Ciphers transform plaintext into ciphertext using keys to prevent unauthorized access.
Types of ciphers
- Symmetric: Same key for encryption/decryption (AES, DES, 3DES).
- Asymmetric: Public key encrypts, private key decrypts (RSA, ECC).
- Stream: Encrypt data bit-by-bit or byte-by-byte (RC4, ChaCha20).
- Block: Encrypt fixed-size blocks (AES, Blowfish).
Modern algorithms
- AES-256: Current standard for symmetric encryption.
- RSA-2048/4096: Widely used for asymmetric encryption.
- ChaCha20-Poly1305: Fast stream cipher with authentication.
- ECC: Efficient public-key cryptography.
Deprecated/insecure
- DES: 56-bit key, crackable.
- MD5, SHA-1: Collision attacks possible.
- RC4: Biases in output stream.
- ROT13, XOR (simple): Not cryptographically secure.
Key concepts
- Key length: Longer keys = stronger encryption.
- Mode of operation: CBC, GCM, CTR (for block ciphers).
- Initialization vector (IV): Randomizes encryption.
Related Articles
View all articlesPEM vs PFX: Certificate Format Differences Explained
Learn the crucial differences between PEM and PFX certificate formats, when to use each, and how to convert between them for different server environments and platforms.
Read article →FedRAMP Authorization Guide: Cloud Security for Federal Government Compliance
Complete guide to FedRAMP authorization for cloud service providers. Learn impact levels, JAB vs Agency authorization paths, 3PAO assessment, continuous monitoring requirements, and documentation essentials with practical timelines and costs.
Read article →PCI DSS Compliance Validation Workflow
Complete guide to PCI DSS 4.0.1 compliance validation from merchant classification through SAQ completion. Covers cardholder data environment mapping, network segmentation, encryption validation, vulnerability scanning, and policy implementation.
Read article →What is ROT13 and How Does It Differ from Other Ciphers?
Explore the history and mechanics of ROT13 cipher, its relationship to the Caesar cipher, and why this ancient encryption method is still used today despite offering no real security.
Read article →Explore More Cryptography
View all termsCaesar Cipher (ROT13)
A simple substitution cipher that shifts letters by a fixed number of positions in the alphabet.
Read more →Cryptographic Hash Function
A one-way mathematical algorithm that converts data into a fixed-size string, used for integrity verification and password storage.
Read more →Encryption
The process of converting readable data (plaintext) into an unreadable format (ciphertext) using mathematical algorithms, protecting confidentiality.
Read more →Entropy (Cryptographic)
A measure of randomness or unpredictability in data, critical for generating secure cryptographic keys, passwords, and tokens that resist guessing attacks.
Read more →mTLS (Mutual TLS)
A security protocol where both client and server authenticate each other using X.509 certificates, providing bidirectional identity verification beyond standard TLS.
Read more →TLS/SSL (Transport Layer Security / Secure Sockets Layer)
Cryptographic protocols that provide secure communication over networks by encrypting data in transit.
Read more →