In this method the sender creates a message, encrypts it by acryptographic process and transmits it as a ciphertext. The receiver decryptsthe received message to reveal its true content. In this, it is necessary that boththe sender and receiver must have common knowledge of the encryptionprocess and that both share a secret common element –typically thecryptographic key. The receiver must use the same key to which the senderhas used to encrypt The message to decrypt it. If he uses a different key, then it results in adifferent cipher text.
TYPES OF ENCRYPTION:
There are two types of encryption:
Symmetric encryption or Secret key encryption
Asymmetric encryptionA scheme in which both communicating parties must have a commonkey which is called symmetric encryption. But it has an operational disadvantageof requiring a safe method of distributing keys to relevant parties. However, ascheme called asymmetric encryption was developed to mitigate many of thesedifficulties through the use of different keys for encryption. Each participant hastwo keys. The public key is published, is available freely to anyone, and is usedfor encryption. The private key is held in secrecy and is used for decryption. It iscomputationally infeasible in any reasonable length of time to derive the privatekey from the knowledge of public key.