Lesson Progress
0% Complete

Encryption procedures serve, among other things, to protect a message communication between sender and recipient. When sending messages, only the person who has been selected as the authorised recipient should be able to decrypt and read the content.

A distinction is made between symmetrical, asymmetrical and hybrid encryption methods. In addition, digital signatures also fall into this area, as they serve as proof of the authenticity of a message in accordance with integrity.

Asymmetric encryption, symmetric encryption and the digital signature are based on a cryptographic procedure.

Cryptographic procedures are of a mathematical-logical nature. The mathematics behind them is that of an algorithm.

A system generates a key which, for example, consists of various numbers and letters. In order to crack the key, many combinations have to be tried out. The longer the key, the more attempts it takes and the more secure the key.

Simplified, one can say that cryptography is the protection of data.