Encryption Algorithms –The debate on the best encryption algorithm is not a new one. Every time a new algorithm comes out, people are debating which is stronger and safer.

A front view on a spreadsheet of encrypted computer data and blueprint schematics.

The AES-256 is just one of many in a long line of encryption algorithms that have been developed over the years. However, it has emerged as the most popular encryption algorithm to date.

## Introduction to Encryption Algorithms :

The basic premise of encryption is to prevent access to the original message by converting it into a format that appears to be meaningless. There are many different encryption algorithms that have been developed over the years and each one has its own strengths and weaknesses.

AES is a symmetric-key block cipher with 128-bit and 256-bit keys that was developed by Ron Rivest, Adi Shamir, and Leonard Adleman. It can be implemented in software or hardware as a chip. AES is the current standard for Advanced Encryption Standard.

## Encryption Algorithms with Password-Based Key Generation

Encryption algorithms generate a key that is used to encrypt data. These keys are generated based on knowledge of a password. There are many different types of algorithms and each has its own strengths and weaknesses.

For example, a password-based algorithm can be very strong if it is complex enough and the password is long.Encryption algorithms use keys to encrypt data.

## Encryption Algorithms with Key-Based Key Generation :

It is a process of securing data so that only authorized users can access the information. Key-based key generation is one form of encryption that generates a key for encoding and decoding data. and is an important aspect of data security.

The two main methods for key-based key generation are algorithms and a hash algorithm. The following discussion will focus on the RSA algorithm which is one of the most widely-used encryption algorithms.

RSA Algorithm:In cryptography, the RSA algorithm is a public key cryptosystem that defines a double-length, numerical public key that can be used for encrypting data. A private key is a short length, numerical key that must be kept secret and only shared with the intended recipient of data encoded with the public key.A Public Key is:

* Two large prime numbers p and q * The multiplicative inverse of (p-1) in an integere such that e^e == 1 (mod (p-1) x p) a very large number N = p x q The result of repeatedly multiplying the public and private exponent e, modulo (p-1) x p.

## Encryption Algorithms with Secret-Key-Based Key Generation

If you have ever used a file encryption software to protect your computer from hackers, you are already familiar with the basics of encryption algorithms.It can be divided into two types: public-key cryptography and secret-key cryptography.

Public-key cryptography uses two keys: a public key and a private key. The private key is kept secret and only known to the owner of the public key. This prevents anyone from decrypting messages encrypted with simple encryption algorithms such as RSA, AES, or Twofish.

Secret-key cryptography relies on one key known to both parties: a secret-key algorithm . This type of encryption algorithm is used for symmetric key algorithms, such as AES or Twofish.The book discusses the importance of key management and includes a chapter on PKI.

The “Book’s website” contains more information on the topics with links to references.

## Symmetric Encryption Algorithms :

Symmetric encryption algorithms that use the same key for both encrypting and decrypting. This means that the sender and receiver of a message need to agree on the key in advance.

During the early days of computer security, symmetric cryptography was the only method that could be used to secure transmissions. This is because it is faster and easier to encrypt than asymmetric encryption algorithms.

## Encryption Algorithms for Data Hiding :

Data encryption is a process by which information can be turned into a form that is unreadable to anyone who does not possess the decryption key. Data encryption algorithms for data hiding were developed in the 1970s and 1980s, when computers became powerful enough to encrypt data in large quantities.

Encryption algorithms are designed to be computationally infeasible to reverse engineer, so that the data remains hidden even if it is intercepted. The diversity of encryption algorithms means some can hide the data quite well, whereas others have been cracked within a few years after their introduction.

The mathematical format for most encryption algorithms consists of two parts: a key and a format for input called a cipher algorithm. Encryption algorithms are typically categorized as either symmetric or asymmetric, depending on whether the encryption key is shared by both parties to the communication.

**Data Hiding: **Data encryption is an attempt to conceal data in such a way as to make it unreadable without possession of the correct decryption method or key .

## Symmetric Encryption Algorithms with Symmetric Key :

Symmetric Encryption Algorithms with Symmetric Key, also called symmetric-key algorithms, are cryptographic algorithms that use a single key to encrypt and decrypt messages. Symmetric encryption is the oldest type of encryption and have been around since ancient times. when it was first used in the Caesar Cipher.

**The following symmetric encryption algorithms exist :**

Data Encryption Standard Triple DES Data Encryption Standard is a block cipher that uses three different encryption keys. One key is used to encrypt the data and two keys are used to decrypt the data.

Advanced Encryption Standard The Advanced Encryption Standard (AES) is a symmetric-key algorithm designed by National Institute of Standards and Technology in 1997.

## Symmetric Encryption Algorithms with Secret-Key :

Symmetric encrypt algorithms with a secret-key were created in the 1970s by James Ellis. These algorithms require that the sender and receiver share a secret key. This is usually done through an initial exchange of key information, or through a trusted third party.

The most well-known of these algorithms is the RC4 encryption algorithm, which was invented in 1987.Symmetric key encryp algorithms work in one of two ways: either they encrypt with a single key and decrypt with the same key, or they encrypt with one key and decrypt with another.