We are sorry, eCoupon {0} {1} has been fully claimed
We are sorry, eCoupon {0} {1} has been fully claimed.
{0} coupons left to claim
Build Your PC
View {0} Model
View {0} Models
Add To Basket
This Product has recently expired. Please contact your Lenovo Sales Representative to renew this item.
This model is configurable! Click Build Your PC to start configuring.
• Shop & Get Rewarded
• Redeem & Save
• Member Exclusive Offers
• FREE to Join - Join now!
Coming Soon
New Options Available
Available Soon
Price Match Guarantee
Lenovo Outlet Price
Your price
List Price
List Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Est Value
Est Value (Estimated Value)
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Web Price:
Exclusive Price:
Starting At
Instant Savings:  
eCoupon Savings:  
Additional Savings
Show Price Breakdown
Hide Price Breakdown
Use eCoupon
Key Details
Part Number:
See More
See Less
Coming Soon
See More Details
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
One moment please...
Search on Lenovo.com Public Website
& Up
Shipping Options
Update PostCode
Response Error
Input Format Error
Shipping options for {0}
Specs Text Link
Specs Teaser Content
Specs Teaser Link
Learn More
Show Details
Hide Details
View more details
Includes {qty} item
(qty: {qty})
read more
Join Now!
*Savings cannot be combined
Phone Sales Hours
Monday-Thursday: 8:00AM-6:00PM
Friday: 8:00AM-4:00PM
Pickup Availability near {0}
Update Location
All Eligible Items
Pickup Location for: {0}
{0} Miles Away
In Stock,
in {0} Days
Ready {0}
Open until {0}
Get Directions
Select This Location
Use My Current Location
Enter Zip Code
Store Pickup
Pickup unavailable
Available Today at select {0} locations
Get it today!
Get it tomorrow!
Lenovo and Best Buy have partnered to allow you to pick up Lenovo products at your local Best Buy. Choose a location near you and get it as soon as today!
Choose a pickup location
See all pickup locations
Ready {0}
at {0} {Store Name}
Pickup Availability near {0}
Update Location
All Eligible Items
Pickup Location for: {0}
{0} Miles Away
In Stock,
in {0} Days
Ready {0}
Open until {0}
Get Directions
Select This Location
Use My Current Location
Enter Zip Code
Store Pickup
Pickup unavailable
Available Today at select {0} locations
Get it today!
Get it tomorrow!
Lenovo and Best Buy have partnered to allow you to pick up Lenovo products at your local Best Buy. Choose a location near you and get it as soon as today!
Choose a pickup location
See all pickup locations
Ready {0}
at {0} {Store Name}
After eCoupon limit is met, price is {nonEcouponPrice}
After eCoupon limit is met, price is {nonEcouponPrice}
Expiration Date:
Remaining Units:
My Price:
Hide quote dialog
Sign in or Create an Account
Sign In
Email Address
Not enrolled for Rewards? Join Now
By joining, you agree to the
Terms & Conditions
Remember me
Forgot your username or password?
Create an Account
You can store addresses, easily keep track of your orders and save items in your basket for later.
Create an Account to Save Your Basket
Create an Account
You can store addresses, easily keep track of your orders and save items in your basket for later.
The email format is incorrect, please try again
First Name
Maximum length is 50 characters
Last Name
Password must have at least
8-20 characters
Include three of the following: letters, numbers, and symbols($!#&)
Confirm Password
I agree to opt-in to Lenovo communications and I understand that my data will not be shared.
Yes, I have read and accepted the Terms of Use and Privacy Policy.
Please agree the terms and privacy policy
By joining, you agree to the Terms & Conditions.
If you would like to earn Rewards, you will need to check the join Rewards checkbox above. To create an account without earning Rewards, register below.
Sorry, the Email you entered is incorrect
Sorry, the password you entered is incorrect
We’re sorry, there are no locations within {0} miles.
Please update your location or select from available Best Buy locations below that exceed {0} miles.
Please enter a zipcode
Invalid Zip Code, please try again.
FPS for this system per game
within {Miles} miles
in {Store Name}
TELE DLP Click Here
Best Buy Store,
Delivery Unavailable
No available data
Save to:
My List
Create a List
{0} items
You must fill in this field
You currently have no saved lists
Guest List
List name is repetition
{0} item
Only a maximum of 15 lists can be created
Maximum character limit 200
Your wish list capacity is full, please remove lists and/or products to wish for more.
List at maximum, please remove items to wish for more products.

The prices quoted for a particular make and model of device are for genuine, fully working devices with acceptable cosmetic conditions and operating performance regardless of age.

Your device Estimated
trade-in value

Information is provided by our partner Envirofone and it is not a contractual offer.       Get Your Quote

Click here to find more products >>

You're leaving Lenovo.com

Exclusive Loyalty Price
Loyalty Savings
Your session is about to time out
Would you like to stay signed in?
Sign Out
Stay Signed In
Compare ({sum})
In your cart
In Your Cart & Compared
Your Price
Quick View
View All Details
Tech Specs
Select from
by {startDate}
between {startDate} {endDate}

What is Encryption?

This is a recommends products dialog
Top Suggestions
Starting At
View All >
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Basket!
Sign in or Create an Account to Join Rewards
View Basket
Your basket is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
There's something wrong with your basket, please go to basket to view the detail.
Contains Add-ons
Proceed to checkout
Popular Searches
skip to main content

Want a laptop that has it all?

  • Superior performance where you need it most
  • Communicate confidently with built-in intelligence
  • Nearly 3X faster internet with Intel® Wi-Fi 6/6E (Gig+)1
  • Fast-charging, long-lasting battery

What is Encryption?

Encryption is a method of protecting data and information, making it unreadable without a key. It uses algorithms to encode the data so that it can only be accessed and understood by the intended users. This technology has become increasingly important in recent years as the internet has become a major part of our lives and the popularity of online banking, shopping, and communication has grown. Encryption can be used to protect email messages, credit card numbers, web browsing activity, corporate networks, and more when transmitted over the internet or stored on a hard drive. It also helps protect against malware, viruses, phishing attacks, identity theft, and other cybercrimes.

What are some common forms of encryption?

The two main types of encryptions are symmetric-key encryption (also known as private-key or secret-key) and public-key encryption (also known as asymmetric encryption). Symmetric-key encryption uses a single key for both encryption and decryption; this key must remain private to ensure security. Public-key encryption uses two keys – one for encrypting information, which is shared publicly with anyone who needs it via their digital certificate or ID; and one for decrypting information sent back to them – which must remain private. Another form of encryption algorithm is called hashing, which converts input into an unintelligible string that cannot be reversed but can still be used to verify authenticity or integrity of data.

How does encryption work?

Encryption works by scrambling data using an algorithm known as an "encoder" that transforms plaintext into ciphertext (a series of random characters). To decode the ciphertext again requires a "decoder", which takes this encrypted message back into readable text form using another algorithm with the same set of decryption rules applied in reverse order. This process makes sure that only authorized parties can read the original message since only they possess the necessary decoder from which to decipher it correctly.

What are common uses for encryption?

Encryption plays an important role in keeping us safe online as it provides protection against cybercriminals who could steal our sensitive data such as passwords or banking details without us even knowing about it. It also has other uses such as securing Wi-Fi networks, protecting downloads over peer-to-peer networks, encrypting emails and website traffic so communications remain private and ensuring online payments are secure within eCommerce stores where customers enter their personal and financial details during checkout processes. Additionally, some governments require all communications between citizens within their borders must be encrypted for privacy reasons.

What are some benefits of using encryption?

One major advantage of encrypting data is improving its security by ensuring that only those with access to secret keys will have access to its contents. With strong encryption protocols in place, unauthorized users won’t even know what type of data is being protected let alone how it’s encoded and secure from malicious actors such as hackers and identity thieves. Additionally, if any portion of the encrypted message was intercepted before reaching its intended destination, there would still be no value because they wouldn't have the appropriate key needed to decrypt it. A second benefit is added privacy over any sensitive communications since only the holders of the respective keys (such as sender/recipient) will be able to view the contents without interference from third parties outside of this secure exchange.

What kind of coding languages should I use when encrypting my code?

The most popular language for implementing cryptography is C++ since it provides functions for complex arithmetic operations like exponentiation (used in RSA), working with large integers (used in Diffie–Hellman Key Exchange), hash functions (SHA256 and SHA512), etc., all while maintaining good performance even on low powered devices like embedded systems or mobile phones. Other languages like Java also provide libraries for cryptographic operations but may not perform efficiently compared with C++ implementations due to high memory consumption requirements for garbage collection routines triggered when dealing with large numbers during calculations involved in common operations such as DHKE or RSA encoding/decoding processes. In addition, Python has become increasingly popular among developers due to its ease off learning curve combined with powerful libraries making it perfect choice for rapidly prototyping applications containing cryptographic components including password hashing algorithms like bcrypt and scrypt among others.

What type of encryption should I use?

The type of encryption protocol that you select to protect your data and information will depend on several factors. For instance, if speed is an important requirement, then a symmetric-key algorithm might be more suitable as it allows for high performance access and decryption settings for applications where real-time decoding is necessary such as streaming media or VoIP. Asymmetric-key algorithms such as RSA (Rivest–Shamir–Adleman) however are better suited for tasks involving higher security standards; though slower in performance, this technology offers much greater protection due to its two distinct keys for encrypting and decrypting messages that prevents someone else from intercepting them before they reach their destination. Additionally, the hashing algorithm can be utilized when the main concern is verifying the integrity of data rather than hiding its content; this method is especially well suited in situations where encrypted data needs to be quickly checked against versions stored elsewhere.

What is the difference between encrypting and hashing?

The main difference between encryption and hashing lies in the purpose of their usage; while encryption is used to make data unreadable by unauthorized users while allowing authorized parties to decode it, hashing is mainly used for verifying its integrity. With encryption, a key need to be kept private and secure so that sensitive information can be protected underneath it; with hashing however, the output produced is related only to the data it was created from, meaning that no secret key is necessary. In other words, encryption provides confidentiality while hashing provides assurance that a file has not been modified or tampered with since its creation. Additionally, because hash-based technology relies on irreversible algorithms which scramble data in an unpredictable manner, hashes are also used as a way to 'mask' credentials when storing them in a database (such as salted-hashing).

Why should I use encryption?

It's important to keep your data safe and secure, so if you're sending sensitive information such as credit card numbers, bank accounts details, passwords or confidential records over the internet then you should use encryption. This makes sure that any malicious third party cannot intercept this private information and use it for their own gain. It also prevents anyone reading your emails or instant messages from being able to see the plain text contents - all they will see is an unintelligible encrypted string of code instead.

What steps should I take to ensure my data is fully encrypted?

When protecting your confidential data with encryption it is important to take certain steps in order ensure its safety. Firstly, you should choose a reliable encryption algorithm such as AES, RSA or ElGamal - all of which provide strong security measures and are accepted by governmental regulations and standards authorities worldwide. Secondly you should use long passwords when selecting your encryption keys, ensuring they contain random characters as this will make them more difficult to guess. Finally make sure you back up any files that are encrypted in case something goes wrong with the original file or if you lose access to your decryption keys.

open in new tab
Compare  ()