We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Cipher Encryption?

M. McGee
By
Updated: May 17, 2024

Cipher encryption is a variety of encryption where a key is used to safeguard the encoded information. In general, there are two methods of cipher encryption—the block and the stream method. These determine how the cipher is applied to the original message. In addition to those two methods, there are two styles as well. A cipher is either symmetrical or asymmetrical depending on whether the message requires the same or a different decryption cipher.

Encrypted messages have been a staple of human secrecy since early civilization. Methods have come and gone for keeping important missives safe, but most have been some sort of cipher encryption. Methods of using a predesigned key to encode and decode messages have occupied the lives of many people. In the early days, these keys were complex only by virtue of the user’s low technology; now there are supercomputers that do nothing but encrypt and decrypt messages.

Block ciphers and stream ciphers make up the majority of cipher types. A block cipher encodes information in predetermined block sizes. If a cipher is designed to encode 200 characters, then that is precisely what it does. If the message is longer, it needs to be broken into multiple pieces, and if it’s shorter, it requires padding characters. A padding character is a character that simply makes the message longer; it can be anything from a stream of single characters to a random assortment of letters and spaces.

Stream ciphers are an innovation of the computer age. This style of cipher encryption generates and adapts its encoding string as it works. This encryption method uses the current state of the machine performing the encryption to generate the cipher.

This method constantly changes to match the current state of the system. Stream ciphers are nearly unbreakable as long as two things don’t happen; the code can’t repeat itself and no one that intercepts the message can know any of its contents. If the code repeats, it is possible to crack the sequence with little effort due to markers left behind in the cipher. If an interceptor knows any of the message contents, they can modify the message without opening it.

In a symmetrical cipher, the key used to encode the message is the same as the key used to decode the message. These ciphers are simple and easy to create, but the key is in danger as it moves from location to location for decoding. In addition, if any of the key holding locations are compromised, then the entire cipher is ruined.

An asymmetrical cipher encryption uses two keys, one that encodes the message and one that decodes the message. This is the cornerstone of public key encryption. A message is made of two keys, a public one and a private one. In this case, the keys interact to allow a specific person to unlock a message without knowledge of the actual encryption key.

WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
M. McGee
By M. McGee
Mark McGee is a skilled writer and communicator who excels in crafting content that resonates with diverse audiences. With a background in communication-related fields, he brings strong organizational and interpersonal skills to his writing, ensuring that his work is both informative and engaging.

Related Articles

Discussion Comments
M. McGee
M. McGee
Mark McGee is a skilled writer and communicator who excels in crafting content that resonates with diverse audiences....
Learn more
Share
https://www.wisegeek.net/what-is-cipher-encryption.htm
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.