What is encryption?

This is a recommends products dialog
Top Suggestions
Starting at
View All >
Language
French
English
ไทย
German
繁體中文
Country
Hi
All
Sign In / Create Account
language Selector,${0} is Selected
Register & Shop at Lenovo Pro
Register at Education Store
Pro Tier Benefits
• Save up to an extra 20% on Think everyday pricing.
• Spend $15K, advance for FREE to Plus Tier with increased benefits.
Plus Tier Benefits
• Save up to an extra 25% on Think everyday pricing.
• Spend $50K, advance for FREE to Elite Tier with increased benefits.
Elite Tier Benefits
• Save up to an extra 30% on Think everyday pricing.
Reseller Benefits
• Access to Lenovo's full product portfolio
• Configure and Purchase at prices better than Lenovo.com
View All Details >
more to reach
PRO Plus
PRO Elite
Congratulations, you have reached Elite Status!
Pro for Business
Delete icon Remove icon Add icon Reload icon
TEMPORARILY UNAVAILABLE
DISCONTINUED
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
Remove
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
of
Contains Add-ons
Subtotal
Proceed to Checkout
Yes
No
Popular Searches
What are you looking for today ?
Trending
Recent Searches
Hamburger Menu


What is encryption?

Encryption is a process that protects your data by converting it into a secret code, making it unreadable to unauthorized individuals. It involves using an encryption algorithm, which is a set of mathematical rules, to transform plain text into cipher text. The cipher text can only be decrypted back into plain text using a special key.

How does encryption work?

When you encrypt data, you use a key to scramble the information into an unreadable form. This key serves as a secret ingredient that only authorized parties possess. Without the key, the encrypted data is practically impossible to decipher. It's like having a secret language that only you and your trusted friends can understand.

Why is encryption important?

Encryption plays a vital role in securing our digital communications and sensitive information. It helps protect your personal data, such as passwords, credit card numbers, and private messages, from being accessed or intercepted by hackers or unauthorized entities. Encryption ensures that even if someone gains access to your data, they won't be able to understand it without the proper decryption key.

What are the different types of encryptions?

There are several types of encryption techniques used in various contexts. Let me explain a few of the most common ones:

  • Symmetric encryption: In symmetric encryption, the same key is used for both encryption and decryption. You and the recipient of the encrypted data share the secret key beforehand. This type of encryption is generally fast and efficient, but it requires securely exchanging the key in advance.
  • Asymmetric encryption: Asymmetric encryption, also known as public-key encryption, uses two different keys: a public key and a private key. You use the recipient's public key to encrypt the data, and only the recipient's corresponding private key can decrypt it. This method eliminates the need to exchange keys in advance, making it more convenient for secure communication.
  • Hash functions: Hash functions are not technically encryption methods but are often used in combination with encryption. A hash function converts data into a fixed-size string of characters, called a hash value or hash code. It's a one-way process, meaning you cannot retrieve the original data from the hash value. Hash functions are commonly used to verify data integrity and securely store passwords.
  • Transport layer security (TLS): TLS is a protocol used to secure online communication, particularly for websites. It combines encryption with authentication, ensuring that your connection with a website is both private and trustworthy. TLS uses asymmetric encryption to establish a secure channel, and symmetric encryption for efficient data transfer.
  • Virtual private networks (VPNs): VPNs provide secure connections over the internet by encrypting your data and routing it through a private network. This encryption protects your online activities from being snooped on by unauthorized parties. VPNs are commonly used to enhance privacy and security while browsing the web or accessing sensitive information remotely.

How does symmetric encryption work?

In symmetric encryption, the same key is used for both encryption and decryption. Here's how it works:

  • You start with your plain text, which is the information you want to encrypt.
  • You choose a secret key, a unique string of characters used in the encryption process.
  • The encryption algorithm takes your plain text and the secret key as input and produces cipher text as output.
  • The cipher text is the scrambled version of your plain text and is unreadable without the secret key.
  • To decrypt the cipher text and retrieve the original plain text, you use the same secret key in the reverse process.
  • Symmetric encryption is generally faster than asymmetric encryption but requires a secure method of sharing the secret key with the intended recipient.

How does asymmetric encryption work?

Asymmetric encryption, or public-key encryption, uses two different keys: a public key and a private key. Here's how it works:

  • You generate a key pair consisting of a public key and a private key. The keys are mathematically related but cannot be derived from each other.
  • You distribute the public key to anyone who wants to send you encrypted messages.
  • When someone wants to send you an encrypted message, they use your public key to encrypt the data.
  • Once the data is encrypted, only your private key can decrypt it. Keep your private key secure and don't share it with anyone.
  • You use your private key to decrypt the message and retrieve the original plain text.
  • Asymmetric encryption allows for secure communication without the need to exchange keys beforehand. It's commonly used for secure email communication, digital signatures, and securing online transactions.

How do hash functions work?

Hash functions are not encryption methods, but they are often used alongside encryption for added security. Here is how they work:

  • A hash function takes an input, which can be any length of data, and processes it through a mathematical algorithm.
  • The output of the hash function is a fixed-size string of characters called a hash value or hash code.
  • The resulting hash value is unique to the input data. Even a small change in the input will produce a significantly different hash value.
  • Hash functions are designed to be one-way, meaning it is computationally infeasible to retrieve the original input data from the hash value.
  • Hash functions are commonly used to verify data integrity. By comparing the hash value of the received data with the expected hash value, you can ensure that the data hasn't been tampered with.

What is the purpose of transport layer security (TLS)?

TLS is a cryptographic protocol that ensures secure communication over networks. Its main purposes are:

  • Encryption: TLS encrypts data transmitted between a client (such as a web browser) and a server. This encryption prevents eavesdropping and unauthorized access to the data during transit.
  • Authentication: TLS provides authentication mechanisms to verify the identity of the server and, optionally, the client. This ensures that you are connecting to the intended server and not an impostor.
  • Data integrity: TLS uses cryptographic algorithms to ensure the integrity of the transmitted data. It detects any modifications or tampering with the data during transmission.

TLS is commonly used to secure web traffic, such as hypertext transfer protocol secure (HTTPS) connections, ensuring that sensitive information, like passwords and credit card details, are protected while being transmitted.

What is a virtual private network (VPN)?

A VPN is a technology that creates a secure and encrypted connection over a public network, such as the internet. It allows you to browse the web or access resources on a private network securely. Here is how it works:

  • When you connect to a VPN, your device establishes a secure tunnel with a VPN server.
  • All the data you transmit and receive between your device and the VPN server is encrypted, making it unreadable to anyone who might intercept it.
  • The VPN server acts as an intermediary between your device and the internet. It relays your encrypted requests to the internet and forwards the responses back to you.
  • By routing your traffic through the VPN server, a VPN can hide your internet protocol (IP) address, making it appear as if you are accessing the internet from a different location.
  • VPNs are commonly used to enhance privacy and security, especially when connecting to public WiFi networks or accessing geographically restricted content. They help protect your online activities from being monitored or intercepted by malicious actors.
{"pageComponentDataId":"e857fdeft7e51-4b61-84dc-bccec6e68e00","pageComponentId":"e857fdeft7e51-4b61-84dc-bccec6e68e00","isAssociatedRelease":"true","pageComponentDataLangCode":"en_au","configData":{"jumpType":"currentTab","headlineColor":"black","displayNumber":"","styleMode":"vertical","miniCardHoMode":"2","headline":"","products":[{"number":{"t_id":"21kccto1wwau5","language":{"en_nz":"21kccto1wwau5","en_au":"21kccto1wwau5","en":""},"id":"Pageb33ce4b8-4839-4ba3-b993-7296d68a91b8"}},{"number":{"t_id":"21mccto1wwau3","language":{"en_nz":"21mccto1wwau3","en_au":"21mccto1wwau3","en":""},"id":"Page1fa61927-074c-4fe0-a8df-5c94362fb75c"}},{"number":{"t_id":"21lkcto1wwau3","language":{"en_nz":"21lkcto1wwau3","en_au":"21lkcto1wwau3","en":""},"id":"Pageca014688-410e-439a-a4c6-bba2ef6d4715"}},{"number":{"t_id":"21g2cto1wwau3","language":{"en_nz":"21g2cto1wwau3","en_au":"21g2cto1wwau3","en":""},"id":"Page79cd32c8-d467-4d68-b955-d273bb24eda7"}}]},"urlPrefix":"AAAAAAAH","title":"glossary-right-blue-boxes-fragment","pageId":"65b55929-de05-417a-a92a-ccb888d329b0","urlEdit":0,"uri":"/FragmentDirectory/glossary/glossary-right-blue-boxes-fragment.frag","pageComponentUuid":"e857fdeft7e51-4b61-84dc-bccec6e68e00"}
coming coming
Starting at
List Price
Web Price
Web Price:
List Price
Web Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Web Price is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Learn More
See More
See Less
View {0} Model
View {0} Models
Part Number:
Features
See More
See Less
compare
Added!
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
Add To Cart
Add To Cart
We're sorry,
Products are temporarily unavailable.
Continue shopping
Learn More
Coming Soon
Featured Product
Top Deals of the Day
Oops! No results found. Visit the categories above to find your product.
Save
open in new tab
© 2024 Lenovo. All rights reserved.
© {year} Lenovo. All rights reserved.
Email address is required
Compare  ()
x