View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. What Is
March 13, 2021updated 17 Nov 2022 3:43pm

What is encryption?

How algorithms are used to scramble communications.

By Alexander Sword

Encryption refers to converting data into a different form so that it cannot be understood by anyone except the intended recipient.

The information is fed through an algorithm, which scrambles the basic text to a form that is indecipherable. The recipient also possesses the algorithm, often called the encryption key, and hence can decrypt the information to a readable form.

Image: Shutterstock

The thing that makes encryption work is that while an eavesdropper may be able to intercept a communication, they will only be able to access gibberish without the key.

The concept has taken on new importance in the digital age, in which cryptographers use these techniques to secure computer systems and digital communications. This includes both stored data and data travelling across communication channels.

The term comes from the Ancient Greek ‘Kryptos’, meaning secret. The related term cryptography refers to the science of secret codes whereas encryption is an actual cryptographic process.

Encryption in history

Julius Caesar gave his name to one of the earliest known cyphers, the Caesar cypher. This is a fairly simple encryption technique which shifts every letter in the alphabet by a certain number of places in the alphabet. For example, if the number one was used as the key, B stands in for A, C stands in for B, et cetera.

Encryption contributed significantly to the early development of computing during World War Two. While the British were able to intercept German armed forces’ communications, the Germans used a machine called Enigma to scramble them, meaning they had no use.

Mathematician Alan Turing devised a primitive computer that was able to decrypt the communications once the key was discovered. The events were dramatised in the 2014 film The Imitation Game, starring Benedict Cumberbatch.

Content from our partners
How businesses can thrive in the age of generative AI
AI is transforming efficiencies and unlocking value for distributors
Collaboration along the entire F&B supply chain can optimise and enhance business

A high-profile use of encryption came when WhatsApp, the popular chat app owned by Meta alongside Facebook, introduced end-to-end encryption for the messages of all of its users.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.