**Encryption** is required for **information security in digital data communication and storage networks**. Encryption programs use encryption algorithms (complex mathematical processes) **to encrypt and decrypt the data**. *Encryption algorithm* creates specific strings of data used for encryption – keys that consist of long strings of bits or binary numbers. The more bits in the key, the more the number of possible combinations of binary numbers that makes the code more difficult to break. Then encryption algorithm scrambles data by combining the bits in the key with the data bits.

**Encryption algorithms** are two types, symmetric encryption and asymmetric encryption. In symmetric encryption, the same key is used to scramble (encrypt) and unscramble (decrypt) data. In asymmetric key encryption, two different keys are required – one for encryption and one for decryption.

Applications of *data encryption algorithms* include credit cards, laptop data security, computer passwords, computer network security solutions & software systems, and online/internet data security in electronic commerce.

## Types of Encryption Algorithms

### Symmetric Encryption Algorithms

Symmetric Encryption (also known as symmetric-key encryption, single-key encryption, one-key encryption and private key encryption) is a type of encryption where the same secret key is used to encrypt and decrypt information or there is a simple transform between the two keys. Symmetric encryption algorithms (Symmetric-key algorithms) use the same key for encryption and decryption. There are two types of symmetric encryption algorithms: Stream algorithms (Stream ciphers – that encrypts 1 bit at a time) and Block algorithms (Block ciphers – that encrypts 1 block of 16/32/64/128/256-bits data at a time).

### Asymmetric Encryption Algorithms

Asymmetric encryption uses different keys for encryption and decryption. The decryption key is very hard to derive from the encryption key. The encryption key is public so that anyone can encrypt a message. However, the decryption key is private, so that only the receiver is able to decrypt the message. It is common to set up “key-pairs” within a network so that each user has a public and private key. The public key is made available to everyone so that they can send messages, but the private key is only made available to the person it belongs to.

## List of Encryption Algorithms

### Symmetric Encryption Algorithms (Secret key)

- AES Encryption Algorithm
- Blowfish Encryption Algorithm
- CAST5 Encryption Algorithm
- DES Encryption Algorithm
- IDEA Encryption Algorithm
- RC2 Encryption Algorithm
- RC4 Encryption Algorithm
- RC6 Encryption Algorithm
- Serpent Encryption Algorithm
- Triple DES Encryption Algorithm
- Twofish Encryption Algorithm
- MARS Encryption Algorithm

### Asymmetric Encryption algorithms (Public key)

- RSA Encryption Algorithm
- Diffie-Hellman Encryption Algorithm
- Digital Signature Algorithm (DSA) Encryption Algorithm
- ElGamal Encryption Algorithm
- ECDSA Encryption Algorithm
- PGP (Pretty Good Privacy) Encryption Algorithm
- Elliptic curve cryptosystems Encryption Algorithm
- LUC public key cryptosystem Encryption Algorithm
- XTR Encryption Algorithm

### Relevant Technical Articles:

**Asymmetric Encryption Algorithms :-**Asymmetric encryption algorithms employ a pair of keys, one is a public key and the...**Cryptographic Hash Functions – Data Encryption Algorithms :-**Cryptographic Hash function is a complex encryption algorithm used in cryptography and it refers to...**Symmetric Key Encryption Algorithms :-**Symmetric key encryption uses same key, called secret key, for both encryption and decryption. Users...**Cryptography Algorithms for Data Encryption/Decryption and Information Scrambling/Descrambling :-**Cryptography is the practice and study of hiding secret information by encryption. Encryption is the...**Cryptography Projects for Data Encryption Security :-**Cryptography is the security practice of Data Encryption for hiding secret information. Encryption is the...**3-Way Algorithm for Encryption & Decryption – Cryptography & Data Security :-**Cryptography consists of Block Ciphers. One of such block cipher algorithm is the 3-Way Algorithm....**Cryptography: Encryption & Decryption Algorithms Applications & Advantages :-**Cryptography (or cryptology) is the practice and study of hiding secret information by encryption. Encryption...**ARIA Algorithm for Encryption & Decryption – Cryptography & Data Security :-**ARIA is a general-purpose block cipher algorithm developed by Korean cryptographers in 2003.ARIA is an...**Public Key Cryptographic System :-**Public key cryptographic system consists of two separate keys, one to lock or encrypt the...**Data Encryption Standard – DES Encryption Algorithm :-**Data Encryption Standard (DES) or DES Encryption Algorithm is a technique by which a message...