What is 'Encryption'

Encryption is a means of securing digital data using an algorithm and a password, or key. The encryption process translates information using an algorithm that turns plain text unreadable. When an authorized user needs to read the data, they may decrypt the data using a binary key.  

Encryption is an important way for individuals and companies to protect sensitive information from hacking. For example, websites that transmit credit card and bank account numbers should always encrypt this information to prevent identity theft and fraud.

BREAKING DOWN 'Encryption'

Encryption strength depends on the length of the encryption security key. In the latter quarter of the 20th century, web developers used either 40 bit encryption, which is a key with 240 possible permutations, or 56 bit encryption. However, by the end of the century hackers could break those keys through brute-force attacks. This led to a 128 bit system as the standard encryption length for web browsers.

The Advanced Encryption Standard (AES) is a protocol for data encryption created in 2001 by the U.S. National Institute of Standards and Technology. AES uses a 128 bit block size, and key lengths of 128, 192 and 256 bits.

AES uses a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. Asymmetric-key algorithms use different keys for the encryption and decryption processes.

Today, 128-bit encryption is standard but most banks, militaries and governments use 256-bit encryption.

Encryption in the News

In May of 2018, the Wall Street Journal reported that despite the importance and accessibility of encryption, many corporations still fail to encrypt sensitive data. By some estimates, companies encryped only one-third of all sensitive corporate data in 2016, leaving the remaining two thirds sensitive to theft or fraud.

Encryption makes it more difficult for a company to analyze its own data, using either standard means or artificial intelligence. Speedy data analysis can sometimes mean the difference between which of two competing companies gains a market advantage, which partly explains why companies resist encrypting data.

Consumers should understand that encryption does not always protect data from hacking. For example, in 2013 hackers attacked Target Corporation and managed to compromise the information of up to 40 million credit cards. According to Target, the credit card information was encrypted, but the hackers’ sophistication still broke through the encryption. This hack was the second largest breach of its kind in U.S. history and led to an investigation by the U.S. Secret Service and the Justice Department.

RELATED TERMS
  1. Data Anonymization

    Data anonymization seeks to protect private or sensitive data ...
  2. Account Number

    An account number is the primary identifier for ownership of ...
  3. HTTPS

    Hypertext Transfer Protocol Secure (HTTPS) is a secure form of ...
  4. Hash

    A hash is a function that converts an input of letters and numbers ...
  5. Secure Electronic Transaction (SET)

    Secure electronic transactions are early e-commerce protocols ...
  6. Tor

    Tor is an open source privacy network that permits users to browse ...
Related Articles
  1. Investing

    Symantec in First Benelux Partnership With Xolphin

    The Mountain View, Calif.-based cybersecurity pioneer strengthens its alliance with the Dutch firm.
  2. Insights

    Detailed Ways to Protect Digital Data

    Knowing how to protect digital data has become a big concern these days. Here are four easy ways to keep your personal information safe.
  3. Insights

    5 Ways Your Small Business Is at Risk for a Cyber Attack

    Small business owners think they are immune to hacks because of their size, but they are not. When they find the guard is down, hackers are exploiting common weakness.
  4. Tech

    Protect Your Small Business from Cybercrime

    Small business owners are a growing target for cyber-attacks; protect yourself and your clients.
  5. Tech

    Is Making Your Home ‘Smart’ A Dumb Idea?

    Remote-controlled devices and home systems could allow hackers to penetrate your sensitive data, not to mention your premises.
  6. Insights

    What Is the Dark Net?

    The Dark Net (or Darknet) is a subset of secret websites that exist on an encrypted network.
  7. Insights

    Apple Encryption Case: FBI Cracks Shooter's iPhone (AAPL)

    The Department of Justice has brought an abrupt end to the encryption fight it had been waging with Apple Inc. (NASDAQ: AAPL) over an iPhone used by Syed Rizwan Farook. In a two-page filing Monday, ...
  8. Tech

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  9. Investing

    UK Wants WhatsApp Accessible to Intel Services

    Facebook is facing calls by lawmakers to make its messaging app accessible to govt. agencies.
  10. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
RELATED FAQS
  1. What Does the Bitcoin Blockchain Record?

    Read about the bitcoin blockchain, a public ledger shared among all bitcoin users that records the information of every single ... Read Answer >>
  2. What Are the Pros and Cons of Online Checking Accounts?

    Learn about the ways an online checking account can save you time and money, but understand the drawbacks before signing ... Read Answer >>
Trading Center