Encryption in Plain English

Understand the basics of encryption and learn how to protect your sensitive information with this comprehensive guide written in plain English.
Objectives
After reading this article, you will be able to:
- Define what encryption is in computing
- Understand why encryption is important
- Know how encryption works
- Be aware of common different encryption techniques.
Background
In the realm of cyber security, encryption plays a crucial role by converting data from its original, readable format into a highly secure, encoded format.
This process ensures that the data cannot be accessed or understood by unauthorised individuals, as the encrypted information can only be read and processed after it has undergone the decryption process.
Encryption acts as a shield that protects sensitive and confidential information from falling into the wrong hands, thereby preventing data breaches and cyber attacks.
How Does Encryption Work
Data transmitted over the public internet is vulnerable to interception or theft. Encryption in network security can help to reduce this risk by using specialised software or hardware.
Encryption involves converting human-readable plaintext into incomprehensible text, known as cipher text, to prevent unauthorised access to sensitive information.
The encryption process uses a cryptographic key, a set of mathematical values agreed upon by both the sender and recipient. The recipient uses the key to decrypt the data and turn it back into readable plaintext. The complexity of the cryptographic key directly affects the security of the encryption, as more complex keys are more difficult to decrypt via brute force attacks.
Encryption Techniques
The two widely used types of encryption methods are symmetric and asymmetric encryption. These names differentiate based on the usage of a single key for both encrypting and decrypting the data or different keys for encryption and decryption respectively.
A. Symmetric Encryption Keys
This method of encryption is commonly referred to as private key encryption. In this technique, the key utilised for encryption is the same one used for decryption, making it an ideal solution for single users and closed systems.
B. Asymmetric Encryption Keys
Asymmetric encryption uses two distinct keys, a public key and a private key, that are connected through mathematical means. These keys are large numbers that are associated with each other, but are not identical, hence the term asymmetric. The owner of the encryption keeps the private key confidential, while the public key is either distributed to authorized recipients or made publicly accessible.
Symmetric Encryption vs Asymmetric Encryption
- Symmetric (private key) encryption is faster compared to the asymmetric encryption method.
- Symmetric encryption is typically used for bulk data encryption, while asymmetric encryption is used for secure communication, such as digital signatures and secure key exchange.
- Symmetric encryption provides strong security for the encryption of data, but the distribution of the key can be a security risk. Asymmetric encryption provides a higher level of security, as the private key remains confidential and is never transmitted over the internet.
In summary, symmetric and asymmetric encryption each have their own strengths and weaknesses, and the choice between the two depends on the specific use case and the level of security required.
Examples of Encryption Algorithms
DES Encryption (obsolete)
The Data Encryption Standard (DES) is a symmetric encryption algorithm that has since become obsolete. It is no longer considered secure enough for modern applications and has been replaced by more advanced encryption algorithms.
3DES Encryption
Triple Data Encryption Standard (3DES) is a symmetric encryption algorithm that involves three iterations of the DES encryption process, hence the name “triple.” Although it is gradually being replaced by more advanced algorithms, 3DES remains a reliable encryption solution for financial services and other industries in hardware form.
AES Encryption
The Advanced Encryption Standard (AES) was created to replace the outdated Data Encryption Standard (DES). This encryption algorithm is widely used in various applications, such as messaging apps like Signal and WhatsApp, as well as the file compression software WinZip.
RSA Encryption
RSA, an acronym for Rivest, Shamir, and Adleman, is an asymmetric encryption algorithm named after the mathematicians who first described it. RSA encryption is widely used for secure data transmission due to its long key length. As an asymmetric algorithm, RSA uses a pair of keys, a public key for encryption and a private key for decryption.
RC4 Encryption
The RC4 encryption algorithm is utilised in the WEP and WPA protocols, which are popular encryption methods utilised in wireless routers.
End-to-End Ecryption
End-to-end encryption is a common term when discussing data encryption. It refers to systems where only the two communicating parties, who both have keys, can decrypt the conversation. Even the service provider is unable to access end-to-end encrypted data.
Resetting end-to-end encrypted data can be necessary in certain cases. For example, if you forget your password on an iPhone, you may need to reset the device to regain access. However, doing so will make all previously encrypted backup files inaccessible. But you can back up your iOS device again using iTunes and set a new password for the backed up data.
End-to-end encryption is a crucial security feature for users who prioritize privacy. By only allowing the users to access the encrypted data, it ensures that even the service provider cannot access it. This makes it ideal for secure communication and the protection of sensitive information.
It provides an added layer of security to user data. While resetting end-to-end encrypted data may be necessary in certain cases, it is important to keep in mind that previously encrypted backup files will be lost. However, this can be mitigated by backing up the device again and setting a new password for the backed up data.
Signing vs Encryption vs Hashing
Signing
- Involves attaching a digital signature to an electronic document to verify its authenticity and integrity
- Utilizes public key cryptography to sign and verify signatures
- Can prove that the sender of a message is who they claim to be and that the message hasn’t been tampered with
- Typically used for contracts, legal documents, and sensitive business communications
PS: To learn how to sign data in Django, read this article which simplifies it.
Encryption
- The process of converting plain text into unreadable (encrypted) text to protect its confidentiality
- Utilizes both a public and private key for encryption and decryption
- The encrypted message can only be read by the person with the private key that corresponds to the public key used for encryption
- Commonly used to protect sensitive information like credit card numbers, passwords, and personal data
Hashing
- The process of generating a fixed-size string of characters (hash) from a message or data
- The hash is unique to the original message and will change if even a single character in the message changes
- Used to verify the integrity of data and to detect any changes made to it
- Commonly used in data structures like hash tables and in digital signatures to verify that a message has not been altered in transit.
Now that we know about encryption, let’s learn why it is important and why we should use it.
Importance of Encryption
- Protects confidentiality: Encryption helps to ensure that sensitive information, such as financial data, personal information, and confidential business information, is protected from unauthorized access.
- Prevents unauthorized access: Encrypted data can only be read by individuals with the proper decryption key, preventing unauthorized access to the information.
- Increases security in transit: Encrypting data when it is being transmitted over networks, such as the internet, helps to ensure that the information is secure while in transit and cannot be intercepted by unauthorized third parties.
- Comply with regulations: Encryption is often required by law and industry regulations, such as the EU’s General Data Protection Regulation (GDPR) and the Payment Card Industry Data Security Standard (PCI DSS), to help protect sensitive information.
- Protects against hacking and cyberattacks: Encryption helps to protect data against hacking and cyberattacks by making it more difficult for cybercriminals to access and use sensitive information.
- Supports privacy: Encryption helps to support privacy by giving individuals and organisations control over their personal information and who has access to it.
That’s all for this article, my guy! Till next time. 👊🏽
Don’t forget to clap, share and subscribe.

Tomisin Abiodun
Senior Software Engineer @ Checkout.com
I bridge code and product strategy to build scalable, human-centric products with strong AI, design, frontend, and cloud expertise.