HomeTelecommunicationsEncryption and Decryption | Alibaba's Magical Speech

Encryption and Decryption | Alibaba’s Magical Speech

Today, we will discuss about encryption and decryption. Many may be wondering what these are? These words can be seen while working on various topics related to hiding apps on mobile.

Encryption and Decryption
Encryption and Decryption

Encryption

Don’t go straight to the definition. Let’s talk before that. You must have heard the story of Alibaba. The cave door would open as soon as Alibaba uttered a magical speech. That is, Alibaba had a magical speech that was used as a safety measure inside of the cave for the diamond and jewelry. This story is very relatable with encryption and decryption.

Similarly, when we send our messages to someone online, they need a security code. Otherwise someone else can read this message if they want to. So, like the Alibaba’s magical word, we also add a keyword to the message and convert it into a magical or unreadable code.

Suppose I write “Hello”. That would be a code like “YRMS”. This process is called encryption. Your main message here is Plain text & the message after adding Security Code is Cipher text.

- Advertisement -

The basic function of encryption: 

ENCRYPTION and DECRYPTION
ENCRYPTION And DECRYPTION
  1. To find any normal text
  2. Change it to cipher text
  3. Guarantees that if it is in the hands of a dishonest person, he should not be able to read the data.

There are basically three types of encryption. There are basically three basic methods of encryption. Each of them has its own advantages and disadvantages.

1. Hashing

2. Symmetric method

3. Asymmetric method

- Advertisement -

Decryption

Now let’s come to decryption. Here, it is only the reverse of Encryption. That code is converted to the original message and goes to the receiver. That is, the cipher text is converted to plain text. If you can catch the secret of this cipher text, you can claim yourself in as a hacker. 

Encryption and Decryption- Hacker and Data loss
Hacker and Data Loss

Some encryption techniques:

  1. Mono Alphabetic Cipher
  2. Hill Cipher
  3. Playfair Cipher
  4. Cieser Cipher

Check More Articles:

  1. Common Misconceptions about Electricity and its solution
  2. What does mAh mean in a battery? Mystery about mAh marked in a battery
  3. Direction of current flow and electron flow | Why are they opposite to each other?
Md Nazmul Islam
Md Nazmul Islam
An expert in Electrical & Electronics engineering, I combine my academic background with hands-on experience to craft insightful content. Collaborating with the Voltage Lab team and skilled educators, I’m passionate about sharing research-backed knowledge to empower others in the field.

Recent Post