Let's talk about encryption. There are two types of encryption which you can read in the title.
There are some people here on the forum that they encrypted something. Encryption can be of help to all of us which it can help us secure data, plain text or whatever you want to encrypt.
What is ENCRYPTION?Encryption means decoding or locking the data to protect it from unauthorized access. This usually happen on a site when you are surfing. It makes the plaintext data that looks like it is typed randomly that doesn’t make sense to the reader. The encrypted data looks like a string of random alphabets and digits. For example, when you encrypt the word “Hello, this is nakamura12 and this is the plaintext that will be encrypted” then it will become like this “n587ngw8y7356nhgiej39!”.
How does ENCRYPTION works?Let’s explore this concept with Bob, Alice, and Mallory to understand encryption in a simpler way.
Bob sends a letter to Alice. Mallory (the villain) gets access to the letter while it’s in transit. Because the letter is in plaintext, she can read, interpret, and even modify the message before it reaches Alice.
To tackle this issue, Bob and Alice decide to use a trick. They will replace the original alphabet with its next to the next alphabet. That means A=C, B=D, C=E …. X=Z, Y=A, Z=B.
Now, when Bob sends the message, “HELLO,” he writes, “JGNNQ” Instead.
Now, if Mallory (or anyone else) gets access to the letter, all she’ll read is a bunch of text that doesn’t make any sense! But when Alice receives it, she knows the trick and shifts each letter of the message back two steps in the alphabet so she can interpret the message.
TWO TYPES OF ENCRYPTION.Symmetric Encryption and Asymmetric EncryptionAsymmetric EncryptionThis type of encryption uses two separate keys for encryption (public key) and decryption (private key). Each key is different and have it's own purpose as mentioned which the public key used to encrypt the data and private key to decrypt the data.
Advantages° Encrypting and decrypting data in asymmetric uses two unique keys which is public key and private key.
° Good for smaller data.
° The private key is not shared, and the overall process is more secure as compared to symmetric encryption.
Disadvantages° The process is slower.
° It’s a much more complicated process than symmetric key encryption.
Symmetric EncryptionThis type of encryption is reciprocal, meaning that the same key is used to encrypt and decrypt data. This is great for large batches of data but has issues in terms of key distribution and management.
Advantages° It is not complicated to encrypt a data.
° The process is much faster.
° It’s mostly used when large chunks of data need to be transferred.
Disadvantages° Only one key (symmetric key) is used, and the same key is used to encrypt and decrypt the message.
° The secret key is shared. Consequently, the risk of compromise is higher.
Encryption can also be used to encrypt your private key and store the keys when you want to store a back up of your private key (bitcoin wallet or a mnemonic phrase safely and secured.
Edit:An example of encrypted text. Everyone can decrypt this text by using the private key. The private key and the public key is 1024 bit. Take note that this site is for example use only.
There is another assymetric encryption which is Open PGP (Pretty Good Privacy).
This encrypted text is encrypted using public key and you need to have the private key to decrypt the encrypted text. Try it out yourselves using this site for encrypting and decrypting purpose.
https://www.devglan.com/online-tools/rsa-encryption-decryption.
Asymmetric EncryptionThis
RSA key size is
1024 bitPublic Key I used to encrypt the message.
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCUVtbBBjGVhGHken/JDA56OgfkBcTi2DbewObvxZMi3cVmRqswlpgLXxJ2GC6Q3e1zBd1yySxbofXbxDSiXkvVG9TddMVTLZBrBDcooraSNecGsysKW8Y6h7jq7+x88C8fzKabbbbIIyhX25FUyONTtXkT5TDL+ajIP0g+AdbUdQIDAQAB
Encrypted MessageAWMsMztC6b3bNjzOvuDR7DnsiTxTnKhRsDp0p0LpfVjflRqPcIoaXtQvtW6rbvQB0ogdwJl1Nlu25Zlb4s2PlzPvX6e8gSXCq+w2bd+rSfy9Ug59xkuA5CfuBJcFRCQ+m0y3W3A6D6sEbTEHd0M7TAaT4qv8GJ09meZL/fi5wVI=
Private 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
Symmetric Encryptionhttps://www.javainuse.com/aesgenerator. Use this site to decrypt the message.
ECB Mode
256 bitSymmetric Key This is the key I wanted to use. You can use whatever key you wanted as long as it is the exact characters needed for each key size.
wksowndkg1248a7fn9dn27dn3nd7fjd4
Encrypted MessageG/opDEYTMbpjvzKXi8lffZiUs+2mjFLVw2dxeE+he7ffKPZojNNwYGuHBiNm4db+t/xYbB4Kv3kH3Nz+zxR5AMVPieQSXX0B6QHN8SaKuzldSMH5lj//23OuVOI/A8ya+GgEhj6kbQtkFaBdE3TzLw==
This thread also mentions encryption and examples of already encrypted text using electrum wallet
https://bitcointalksearch.org/topic/ssl-vs-tls-5223953https://bitcointalksearch.org/topic/merit-hey-bitcoiners-can-you-send-encrypted-messages-5289839Take note:
If there is a thread of the same topic is I will locked it right away, Just let me know.
It is not my responsibility if you ever wanted to encrypt your crypto wallet private key or mnemonic phrase and you lose it or getting comprised by a hacker or your own carelessness.If you want to know more about encryption and the types of encryption you can find it here
Source:https://sectigostore.com/blog/what-is-encryption-and-how-does-it-work/https://sectigostore.com/blog/5-differences-between-symmetric-vs-asymmetric-encryption/https://sectigostore.com/blog/what-is-asymmetric-encryption-how-does-it-work/?sa=X&ved=2ahUKEwjnqMSm-IDxAhUq7GEKHQ6ODB0Q9QF6BAgDEAIhttps://www.cryptomathic.com/news-events/blog/an-overview-of-symmetric-encryption-and-the-key-lifecycle