What Is Encryption and How Does It Work?

Written by Coursera Staff • Updated on

Learn about types of encryption, the different methods of asymmetric and symmetric encryption algorithms used to protect data, and how they work.

[Featured Image] A college student uses different types of encryption on a laptop in a library.

Securing sensitive information is important because of the increasing number of cyber threats. Encryption uses mathematical algorithms that require a decryption key to gain access to data and safeguard it from cyber threats such as a data breach. 

In some circumstances, it is legally required to protect people's sensitive information. For example, the Health Insurance Portability and Accountability Act (HIPAA) requires health care providers to use security features to protect patients’ personal information. Similar regulations exist for academic institutions, with the Family Education Rights and Privacy Act protecting student records. These regulations ensure that safeguarding your personal information is standard practice. 

Read on to learn about encryption, how it is used, and different careers that use it. 

Read more: Cybersecurity Terms: A to Z Glossary

What is encryption?

Encryption is the process of turning unencrypted plaintext into encrypted code, often called ciphertext, which requires a decryption key to make it readable. The two main encryption methods are asymmetric and symmetric encryption, which we’ll explain further in the next section. 

Data can be susceptible to cyber threats when stored on a computer or while being transmitted, but in both cases encrypted data can help mitigate the risk of unauthorized users accessing your information. The primary method used when attacking encrypted data is the brute force method, where attackers attempt to systematically guess the decryption key by trying each potential option. Using longer and more complex encryption keys can make this process highly challenging to attackers.

Read more: Data Encryption Standard: Concept and Modes of Operations

How does encryption work?

Mathematical algorithms are typically responsible for turning plaintext into ciphertext and creating a decryption key. The higher the number of keys used, the more secure your data is. The two methods for common encryption algorithms are asymmetric and symmetric. 

  • Asymmetric encryption requires two non-identical keys: a private key and a public key. The person sending the data has it encrypted using a public key, while the person on the receiving end can decrypt the data with the private key. Although this process is slower than symmetric encryption, less risk is involved since no private key exchange occurs. 

  • Symmetric encryption uses the same singular key to encrypt and decrypt information. Before encrypted data is sent, both the sender and receiver must have access to the decryption key to translate text between plaintext and ciphertext. The simplicity of having a single private key allows symmetric encryption to happen fast, making it easier to manage large amounts of data.

Three common types of encryption algorithms

The types of algorithms used in encryption determine its features and strength and allow for the conversion between ciphertext and plaintext. Here’s a breakdown of some common types of encryption algorithms you may have seen or can implement:

Read more: What Is an Advanced Persistent Threat?

1. Triple Data Encryption Standard (3DES)

Triple DES is a symmetric encryption method that uses three different individual keys to build upon its predecessor, the DES algorithm, which only implemented the algorithm once. Because it uses the algorithm three times, Triple DES more effectively protects the decryption key. However, it is still not as secure as other methods, so the US National Institute of Standards and Technology no longer allows it as of 2023. 

2. Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) is another popular symmetric encryption method. AES is extremely difficult to attack, as its only potential weakness is brute force attacks, which lead to its use by the US government. AES relies on the substitution permutation network (SPN) algorithm to implement multiple rounds of encryption, where it receives the plaintext and takes it through alternating layers to produce the ciphertext. Requiring less memory and offering increased strength compared to other methods, AES is an effective and efficient way to encrypt data.

3. Rivest-Shamir-Adleman (RSA)

Unlike Triple DES and AES, RSA is an asymmetric encryption algorithm with both a public and private key. This creates large volumes of uninterpretable text, requiring attackers to use significant time and resources when attempting to access this type of encrypted data. The size of the decryption key is a critical factor in how susceptible the key is to attacks.

Other types of encryption to know about

As technology grows and adapts, so do encryption methods. For example, Blowfish is an algorithm designed as a replacement for DES. It splits ciphertext into blocks and encrypts each one. 

Blowfish is both fast and effective, especially against brute force attacks, but it has been improved even further with the creation of Twofish. Twofish is a symmetric encryption algorithm available for hardware and software components.

Placeholder

Careers in encryption

You can pursue a career as a cryptographer, which involves building and solving encryption code. Cryptographers work to find weaknesses in encryption systems that hackers can potentially exploit and develop better strategies to keep encrypted data safe. 

The typical education requirements for cryptographers include a bachelor’s degree in information technology, computer science, mathematics, or cybersecurity. However, some organizations also require a master’s degree in cryptography, cybersecurity, or a related field. 

Need more practice? On Coursera, you can develop your information technology skills by completing a Google IT Automation with Python Professional Certificate. This course covers in-demand IT skills, including Python and Git, to take your career to the next level. 

Placeholder

Salary and related roles

According to the US Bureau of Labor Statistics (BLS), the demand for information security analysts, including cryptographers, is increasing, with a 33 percent jump in job growth predicted between 2023 and 2033. In 2023, information security analysts made a median salary of $120,360 [1]. Other related job titles include:

Common industries employing cryptographers include finance, tech, health care, and government organizations.

Read more: What Is a Cryptographer? Career Guide

Next steps in cybersecurity

Encryption helps protect sensitive information from cyber attacks and is a key component in cybersecurity. If you’re interested in starting a career in this field, consider the Google Cybersecurity Professional Certificate on Coursera. This program is designed ​​to help individuals with no previous experience find their first job in the field of cybersecurity, all at their own pace. The courses cover topics such as security models, tools that are used to access and address threats, networks, and more.

Article sources

  1. US Bureau of Labor Statistics. “Information Security Analysts, https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.” Accessed December 5, 2024.

Keep reading

Updated on
Written by:

Editorial Team

Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...

This content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.