{"id":6233,"date":"2023-05-16T17:33:29","date_gmt":"2023-05-16T15:33:29","guid":{"rendered":"https:\/\/mascalagrimas.es\/dev-enthec_old\/?p=6233"},"modified":"2024-03-01T14:18:16","modified_gmt":"2024-03-01T13:18:16","slug":"what-is-encryption-and-what-are-the-main-typologies","status":"publish","type":"post","link":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/","title":{"rendered":"What is encryption and what are the main typologies"},"content":{"rendered":"<h1 style=\"text-align: center;\">What is encryption and what are the main typologies<\/h1>\n<p>&nbsp;<\/p>\n<p>One of the main tools we have to keep ourselves safe when we browse the Internet or use different applications is encryption.<br \/>\nEncryption helps us protect and keep secure our activity, the information we share, and our personal and session data.<\/p>\n<h2>What is encryption?<\/h2>\n<p>Encryption can be included within cryptography. This is a technique with which we seek to encrypt or encode texts or information so that it is only accessible to the sender and receiver.<br \/>\nIn the world of computing and cybersecurity, this technique uses complex mathematical algorithms to encrypt information.<br \/>\nTo consider that information or text has been encrypted, it must meet a series of requirements or characteristics:<br \/>\nPrivacy: Information is only accessible to authorized people.<br \/>\nIntegrity: The information has not been modified by any external agent. Information must be kept intact from the time it is received until it is delivered.<br \/>\nAuthentication: It must be possible to verify the identity of the other party within this information exchange.<br \/>\nThis is why encryption is one of the most popular and effective data security methods used by businesses.<\/p>\n<h2>Types of encryption<\/h2>\n<p>Within the world of cryptography we can differentiate between two types of encryption, symmetric and asymmetric.<br \/>\nSymmetric encryption<br \/>\nSymmetric encryption, also called secret key cryptography, is a cryptographic method characterized by the use of the same key to encrypt and decrypt messages at the sender and receiver.<br \/>\nOnce both parties have access to this key, the sender encrypts a message using the key, sends it to the recipient, and the recipient decrypts it with the same key.<br \/>\nIt is the oldest form of encryption and is still relevant due to its data transmission speed.<br \/>\nThe algorithms used for this type of encryption are Blowfish, RC4, DES, AES-128, AES-256, etc.<br \/>\nAsymmetric encryption<br \/>\nAsymmetric encryption, also known as public key cryptography or PKI, is a cryptographic method characterized by the use of two keys, one public and one private, for the transfer of data and information.<br \/>\nIn asymmetric encryption, the sender uses the public key to encode information into an unreadable format, which can only be decrypted or read with a secret key. When sending encrypted data from the public key scheme, the receiver needs a secret key to access the encrypted data.<br \/>\nSome of the most used algorithms for this type of encryption are DSA, RSA, PKCS and EIGamal.<br \/>\nDifferences between symmetric encryption and asymmetric encryption<br \/>\nSome of the differences between these two types of encryption have already been explained in their definition. Let&#8217;s comment on them:<br \/>\nSecurity<br \/>\nSymmetric encryption is older and uses a single key that must be communicated with the risk that this entails. However, asymmetric encryption uses two keys and can securely communicate the public key to third parties.<br \/>\nAlthough asymmetric encryption is more secure, a priori we will have to look at each case individually and the combination of both encryptions is very interesting.<br \/>\nSpeed<br \/>\nAsymmetric encryption uses more time in its encryption and decryption processes than symmetric encryption because it is a more complex process. This is why some organizations opt for symmetric encryption as it is faster.<br \/>\nNumber of keys<br \/>\nKey management is also an advantage of using asymmetric encryption. You only need one key pair, per user, for each user, to encrypt messages for all other users.<br \/>\nAs we saw with symmetric encryption, as the number of users increases, the number of keys increases.<br \/>\nWhen encrypting communications with a large volume of data in transit, asymmetric encryption is better. On the other hand, symmetric encryption is usually used in the transmission of small volumes of data in authentication systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is encryption and what are the main typologies &nbsp; One of the main tools we have to keep ourselves safe when we browse the Internet or use different applications is encryption. Encryption helps us protect and keep secure our activity, the information we share, and our personal and session data. What is encryption? Encryption [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6427,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[35],"tags":[36],"class_list":["post-6233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-encrypting","tag-encrypting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is encryption and what are the main typologies - Enthec<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is encryption and what are the main typologies - Enthec\" \/>\n<meta property=\"og:description\" content=\"What is encryption and what are the main typologies &nbsp; One of the main tools we have to keep ourselves safe when we browse the Internet or use different applications is encryption. Encryption helps us protect and keep secure our activity, the information we share, and our personal and session data. What is encryption? Encryption [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Enthec\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-16T15:33:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-01T13:18:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juan Carlos Tom\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan Carlos Tom\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/\"},\"author\":{\"name\":\"Juan Carlos Tom\u00e9\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/25a0d7e453eaefd0285bbdc373529d7f\"},\"headline\":\"What is encryption and what are the main typologies\",\"datePublished\":\"2023-05-16T15:33:29+00:00\",\"dateModified\":\"2024-03-01T13:18:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/\"},\"wordCount\":618,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg\",\"keywords\":[\"Encrypting\"],\"articleSection\":[\"Encrypting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/\",\"name\":\"What is encryption and what are the main typologies - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg\",\"datePublished\":\"2023-05-16T15:33:29+00:00\",\"dateModified\":\"2024-03-01T13:18:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is encryption and what are the main typologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"name\":\"Enthec\",\"description\":\"La plataforma XTI automatizada\",\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\"},\"alternateName\":\"Kartos by Enthec\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\",\"name\":\"Enthec\",\"alternateName\":\"Kartos by Enthec\u00e7\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"width\":512,\"height\":512,\"caption\":\"Enthec\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/25a0d7e453eaefd0285bbdc373529d7f\",\"name\":\"Juan Carlos Tom\u00e9\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/author\/jcboss\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is encryption and what are the main typologies - Enthec","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What is encryption and what are the main typologies - Enthec","og_description":"What is encryption and what are the main typologies &nbsp; One of the main tools we have to keep ourselves safe when we browse the Internet or use different applications is encryption. Encryption helps us protect and keep secure our activity, the information we share, and our personal and session data. What is encryption? Encryption [&hellip;]","og_url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/","og_site_name":"Enthec","article_published_time":"2023-05-16T15:33:29+00:00","article_modified_time":"2024-03-01T13:18:16+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg","type":"image\/jpeg"}],"author":"Juan Carlos Tom\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Juan Carlos Tom\u00e9","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#article","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/"},"author":{"name":"Juan Carlos Tom\u00e9","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/25a0d7e453eaefd0285bbdc373529d7f"},"headline":"What is encryption and what are the main typologies","datePublished":"2023-05-16T15:33:29+00:00","dateModified":"2024-03-01T13:18:16+00:00","mainEntityOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/"},"wordCount":618,"commentCount":0,"publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg","keywords":["Encrypting"],"articleSection":["Encrypting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/","name":"What is encryption and what are the main typologies - Enthec","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg","datePublished":"2023-05-16T15:33:29+00:00","dateModified":"2024-03-01T13:18:16+00:00","breadcrumb":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#primaryimage","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/05\/Encriptacion-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/what-is-encryption-and-what-are-the-main-typologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/"},{"@type":"ListItem","position":2,"name":"What is encryption and what are the main typologies"}]},{"@type":"WebSite","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","name":"Enthec","description":"La plataforma XTI automatizada","publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization"},"alternateName":"Kartos by Enthec","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization","name":"Enthec","alternateName":"Kartos by Enthec\u00e7","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","width":512,"height":512,"caption":"Enthec"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/25a0d7e453eaefd0285bbdc373529d7f","name":"Juan Carlos Tom\u00e9","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/author\/jcboss\/"}]}},"_links":{"self":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/6233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/comments?post=6233"}],"version-history":[{"count":2,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/6233\/revisions"}],"predecessor-version":[{"id":7021,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/6233\/revisions\/7021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/media\/6427"}],"wp:attachment":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/media?parent=6233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/categories?post=6233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/tags?post=6233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}