1
Encryption Technologies in Private and Public Sectors
Author’s Name
Department/University
Course number
Course name
Instructor’s Name
, 2
Encryption Technologies in Private and Public Sectors
Introduction to Encryption
The essential cybersecurity procedure known as encryption converts readable plaintext
data into unreadable ciphertext using algorithmic keys. This operation enables the protection of
secret data by maintaining its confidentiality through secure unauthorized access (Stallings,
2017). Three essential terms exist for comprehending encryption:
Symmetric Encryption: Utilizes a single key for both encryption and decryption. The
encryption algorithms known as AES and Blowfish belong among these common examples
which Schneier (2015) mentions.
Asymmetric Encryption: Employs a pair of keys — a public key for encryption and a
private key for decryption. RSA together with ECC represent two widely used examples (Rivest
et al., 1978).
Both encryption methods create results through different mechanics because they use
opposing approaches. An assessment follows to define essential differences and choose
appropriate encryption approaches based on the application. This evaluation integrates the
fundamentals of symmetric and asymmetric encryption devices for application by experts and
beginners in cryptography (Device Authority, 2025).
Hashing: Data hashing produces a fixed-length value to verify integrity which is
extensively used for data confirmation purposes. SHA-256 represents a popular hashing
algorithm that people frequently utilize (Stallings, 2017). The main use of hash tables emerges
from hashing functions. Chosen data pairs in a list organize themselves using hash tables that
enable index-based access. Unlimited keys become table indices following hashing due to the
absence of a limit on key or value pair numbers. The hash value creates an index to locate
, 3
specific data contents held in the structure. The outcome from mathematical hashing algorithms
produces hash values known as hashes. The prevention of key retrieval from hashes depends on
one-way hashing across all good hash functions according to Yazar (2025).
Digital signatures: Asymmetric encryption through digital signatures enables clients to
authenticate data and verify its unmodified state (Singh, 2000). Encryption stands as a critical
element that ensures the privacy of personal information provides communication protection and
guards major infrastructure networks. The absence of encryption will allow attackers to intercept
sensitive information thus compromising privacy causing financial losses and threatening
national security (Schneier, 2015).
Research on Encryption Technologies
1. Advanced Encryption Standard (AES)
Technical Specifications
NIST set AES in 2001 as a symmetric encryption standard after establishing it through
the National Institute of Standards and Technology. AES protects encryption through
substitution-permutation networks and accepts encryption keys of 128, 192, and 256 bits (NIST,
2001). A layer of security develops through the cryptographic procedure which consists of
several substitutions combined with permutations as well as mixing procedures.
Use Cases
The private sector secures financial transactions, and cloud storage and utilizes virtual
private networks (VPNs) with AES. (Schneier, 2015).
The Public Sector employs AES to protect classified information along with military
information systems as well as police databases (Singh, 2000).
Strengths and Weaknesses
Encryption Technologies in Private and Public Sectors
Author’s Name
Department/University
Course number
Course name
Instructor’s Name
, 2
Encryption Technologies in Private and Public Sectors
Introduction to Encryption
The essential cybersecurity procedure known as encryption converts readable plaintext
data into unreadable ciphertext using algorithmic keys. This operation enables the protection of
secret data by maintaining its confidentiality through secure unauthorized access (Stallings,
2017). Three essential terms exist for comprehending encryption:
Symmetric Encryption: Utilizes a single key for both encryption and decryption. The
encryption algorithms known as AES and Blowfish belong among these common examples
which Schneier (2015) mentions.
Asymmetric Encryption: Employs a pair of keys — a public key for encryption and a
private key for decryption. RSA together with ECC represent two widely used examples (Rivest
et al., 1978).
Both encryption methods create results through different mechanics because they use
opposing approaches. An assessment follows to define essential differences and choose
appropriate encryption approaches based on the application. This evaluation integrates the
fundamentals of symmetric and asymmetric encryption devices for application by experts and
beginners in cryptography (Device Authority, 2025).
Hashing: Data hashing produces a fixed-length value to verify integrity which is
extensively used for data confirmation purposes. SHA-256 represents a popular hashing
algorithm that people frequently utilize (Stallings, 2017). The main use of hash tables emerges
from hashing functions. Chosen data pairs in a list organize themselves using hash tables that
enable index-based access. Unlimited keys become table indices following hashing due to the
absence of a limit on key or value pair numbers. The hash value creates an index to locate
, 3
specific data contents held in the structure. The outcome from mathematical hashing algorithms
produces hash values known as hashes. The prevention of key retrieval from hashes depends on
one-way hashing across all good hash functions according to Yazar (2025).
Digital signatures: Asymmetric encryption through digital signatures enables clients to
authenticate data and verify its unmodified state (Singh, 2000). Encryption stands as a critical
element that ensures the privacy of personal information provides communication protection and
guards major infrastructure networks. The absence of encryption will allow attackers to intercept
sensitive information thus compromising privacy causing financial losses and threatening
national security (Schneier, 2015).
Research on Encryption Technologies
1. Advanced Encryption Standard (AES)
Technical Specifications
NIST set AES in 2001 as a symmetric encryption standard after establishing it through
the National Institute of Standards and Technology. AES protects encryption through
substitution-permutation networks and accepts encryption keys of 128, 192, and 256 bits (NIST,
2001). A layer of security develops through the cryptographic procedure which consists of
several substitutions combined with permutations as well as mixing procedures.
Use Cases
The private sector secures financial transactions, and cloud storage and utilizes virtual
private networks (VPNs) with AES. (Schneier, 2015).
The Public Sector employs AES to protect classified information along with military
information systems as well as police databases (Singh, 2000).
Strengths and Weaknesses