Encryption
Turns readable data (plaintext) into unreadable code (ciphertext) using a key.
β Used for: Protecting sensitive data in storage or transmission.
π‘ Example: Your bank encrypts your data before sending it over the internet.Decryption
The reverse of encryption β it converts ciphertext back into readable text using the right key.
β Used for: Reading encrypted data only when authorized.Hashing
Transforms data into a fixed-length string using a one-way algorithm (cannot be reversed).
β Used for: Password storage, data verification, file integrity.
π‘ Example: Login systems store password hashes, not the actual passwords.GUID (Globally Unique Identifier)
A 128-bit unique ID used to identify things (users, files, records) without conflicts.
β Used for: Databases, APIs, and distributed systems.
π‘ Example: f47ac10b-58cc-4372-a567-0e02b2c3d479Clear Text / Cipher Text
β’ Clear Text (Plaintext): Readable, unprotected data.
β’ Cipher Text: Encrypted, unreadable data.
β Never store or send passwords in clear text!Codex
Historically means book of codes β in modern computing, it refers to a collection of encoded or compressed data or code.
π‘ Related term: Codec (Coder/Decoder) used in video/audio compression.Keygen (Key Generator)
A tool or algorithm that generates keys β either encryption keys or software license keys.
β Used for: Cryptography, authentication, or software licensing.Digital Signature
A cryptographic signature that verifies who sent the data and whether it was changed.
β Used for: Signing software, contracts, and secure emails.
π‘ Works using asymmetric encryption (public/private keys).SSL/TLS
Security protocols that encrypt data between your browser and a website.
β Used for: HTTPS websites, secure APIs.
π‘ TLS is the modern version of SSL.End-to-End Encryption (E2EE)
Only the sender and receiver can read the message β not even the service provider.
β Used for: Messaging apps like WhatsApp or Signal.
Examples:
Encryption: Converts readable data into coded form to protect it.
πΉ Example: A credit card number 4111-1111-1111-1111 becomes unreadable like A93F7B1C... before being stored.
β’ Decryption: Reverses encryption using the correct key so the data becomes readable again.
πΉ Example: When you log in, your browser decrypts the data received from the server using a secure session key.
β’ Hashing: A one-way process that turns any data into a fixed-length value β used to verify data integrity.
πΉ Example: "Password123" β ef92b778bafe771e89245b89ecbc08a44a4e166c06659911881f383d4473e94f (SHA-256).
β’ GUID (Globally Unique Identifier): A 128-bit unique ID that prevents duplication across systems.
πΉ Example: Each new customer record in a CRM system might have a unique ID like f47ac10b-58cc-4372-a567-0e02b2c3d479.
β’ Clear Text / Cipher Text: Clear text is readable; cipher text is encrypted and unreadable without the key.
πΉ Example: βHelloWorldβ (clear text) β βx83@fG92!dβ (cipher text).
β’ Codex: Refers to a structured or encoded collection of information or media.
πΉ Example: GitHub Copilot Codex β a large model trained on code to understand and generate programming solutions.
β’ Keygen (Key Generator): Creates cryptographic or software license keys for security or validation.
πΉ Example: A system might generate a 256-bit AES key like 8e9f73c4d20a84b3e12ab6759fa4f290 for file encryption.
β’ Digital Signature: Uses cryptography to verify authenticity and integrity of data or documents.
πΉ Example: When signing a PDF digitally, the system verifies your private key and ensures no one has modified the file.
β’ SSL/TLS: Protocols that secure web communication between browser and server.
πΉ Example: The padlock icon π in your browserβs address bar means SSL/TLS encryption is active (https://).
β’ End-to-End Encryption (E2EE): Only the sender and receiver can read the message β not even the service provider.
πΉ Example: WhatsApp messages are E2EE, meaning not even WhatsApp can see your conversations.
β’ storing passwords or checking file authenticity.
β’ GUID: A globally unique identifier that ensures each record or entity has a unique identity, especially in databases.
β’ Clear Text / Cipher Text: Clear text is readable data, while cipher text is encrypted and unreadable without a key β both represent data in different forms.
β’ Codex: Represents a collection of encoded data, structured information, or compressed media β essentially an organized form of coded knowledge.
β’ Keygen: A key generator that creates encryption or license keys, ensuring security or activation control.
β’ Digital Signature: Verifies authenticity and confirms that data or a document hasnβt been altered β commonly used in contracts and software signing.
β’ SSL/TLS: Security protocols that encrypt communication between browsers and servers to keep the web safe (HTTPS).
β’ E2EE (End-to-End Encryption): Ensures that only the sender and receiver can read the message, protecting privacy in messaging apps.
Top comments (0)