Encrypt Files Folders
Encrypt Files Folders with different methods and see how to encrypt files folders and also de-crypt them.
Their many types of encryption types such as:
These are just some of the encryption methods. Description on how they work
The Advanced Encryption Standard (AES) is another block cipher, with a variable encryption key length up to 256 bits. AES has the advantages of being fast and flexible and is particularly well-suited to implementation on small devices. AES has been rigorously tested for many security applications and is approved by Federal Information Processing Standards (FIPS) in the United States.
DES and 3DES
The Data Encryption Standard (DES) was the first encryption standard to be recommended by the National Institute of Standard and Technology (NIST) and uses a 64-bit encryption key. However, DES is now considered an insecure block cipher and has been replaced by the slower, but more secure, 3DES encryption method, which applies the DES encryption method three times and uses a 192-bit encryption key. The longer the encryption key, the more combinations are possible and the stronger the encryption method.
- PGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, PGP uses a faster encryptionalgorithm to encrypt the message and then uses the public key to encrypt the shorter key that was used to encrypt the entire message. Both the encrypted message and the short key are sent to the receiver who first uses the receiver’s private key to decrypt the short key and then uses that key to decrypt the message.
There are more but this give you the idea with the 3 most popular ones.
Three different encryption methods
There are three different basic encryption methods, each with their own advantages (list courtesy of Wisegeek):
Hashing creates a unique, fixed-length signature for a message or data set. Each “hash” is unique to a specific message, so minor changes to that message would be easy to track. Once data is encrypted using hashing, it cannot be reversed or deciphered. Hashing, then, though not technically an encryption method as such, is still useful for proving data hasn’t been tampered with.
- Symmetric methods
Symmetric encryption is also known as private-key cryptography, and is called so because the key used to encrypt and decrypt the message must remain secure, because anyone with access to it can decrypt the data. Using this method, a sender encrypts the data with one key, sends the data (the ciphertext) and then the receiver uses the key to decrypt the data.
- Asymmetric methods
Asymmetric encryption, or public-key cryptography, is different than the previous method because it uses two keys for encryption or decryption (it has the potential to be more secure as such). With this method, a public key is freely available to everyone and is used to encrypt messages, and a different, private key is used by the recipient to decrypt messages.