Encryption, in relation to a series of cyber-attacks, is the most official and effective tool available for our community for the data protection.
Cryptography or encryption is the transformation technique of a plain text into an encrypted text. Through  its algorithms and protocols it ensures:
➢ the content confidentiality
➢ the content integrity
➢ the sender authenticity

The encryption is process is generally based on the use of an encryption key and a computer algorithm. The techniques are varied and have been improved over time to meet the continuous evolution of the malicious users insidious attacks.
With the quantum cryptography future development we will have more sophisticated techniques. The following techniques are currently available:

➢ Symmetric key encryption (secret key), the most common are 3DES and AES
➢ Asymmetric key cryptography (public key), the most common are RSA and DSA
➢ Hashing algorithms (fingerprint) the most common  are MD5 and SHA-1

Modern encryption systems use the abovementioned various techniques, this by implementing a combination of them in order to guarantee a high security level for data transmission. The number of applications that make use of these systems is significantly increasing:

  • Securely surf the Web (HTTPS protocol)
  • Digital Signature and e-mail messages encryption, network servers authentication using digital certificates issued by certification authorities (CA Certification Authority)
  • Financial transactions using credit cards
  • Certified e-mail
  • Communications encryption (VPN SSL / TLS) by establishing a secure communication channel over the Internet network
  • confidential information exchange using encryption systems when transferring data to removable media (USB key, external hard drives …)
  • VoIP and legacy voice communications
  • Authentication methods through Public Key Infrastructure (PKI)
  • Electronic passport / electronic vote usage