You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Enter a word for a definition... ...or choose a computer category.

   Term of the Day
   New Terms
   New Links
   Quick Reference
   Did You Know?
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us

talk to us
   Submit a URL
   Suggest a Term
   Report an Error
Internet Lists
Internet News
Internet Resources
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Corporate Info
Tech Jobs
E-mail Offers
  Be a Commerce Partner

Last modified: Tuesday, March 16, 2004 

The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.

E-mail this definition to a colleague

Sponsored listings

Symantec: Virus Security and Removal - Stop Zotob Virus now. Visit Symantec for updated information and resources.

Secure Instant Messaging - Secure corporate IM use and corporate networks. Protect against IM viruses. Free IM security whitepaper. Get more info online.

VeriSign: SSL Certificates - Protect your site with the strongest security possible and it will help increase customers' trust in your e-business. Learn more about VeriSign SSL.

For pages about encryption . Also check out the following links!

Related Links

Cryptography for encryption, digital signatures and authentication 
Contains links to information on cryptography, a tutorial on public key encryption for secrecy and a discussion of the debate regarding government control of cryptography.

Electronic Frontier Foundation home page 
The Electronic Frontier Foundation, the civil liberties union of cyberspace, offers links to Internet security issues, news, a net guide, calendar, organizational information, and alerts.

NIST computer security resource clearinghouse 
National Institute of Standards and Technology's computer security resource clearinghouse. It contains information on numerous security topics, as well as alerts about viruses and other security threats.

RSA Data Security home page 
Site of RSA Data Security Inc, creators of the RSA encryption technology used in Netscape Navigator, Quicken, Lotus Notes, and hundreds of other products.

SSH - Cryptography A-Z 
This page lists international sources of cryptographic software, information on cryptographic methods, algorithms, and protocols. Materials cover encryption, decryption, cryptanalysis, steganography (hiding information), software, tools, information, and assessments about cryptographic methods.

The Clinton Administration's statement on commercial encryption policy 
Describes a proposed framework that would encourage the use of strong encryption in commerce and private communications while protecting the public safety and national security. Also contains a section on the U.S. Cryptography Policy. (July 1996)

CERT home page
This site hosts the CERT Coordination Center, an organization that focuses on computer security concerns for Internet users. Their home page contains information about the organization, links to an FTP site where CERT advisories can be retrieved, FAQs, archives, and research information.

Data encryption methods
This paper presents a discussion of methods used to encrypt data.

Encryption Policy Resource page
An issues-oriented site containing information United States encryption export restrictions, with links to articles, legislation, events, initiatives, and policies.

Encryption Resource Listing
Internet Society's collection of articles and information sites for encryption.

Paper on key escrow encryption systems
This paper presents a taxonomy for key escrow encryption systems

PGP introduction
This site explains how PGP software works through the use of a public and private key pairs.

White House Clipper statement, October 1996
This announcement, from Vice President Al Gore, describes the latest version of the key escrow -- now called the "key recovery" -- plan intended to promote government access to encoded communications.

Yahoo!'s security and encryption page
Yahoo!'s directory of Internet security and encryption.

Sponsored listings

Apani Networks: Encryption Software - Enterprise network security software provider. Encrypting and protecting data inside the network perimeter and ensuring various compliance regulations

CrypKey: Encryption Software - Provides copy protection and software authorization tools, including integrated licensing features and customizable free trial and demo capabilities.

KnowledgeStorm: Encryption Software - Business technology search site offering software, service, reseller and hardware information on thousands of IT solutions.

DiscountID: Authentication Products - ID Card Printers from Fargo, Zebra-Eltron, Evolis, Magicard, and Datacard. Complete Photo Identification Systems, Ribbons and Cards.

Fargo Electronics: Access Authentication - Supplies access authentication systems to control access to facilities and networks, monitor time and attendance, and visually identify people.

related categories

Digital Rights Management (DRM)


related terms


cipher text

Clipper chip




digital certificate

digital envelope


encryption algorithm

key escrow

key length



plain text

public-key encryption



snake oil


symmetric encryption



Give Us Your

encryption Products
Compare Products,Prices and Stores

Shop by Category:
Wireless Access Points
88 Model Matches

77 Model Matches

416 Model Matches

Other Network Devices
65 Model Matches

JupiterWeb networks:

Search JupiterWeb:

Jupitermedia Corporation has three divisions:
Jupiterimages, JupiterWeb and JupiterResearch

Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers