Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Welcome to the Data Encryption Library Guide
|Encryption is the process by which data is scrambled, and only certain individuals can unlock and access it. Depending on the type of data, different cryptographic techniques are required to effectively encrypt the data.
- Data at rest: Commonly consist of information residing on your hard drive. It is data that is not being moved or transmitted across a network. Examples might be a text document, spreadsheet, image, etc.
- Data in motion: Data that is being sent across the network. Examples include email, text messages, Skype chat, etc.
- Symmetric: This is when you encrypt data and create one key (think of it as a password) that anybody who knows can use to decrypt the data. The security risk lies in the key and its transmission. If just one person gives away the key, the data is compromised. For example, a hard drive that everyone in a lab must access that uses one general key to decrypt.
- Asymmetric: Allows you to securely communicate with an individual without having to worry about third parties intercepting the message or the secret/key which decrypts the message (because it is never transmitted). You assign a unique key to an individual and only they can decrypt it if their own key, used in conjunction with the one sent, correctly identifies them. The security risk here rests on the identities of the parties, creating what is known as a "web of trust".
The tools for securely encrypting data depend on the type of data and the individuals who need access.
Except where otherwise indicated, original content in this guide is licensed under a Creative Commons Attribution (CC BY) 4.0 license. You are free to share, adopt, or adapt the materials. We encourage broad adoption of these materials for teaching and other professional development purposes, and invite you to customize them for your own needs.