Data being transmitted over a network faces the dangers of being tapped, listened to, or copied to unauthorized destinations.
To protect such data, it is mixed up into a form that only the sender & the receiver can be able to understand by reconstructing the original message from the mix. This is called Data encryption.
The flow diagram below shows how a message can be encrypted and decrypted to enhance security.
The message to be encrypted is called the Plain text document. After encryption using a particular order (or, algorithm) called encryption key, it is sent as Cyphertext on the network.
After the recipient receives the message, he/she decrypts it using a reverse algorithm to the one used during encryption called decryption key to get the original plain text document.
This means that, without the decryption key, it is not possible to reconstruct the original message.
francis1897 answered the question on
March 15, 2023 at 05:12