content=\"Each type of encryption has its advantages. Discover which encryption type you should use when protecting your organization&#039;s data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Types of Encryption, Methods &amp; Use Cases\" \/>\n<meta property=\"og:description\" content=\"Each type of encryption has its advantages. Discover which encryption type you should use when protecting your organization&#039;s data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-07T17:51:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-04T17:21:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Types of Encryption, Methods &amp; Use Cases\",\"datePublished\":\"2023-12-07T17:51:48+00:00\",\"dateModified\":\"2024-01-04T17:21:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\"},\"wordCount\":4354,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png\",\"keywords\":[\"cryptography\",\"encryption\",\"RSA\"],\"articleSection\":[\"Applications\",\"Compliance\",\"Networks\",\"Products\",\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\",\"name\":\"Types of Encryption, Methods & Use Cases\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png\",\"datePublished\":\"2023-12-07T17:51:48+00:00\",\"dateModified\":\"2024-01-04T17:21:01+00:00\",\"description\":\"Each type of encryption has its advantages. Discover which encryption type you should use when protecting your organization's data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: wigglestick\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Types of Encryption, Methods &amp; Use Cases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Types of Encryption, Methods & Use Cases","description":"Each type of encryption has its advantages. Discover which encryption type you should use when protecting your organization's data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Types of Encryption, Methods & Use Cases","og_description":"Each type of encryption has its advantages. Discover which encryption type you should use when protecting your organization's data.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/","og_site_name":"eSecurity Planet","article_published_time":"2023-12-07T17:51:48+00:00","article_modified_time":"2024-01-04T17:21:01+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Types of Encryption, Methods &amp; Use Cases","datePublished":"2023-12-07T17:51:48+00:00","dateModified":"2024-01-04T17:21:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/"},"wordCount":4354,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png","keywords":["cryptography","encryption","RSA"],"articleSection":["Applications","Compliance","Networks","Products","Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/","url":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/","name":"Types of Encryption, Methods & Use Cases","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png","datePublished":"2023-12-07T17:51:48+00:00","dateModified":"2024-01-04T17:21:01+00:00","description":"Each type of encryption has its advantages. Discover which encryption type you should use when protecting your organization's data.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231207-types-of-encryption.png","width":1400,"height":900,"caption":"Image: wigglestick\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Types of Encryption, Methods &amp; Use Cases"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22070"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22070"}],"version-history":[{"count":8,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22070\/revisions"}],"predecessor-version":[{"id":33360,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22070\/revisions\/33360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33115"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22070"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22070"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22070"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}