What is encryption?

Welcome Delta Sigma Pi

  • Accessibility
  • Sales:

    Home:

    1-800-426-7235

    Business:

    1-866-426-0911

    Chat Now >

    Visit Sales Support Page >


    Order Support:

    Order Lookup >

    Visit Order Support Page >

    Technical Support >

Lenovo
All
  • All
  • Laptops
  • Desktops
  • Workstations
  • Monitors
  • PC Accessories & Electronics
  • Tablets
  • Servers & Storage
  • Servers Accessories
  • Sign In / Create Account
    My Lenovo Account
    Keep track of your wishlist, orders, and rewards all in one place
    Sign In / Create Account
    Welcome Back!
    Access your order, subscriptions, saved carts, rewards balance, and profile
    View My Account
    Orders
    View & track your orders
    Rewards
    Earn & redeem Rewards
    Profile
    Edit name, password, and account settings
    Wishlist
    Manage a wishlist of your favorite products
    Products
    Manage your devices, accessories
    Product Registration
    Register your product and/or update your warranty dates
    Sign Out
  • My Lenovo Rewards
  • Cart
  • Products
  • Solutions
  • Services
  • Support
  • About Lenovo
  • Deals
  • Student
  • Gaming
  • Laptops
  • Desktops
  • Workstations
  • Accessories
  • Software
  • Monitors
  • Tablets
  • Servers & Storage
  • Home & Office
  • AI
  • Deals
TEMPORARILY UNAVAILABLE
DISCONTINUED
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Remove
Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
of
Contains Add-ons
Subtotal
Proceed to Checkout
Yes
No
Popular Searches
What are you looking for today ?
Trending
Recent Searches
Items
All
Cancel
Top Suggestions
View All >
Starting at
  • Black Friday in July! Limited-time Doorbusters + Buy more, Save more!  Shop Now >

  • My Lenovo Rewards! Earn 3%-9% in rewards and get free expedited delivery on select products. Join for Free >

  • Buy online, pick up select products at Best Buy. Shop Pick Up >

  • Lease-to-own today with Katapult. Get started with an initial lease payment as low as $1! * Learn More >

Home > Glossary > What is encryption?
Glossary Hero
Learn More
StarStar

Annual Sale

Lenovo Laptop SaleLenovo Laptop Sale

Laptop Deals

Desktop DealsDesktop Deals

Desktop Deals

Workstation DealsWorkstation Deals

Workstation Deals

StoreStore

Pick Up Today at Best Buy

ControllerController

Gaming PC & Accessory Deals

MouseMouse

PC Accessories & Electronics Deals

MonitorMonitor

Monitor Deals

Tablet and phoneTablet and phone

Tablets & Phones Deals

ServerServer

Server & Storage Deals

Discount tagDiscount tag

Clearance Sale


What is encryption?

Encryption is a process that protects your data by converting it into a secret code, making it unreadable to unauthorized individuals. It involves using an encryption algorithm, which is a set of mathematical rules, to transform plain text into cipher text. The cipher text can only be decrypted back into plain text using a special key.

How does encryption work?

When you encrypt data, you use a key to scramble the information into an unreadable form. This key serves as a secret ingredient that only authorized parties possess. Without the key, the encrypted data is practically impossible to decipher. It's like having a secret language that only you and your trusted friends can understand.

Why is encryption important?

Encryption plays a vital role in securing our digital communications and sensitive information. It helps protect your personal data, such as passwords, credit card numbers, and private messages, from being accessed or intercepted by hackers or unauthorized entities. Encryption ensures that even if someone gains access to your data, they won't be able to understand it without the proper decryption key.

What are the different types of encryptions?

There are several types of encryption techniques used in various contexts. Let me explain a few of the most common ones:

  • Symmetric encryption: In symmetric encryption, the same key is used for both encryption and decryption. You and the recipient of the encrypted data share the secret key beforehand. This type of encryption is generally fast and efficient, but it requires securely exchanging the key in advance.
  • Asymmetric encryption: Asymmetric encryption, also known as public-key encryption, uses two different keys: a public key and a private key. You use the recipient's public key to encrypt the data, and only the recipient's corresponding private key can decrypt it. This method eliminates the need to exchange keys in advance, making it more convenient for secure communication.
  • Hash functions: Hash functions are not technically encryption methods but are often used in combination with encryption. A hash function converts data into a fixed-size string of characters, called a hash value or hash code. It's a one-way process, meaning you cannot retrieve the original data from the hash value. Hash functions are commonly used to verify data integrity and securely store passwords.
  • Transport layer security (TLS): TLS is a protocol used to secure online communication, particularly for websites. It combines encryption with authentication, ensuring that your connection with a website is both private and trustworthy. TLS uses asymmetric encryption to establish a secure channel, and symmetric encryption for efficient data transfer.
  • Virtual private networks (VPNs): VPNs provide secure connections over the internet by encrypting your data and routing it through a private network. This encryption protects your online activities from being snooped on by unauthorized parties. VPNs are commonly used to enhance privacy and security while browsing the web or accessing sensitive information remotely.

How does symmetric encryption work?

In symmetric encryption, the same key is used for both encryption and decryption. Here's how it works:

  • You start with your plain text, which is the information you want to encrypt.
  • You choose a secret key, a unique string of characters used in the encryption process.
  • The encryption algorithm takes your plain text and the secret key as input and produces cipher text as output.
  • The cipher text is the scrambled version of your plain text and is unreadable without the secret key.
  • To decrypt the cipher text and retrieve the original plain text, you use the same secret key in the reverse process.
  • Symmetric encryption is generally faster than asymmetric encryption but requires a secure method of sharing the secret key with the intended recipient.

How does asymmetric encryption work?

Asymmetric encryption, or public-key encryption, uses two different keys: a public key and a private key. Here's how it works:

  • You generate a key pair consisting of a public key and a private key. The keys are mathematically related but cannot be derived from each other.
  • You distribute the public key to anyone who wants to send you encrypted messages.
  • When someone wants to send you an encrypted message, they use your public key to encrypt the data.
  • Once the data is encrypted, only your private key can decrypt it. Keep your private key secure and don't share it with anyone.
  • You use your private key to decrypt the message and retrieve the original plain text.
  • Asymmetric encryption allows for secure communication without the need to exchange keys beforehand. It's commonly used for secure email communication, digital signatures, and securing online transactions.

How do hash functions work?

Hash functions are not encryption methods, but they are often used alongside encryption for added security. Here is how they work:

  • A hash function takes an input, which can be any length of data, and processes it through a mathematical algorithm.
  • The output of the hash function is a fixed-size string of characters called a hash value or hash code.
  • The resulting hash value is unique to the input data. Even a small change in the input will produce a significantly different hash value.
  • Hash functions are designed to be one-way, meaning it is computationally infeasible to retrieve the original input data from the hash value.
  • Hash functions are commonly used to verify data integrity. By comparing the hash value of the received data with the expected hash value, you can ensure that the data hasn't been tampered with.

What is the purpose of transport layer security (TLS)?

TLS is a cryptographic protocol that ensures secure communication over networks. Its main purposes are:

  • Encryption: TLS encrypts data transmitted between a client (such as a web browser) and a server. This encryption prevents eavesdropping and unauthorized access to the data during transit.
  • Authentication: TLS provides authentication mechanisms to verify the identity of the server and, optionally, the client. This ensures that you are connecting to the intended server and not an impostor.
  • Data integrity: TLS uses cryptographic algorithms to ensure the integrity of the transmitted data. It detects any modifications or tampering with the data during transmission.

TLS is commonly used to secure web traffic, such as hypertext transfer protocol secure (HTTPS) connections, ensuring that sensitive information, like passwords and credit card details, are protected while being transmitted.

What is a virtual private network (VPN)?

A VPN is a technology that creates a secure and encrypted connection over a public network, such as the internet. It allows you to browse the web or access resources on a private network securely. Here is how it works:

  • When you connect to a VPN, your device establishes a secure tunnel with a VPN server.
  • All the data you transmit and receive between your device and the VPN server is encrypted, making it unreadable to anyone who might intercept it.
  • The VPN server acts as an intermediary between your device and the internet. It relays your encrypted requests to the internet and forwards the responses back to you.
  • By routing your traffic through the VPN server, a VPN can hide your internet protocol (IP) address, making it appear as if you are accessing the internet from a different location.
  • VPNs are commonly used to enhance privacy and security, especially when connecting to public WiFi networks or accessing geographically restricted content. They help protect your online activities from being monitored or intercepted by malicious actors.
Looking for a Great Deal?
Shop Lenovo.com for great deals on A+ Education PCs, Accessories, Bundles and more.
Shop Deals Now

  • Legion 7i Gen 9 (16″ Intel) Gaming Laptop
    Starting at
    $1,699.99
    Learn More
  • ThinkPad X9 15 Aura Edition (15ʺ Intel) Laptop
    Starting at
    $1,429.00
    Learn More
  • Yoga Book 9i (13” Intel)
    Starting at
    $1,999.99
    Learn More
  • Yoga 9i 2-in-1 Aura Edition (14″ Intel) Laptop
    Starting at
    $1,420.99
    Learn More
  • ThinkPad P1 Gen 7 (16″ Intel) Mobile Workstation
    Starting at
    $1,871.22
    Learn More
  • Shop
    • Student Deals
    • K-12 Student Laptops
    • Student Accessories
    • Laptops by Major
    Education resource
    Explore
    • What is STEM?
    • Best Laptops for College
    • Student & Teacher Discounts
    • Lenovo Sustainability Programs
    Education carry case

    Stem Articles
    See All STEM Articles
    • Online STEM Education

    • STEM Career Tips & Resources

    • Women in STEM

    • STEM Educator Training

    • STEM Grants & Funding

    • STEM Education: Coding for Kids

    • STEM Education: Robotics

    • STEM Education: Biotechnology

    • STEM Education: Sustainability

    • STEM Education: AI & ML

    While every effort has been made to ensure accuracy, this glossary is provided for reference purposes only and may contain errors or inaccuracies. It serves as a general resource for understanding commonly used terms and concepts. For precise information or assistance regarding our products, we recommend visiting our dedicated support site, where our team is readily available to address any questions or concerns you may have.

    Why Lenovo?

    Go Greener with Leno...

    Lenovo is committed to Smarter Climate Action with lower energy laptops, use of sustainable materials and packaging, and available CO2 Offset Services.
    Learn More
    pastel background

    Get It Now, Pay For ...

    Lenovo has multiple financing option: the Lenovo Credit Card, installment plans, and lease-to-own financing op...
    Learn More
    pastel background

    Productivity & Peace of Mind

    Stay productive with Premium Care Plus - 24/7 priority support and coverage against accidental damage. Power through your day with our Smart Performance and extended battery solutions.
    Learn More
    pastel background

    Fast & Secure

    Get the most from your laptop with Lenovo’s state-of-the-art Smart Performance, delivering powerful, all-in-on...
    Learn More
    pastel background

    Assistance and Suppo...

    Chat with a trained professional who can help you find the right products, place or check on an order, or setup your Education laptop.
    Contact Us
    pastel background
    Enter email to receive Lenovo marketing and promotional emails. Review our Privacy Statement for more details.
    Please enter the correct email address!
    Email address is required
    • Facebook
    • Twitter
    • Youtube
    • Pinterest
    • TikTok
    • Instagram
    Select Country / Region:
    Country
    AndroidIOS

    About Lenovo

    • Our Company
    • News
    • Investors Relations
    • Compliance
    • ESG
    • Product Recycling
    • Product Security
    • Product Recalls
    • Executive Briefing Center
    • Lenovo Cares
    • Careers
    • Formula 1 Partnership

    Products & Services

    • Laptops & Ultrabooks
    • Smarter AI for You
    • Desktop Computers
    • Workstations
    • Gaming
    • Tablets
    • Servers, Storage, & Networking
    • Accessories & Software
    • Services & Warranty
    • Product FAQs
    • Outlet
    • Deals
    • Lenovo Coupons
    • Cloud Security Software
    • Windows 11 Upgrade

    Resources

    • Legion Gaming Community
    • Lenovo EDU Community
    • Lenovo Pro Community
    • Lenovo Pro for Business
    • My Lenovo Rewards
    • Lenovo Financing
    • Lenovo Trade-in
    • Affiliate Program
    • Affinity Program
    • Employee Purchase Program
    • Lenovo Partner Hub
    • Laptop Buying Guide
    • Where to Buy
    • Glossary

    Customer Support

    • Contact Us
    • Policy FAQs
    • Return Policy
    • Shipping Information
    • Order Lookup
    • Register a Product
    • Replacement Parts
    • Technical Support
    • Forums
    • Provide Feedback
    © 2025 Lenovo. All rights reserved.
    PrivacyCookie Consent ToolSite MapTerms of UseExternal Submission PolicySales terms and conditionsAnti-Slavery and Human Trafficking Statement
    Compare  ()
    x
    Call

    Need Help? Call: 

    1-800-426-7235
    Select Your Store
    Add items to your cart?
    We've noticed that you've entered a different store. Do you want to add these items to your cart in the new store?
    No Yes. Add in Lenovo Pro