Technology

Encryption Technology - Types of Encryption Keys based Upon Need

There are many varied data encryption solutions in the market today. One must consider the purpose and use planned when determining the best approach to be selected.

  • A-Symmetrical Encryption Keys:

    encrypta
    • On the following diagram on the right, an A-Symmetrical Encryption Key is utilized.In this case, a key pair (consisting of a public key and a private key) is utilized to encrypt and then decrypt the data respectively. This approach is very useful for sending data over email to secure data access. Keys are shared with other recipients requiring access to the data.
  • Symmetrical Encryption Keys:encryptb

    • Depicted in the following diagram, a Symmetrical Encryption Key is utilized. In this case, the same unique key is utilized to encrypt and later decrypt data. This is very useful with storage devices eliminating the need to make a public key accessible to users that need to view the data. With centralized servers in an enterprise environment, where user authentication is guaranteed, this greatly simplifies access to secured data.

Login