What is encryption?

We are sorry, eCoupon {0} {1} has been fully claimed
We are sorry, eCoupon {0} {1} has been fully claimed. Refresh and try when others quit.
{0} coupons left to claim
Compare
Added!
Build Your PC
View {0} Model
View {0} Models
Configure/Buy
Add To Cart
This Product has recently expired. Please contact your Lenovo Sales Representative to renew this item.
This model is configurable! Click Build Your PC to start configuring.
JOIN MYLENOVO
REWARDS!!
• Earn & redeem rewards
• Engagement rewards
• Member exclusive offers
• Free to Join — Join now!
COMING SOON
New Options Available
AVAILABLE SOON
READY TO SHIP
Price Match Guarantee
/shopping-faq/#payments
off
Save
Lenovo Outlet Price
Your price
List Price
List Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Est Value
Est Value (Estimated Value)
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Est Value:
Exclusive Price:
Starting at
Instant Savings
eCoupon Savings:
Additional Savings
Show Price Breakdown
Configuration Savings
Hide Price Breakdown
Use eCoupon
Includes
Features
Key Details
Part Number
See More
See Less
 
Coming Soon
expanded
collapsed
See More Details
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
One moment please...
Search on Lenovo.com Public Website
& Up
Shipping Options
Update Postal Code
Response Error
Input Format Error
Pts
FREE
Delivery options for {0}
Help Me Decide
Specs Teaser Content
Specs Teaser Link
Learn More
Show details
Hide details
View more details
Includes {qty} items
(Qty: {qty})
read more
Join Now!
OR
*Savings cannot be combined
Ask an Expert
Call our Sales Team at:
Mon-Fri 9am-5:30pm GMT
Save
Pickup Availability near {0}
Update Location
All Eligible Items
Pickup Location for: {0}
{0} Miles Away
In Stock,
Today
Tomorrow
in {0} Days
Ready {0}
Open until {0}
Get Directions
Select This Location
Update
Use My Current Location
or
Enter Zip Code
Cancel
Store Pickup:
Pickup unavailable
Available Today at select {0} locations
Get it today!
Get it tomorrow!
Lenovo and Best Buy have partnered to allow you to pick up Lenovo products at your local Best Buy. Choose a location near you and get it as soon as today!
Choose a pickup location
See all pickup locations
Ready {0}
at {0} {Store Name}
Pickup Availability near {0}
Update Location
All Eligible Items
Pickup Location for: {0}
{0} Miles Away
In Stock,
Today
Tomorrow
in {0} Days
Ready {0}
Open until {0}
Get Directions
Select This Location
update
Use My Current Location
or
Enter Zip Code
Cancel
Store Pickup:
Pickup unavailable
Available Today at select {0} locations
Get it today!
Get it tomorrow!
Lenovo and Best Buy have partnered to allow you to pick up Lenovo products at your local Best Buy. Choose a location near you and get it as soon as today!
Choose a pickup location
See all pickup locations
Ready {0}
at {0} {Store Name}
After eCoupon limit is met, price is {nonEcouponPrice}
After eCoupon limit is met, price is {nonEcouponPrice}
QUANTITY UNAVAILABLE
Expiration Date:
Remaining Units:
My Price:
Hide quote dialog
Sign in or Create an Account
Sign In
Email Address
Password
Not enrolled for rewards? Join Now
By joining, you agree to the Terms & Conditions and you are opting in to receive Lenovo marketing communications via email.
/ca/en/rewards/terms/
Terms of Use
Remember me
Forgot your username or password?
Create an Account
You can store addresses, easily keep track of your orders and save items in your cart for later.
Before you go, create a free account!
Create an Account
You can store addresses, easily keep track of your orders and save items in your cart for later.
The email format is incorrect, please try again
First Name
Maximum length is 50 characters
Last Name
For security purposes, password must contain:
8-20 characters
At least one letter, one number, and one symbol ($!#&)
Confirm Password
I agree to opt-in to Lenovo communications and I understand that my data will not be shared.
Yes, I have read and accepted the Terms of Use and Privacy Policy.
Please agree the terms and privacy policy
By joining, you agree to the Terms & Conditions and you are opting in to receive Lenovo marketing communications via email.
If you would like to earn rewards, you will need to check the join Rewards checkbox above. To create an account without earning Rewards, register below.
Register
The email format is incorrect, please try again.
Must contain 8-20 characters including 1 letter, 1 number and 1 symbol ($!#&)
We’re sorry, there are no locations within {0} miles.
Please update your location or select from available Best Buy locations below that exceed {0} miles.
Please enter a zipcode
Invalid Zip Code, please try again.
Update
Cancel
FPS
Pending_ux
FPS for this system per game
within {Miles} miles
in {Store Name}
TELE DLP Click Here
Best Buy Store,
BEST BUY
Delivery
Delivery Unavailable
No available data
https://cdn.chargeafter.com/promotional-widget/lenovo/widget.min.js
d821ca96777fa248c886baf287ffc725e2d5c9ef
Save to:
My List
Create a List
{0} items
View
Create
Label
You must fill in this field
You currently have no saved lists
Guest List
List name is repetition
{0} item
Only a maximum of 15 lists can be created
Maximum character limit 200
Your wish list capacity is full, please remove lists and/or products to wish for more.
List at maximum, please remove items to wish for more products.
Shop
Compared
Exclusive Loyalty Price
Loyalty Savings
Your session is about to time out
Click Stay Signed In to continue your session that ends in
minutes
seconds
Sign Out
Stay Signed In
Wishlist
Compare ({sum})
LOYALTY DISCOUNT
In Your Cart
In Your Cart & Compare
Compared
Your Price
Delivery
Quick View
View All Details
options
Specs
(WEB EXCLUSIVE)
or
at
Select from
by {startDate}
between {startDate} {endDate}
delivered
Pickup & Delivery Options
CTA link destination cart noncto
Please agree to the terms
Accessorize & Buy
Extended Catalog
Select at least one more product to compare
Build Your PC
This Product has recently expired. Please contact your Lenovo Sales Representative to renew this item.
List Price Website
promotions and special offers are not valid on the site
The website is for business and institutional customers only
Contract pricing has expired. Please contact your Local Lenovo Sales.Rep
Expired
Added To Cart
INFO CENTER
Go to Cart
Continue Shopping
Customers who bought this item also bought
Quantity
Expired
This is a recommends products dialog
Top Suggestions
Starting at
View All >
Language
French
English
ไทย
繁體中文
Hi
Delete icon Remove icon Add icon Reload icon
TEMPORARILY UNAVAILABLE
DISCONTINUED
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
Remove
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
of
Contains Add-ons
Subtotal
Proceed to checkout
Yes
No
Popular Searches
skip to main content
{"backgroundColor":"#e6f4fa","sideMsg":{"t_id":"","language":{"fr_ca":"","en_ca":""},"id":""},"data":[{"bannerInfo":{"t_id":"Pageeb2b08cc-7a21-49fa-af54-dfaa06f3acef","language":{"fr_ca":"","en_ca":"%3Cp%3ESave%20up%20to%20%7BsavingPercent%7D%20off%20during%20our%20End%20of%20Summer%20Clearance.%20%3Ca%20href%3D%22%2Fd%2Fdeals%2Fclearance-sale%2F%3FIPromoID%3DLEN944203%22%20target%3D%22_self%22%20textvalue%3D%22Shop%20Now%20%26gt%3B%22%3E%3Cstrong%3EShop%20Now%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","en":"","fr":""},"id":"Pageeb2b08cc-7a21-49fa-af54-dfaa06f3acef"}},{"bannerInfo":{"t_id":"Pageff475f54-0a01-4de5-b674-11511815de52","language":{"fr_ca":"","en_ca":"%3Cp%3E%3Cstrong%3E%3Cspan%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%22%3E%3C%2Fspan%3E%3C%2Fstrong%3E%3C%2Fp%3E%3Cp%3EEarn%203%25-9%25%20in%20rewards%20and%20access%20to%20exclusive%20member%20perks%20when%20joining%20My%20Lenovo%20Rewards.%3Cstrong%3E%26nbsp%3B%3C%2Fstrong%3E%3Ca%20href%3D%22%2Frewards%2F%3FIPromoID%3DLEN775755%22%20target%3D%22_self%22%20textvalue%3D%22Join%20for%20Free%20%26gt%3B%22%3E%3Cstrong%3EJoin%20for%20Free%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","en":"","fr":""},"id":"Pageff475f54-0a01-4de5-b674-11511815de52"}},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Pageca1c97c1-c8aa-433b-a88f-18eb76c6ae83","language":{"fr_ca":"","en_ca":"%3Cp%3EBusiness%20Financing%20Available.%20Split%20payments%20from%204%20to%2052%20weeks%2C%20options%20as%20low%20as%200%25%20interest.%26nbsp%3B%3Ca%20href%3D%22%2Flandingpage%2Flenovo-financing-options%2F%3FIPromoID%3DLEN771093%22%20target%3D%22_self%22%20textvalue%3D%22See%20Details%26nbsp%3B%26gt%3B%22%3E%3Cstrong%3ESee%20Details%26nbsp%3B%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","en":"","fr":""},"id":"Pageca1c97c1-c8aa-433b-a88f-18eb76c6ae83"},"gInfo":{"t_id":"","language":{},"id":""}},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Page6ab501dc-5d47-4b69-b0a6-5b2f13f691e0","language":{"fr_ca":"","en_ca":"%3Cp%3EFree%20shipping%20sitewide%2C%20no%20minimum.%3C%2Fp%3E","en":"","fr":""},"id":"Page6ab501dc-5d47-4b69-b0a6-5b2f13f691e0"},"gInfo":""}],"autoRun":true}
  • Save up to {savingPercent} off during our End of Summer Clearance. Shop Now >

  • Earn 3%-9% in rewards and access to exclusive member perks when joining My Lenovo Rewards. Join for Free >

  • Business Financing Available. Split payments from 4 to 52 weeks, options as low as 0% interest. See Details >

  • Free shipping sitewide, no minimum.

Want a laptop that has it all?

  • Superior performance where you need it most
  • Communicate confidently with built-in intelligence
  • Nearly 3X faster internet with Intel® Wi-Fi 6/6E (Gig+)1
  • Fast-charging, long-lasting battery

What is encryption?

Encryption is a process that protects your data by converting it into a secret code, making it unreadable to unauthorized individuals. It involves using an encryption algorithm, which is a set of mathematical rules, to transform plain text into cipher text. The cipher text can only be decrypted back into plain text using a special key.

How does encryption work?

When you encrypt data, you use a key to scramble the information into an unreadable form. This key serves as a secret ingredient that only authorized parties possess. Without the key, the encrypted data is practically impossible to decipher. It's like having a secret language that only you and your trusted friends can understand.

Why is encryption important?

Encryption plays a vital role in securing our digital communications and sensitive information. It helps protect your personal data, such as passwords, credit card numbers, and private messages, from being accessed or intercepted by hackers or unauthorized entities. Encryption ensures that even if someone gains access to your data, they won't be able to understand it without the proper decryption key.

What are the different types of encryptions?

There are several types of encryption techniques used in various contexts. Let me explain a few of the most common ones:

  • Symmetric encryption: In symmetric encryption, the same key is used for both encryption and decryption. You and the recipient of the encrypted data share the secret key beforehand. This type of encryption is generally fast and efficient, but it requires securely exchanging the key in advance.
  • Asymmetric encryption: Asymmetric encryption, also known as public-key encryption, uses two different keys: a public key and a private key. You use the recipient's public key to encrypt the data, and only the recipient's corresponding private key can decrypt it. This method eliminates the need to exchange keys in advance, making it more convenient for secure communication.
  • Hash functions: Hash functions are not technically encryption methods but are often used in combination with encryption. A hash function converts data into a fixed-size string of characters, called a hash value or hash code. It's a one-way process, meaning you cannot retrieve the original data from the hash value. Hash functions are commonly used to verify data integrity and securely store passwords.
  • Transport layer security (TLS): TLS is a protocol used to secure online communication, particularly for websites. It combines encryption with authentication, ensuring that your connection with a website is both private and trustworthy. TLS uses asymmetric encryption to establish a secure channel, and symmetric encryption for efficient data transfer.
  • Virtual private networks (VPNs): VPNs provide secure connections over the internet by encrypting your data and routing it through a private network. This encryption protects your online activities from being snooped on by unauthorized parties. VPNs are commonly used to enhance privacy and security while browsing the web or accessing sensitive information remotely.

How does symmetric encryption work?

In symmetric encryption, the same key is used for both encryption and decryption. Here's how it works:

  • You start with your plain text, which is the information you want to encrypt.
  • You choose a secret key, a unique string of characters used in the encryption process.
  • The encryption algorithm takes your plain text and the secret key as input and produces cipher text as output.
  • The cipher text is the scrambled version of your plain text and is unreadable without the secret key.
  • To decrypt the cipher text and retrieve the original plain text, you use the same secret key in the reverse process.
  • Symmetric encryption is generally faster than asymmetric encryption but requires a secure method of sharing the secret key with the intended recipient.

How does asymmetric encryption work?

Asymmetric encryption, or public-key encryption, uses two different keys: a public key and a private key. Here's how it works:

  • You generate a key pair consisting of a public key and a private key. The keys are mathematically related but cannot be derived from each other.
  • You distribute the public key to anyone who wants to send you encrypted messages.
  • When someone wants to send you an encrypted message, they use your public key to encrypt the data.
  • Once the data is encrypted, only your private key can decrypt it. Keep your private key secure and don't share it with anyone.
  • You use your private key to decrypt the message and retrieve the original plain text.
  • Asymmetric encryption allows for secure communication without the need to exchange keys beforehand. It's commonly used for secure email communication, digital signatures, and securing online transactions.

How do hash functions work?

Hash functions are not encryption methods, but they are often used alongside encryption for added security. Here is how they work:

  • A hash function takes an input, which can be any length of data, and processes it through a mathematical algorithm.
  • The output of the hash function is a fixed-size string of characters called a hash value or hash code.
  • The resulting hash value is unique to the input data. Even a small change in the input will produce a significantly different hash value.
  • Hash functions are designed to be one-way, meaning it is computationally infeasible to retrieve the original input data from the hash value.
  • Hash functions are commonly used to verify data integrity. By comparing the hash value of the received data with the expected hash value, you can ensure that the data hasn't been tampered with.

What is the purpose of transport layer security (TLS)?

TLS is a cryptographic protocol that ensures secure communication over networks. Its main purposes are:

  • Encryption: TLS encrypts data transmitted between a client (such as a web browser) and a server. This encryption prevents eavesdropping and unauthorized access to the data during transit.
  • Authentication: TLS provides authentication mechanisms to verify the identity of the server and, optionally, the client. This ensures that you are connecting to the intended server and not an impostor.
  • Data integrity: TLS uses cryptographic algorithms to ensure the integrity of the transmitted data. It detects any modifications or tampering with the data during transmission.

TLS is commonly used to secure web traffic, such as hypertext transfer protocol secure (HTTPS) connections, ensuring that sensitive information, like passwords and credit card details, are protected while being transmitted.

What is a virtual private network (VPN)?

A VPN is a technology that creates a secure and encrypted connection over a public network, such as the internet. It allows you to browse the web or access resources on a private network securely. Here is how it works:

  • When you connect to a VPN, your device establishes a secure tunnel with a VPN server.
  • All the data you transmit and receive between your device and the VPN server is encrypted, making it unreadable to anyone who might intercept it.
  • The VPN server acts as an intermediary between your device and the internet. It relays your encrypted requests to the internet and forwards the responses back to you.
  • By routing your traffic through the VPN server, a VPN can hide your internet protocol (IP) address, making it appear as if you are accessing the internet from a different location.
  • VPNs are commonly used to enhance privacy and security, especially when connecting to public WiFi networks or accessing geographically restricted content. They help protect your online activities from being monitored or intercepted by malicious actors.
open in new tab
Compare  ()
x