A-Z Popular Blog Security Search »
Information Security
Related Guides
Key Concepts

7 Examples of Encryption

 , updated on
Encryption is the conversion of information into an cryptographic encoding that can't be read without a key. Encrypted data looks meaningless and is extremely difficult for unauthorized parties to decrypt without the correct key. The following are common examples of encryption.


Communication links such as a connection between a website and a browser are commonly encrypted using a standard known as SSL (Secure Sockets Layer). Messages between a website and a browser may traverse vast physical distances and pass through many machines on the way. Encryption is intended to prevent anyone between the sender and receiver from accessing the data being sent.

Digital Certificates

Digital certificates are a means of confirming the identity of information services. An organization publishes its company name and a public key in a digital certificate issued by a certificate authority. If you encrypt a message with that public key, only the organization listed in the certificate should be able to decrypt that message with its corresponding private key. This is used to verify the identity of web sites by sending them a secret code encrypted with a public key from a certificate and testing if they are able to decrypt the message and send the secret code back to you.


Encryption based technologies such as digital certificates are commonly used to document proof that a transaction occurred and was authorized by a particular individual or company. This is known as non-repudiation. For example, if a customer presents a smart card and a password when they purchase something it is difficult for them to claim they didn't make the purchase.


Encryption is widely used in authentication protocols to test the identity of a smart card, device or information service. This is typically based on public key cryptography whereby a secret is encrypted with a public key to confirm that an entity is in possession of the corresponding private key.


A filesystem such as a hard drive in a laptop may be encrypted such that a password is required to access data.


Devices such as mobile phones may be designed to use encrypted data storage by default.


A single file can be encrypted. This can be done in addition to file system encryption. For example, a password management application will may encrypt its data with a master password.
Overview: Encryption
Conversion of information into an cryptographic encoding
Related Concepts


This is the complete list of articles we have written about encryption.
Key Stretching
Private Key
Random Seed
Public Key
Public Key Encryption
Strong Password
Symmetric Encryption
More ...
If you enjoyed this page, please consider bookmarking Simplicable.

Encryption Examples

A definition of encryption with examples.

Random Seed

The definition of random seed with examples.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map