Skip to content Skip to main navigation Report an accessibility issue
Information Security

What is Encryption?



You’ve probably heard of encryption at some point. Encryption is a key technology in both business and consumer applications. Perhaps you’ve used encryption in messaging applications or your emails without even knowing. So, what is encryption and how does it work?

Encryption is a process used to protect data by converting it into a coded format that can only be read by someone with the correct decryption key. It can take readable text, like your messages or emails, called plaintext and, through the algorithm and encryption key, create an unreadable text format called cipher text.

For example: Hey the party starts at 5! Please bring ice! ->
202fc5d1d86086abc3e9d69c7107fa43

There are two types of encryption:

  • Symmetric Encryption uses the same key for both encryption and decryption. It’s fast and efficient but requires secure key distribution. Examples include AES (Advanced Encryption Standard)
  • Asymmetric Encryption uses a pair of keys—a public key for encryption and a private key for decryption. It’s more secure for key distribution but slower. Examples include RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography).

You may see only one or both types used in your applications.

Encryption offers a few benefits:

  • Data Security: Protects sensitive information from unauthorized access.
  • Privacy: Ensures that personal and confidential data remains private.
  • Integrity: Helps verify that data has not been altered during transmission.

Encryption has many uses in modern communications. If you want to send text messages or even calls and video calls securely, you could use Signal, WhatsApp, Telegram, Threema, and Wire. Email is also a prime application for encryption.

UT offers encryption on email, as seen in Outlook. Learn more about how to encrypt email by following the steps outlined in the OIT Knowledge Base.