Definition – Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext

How Does Encryption Work – Data, or plaintext, is encrypted with an encryption algorithm and an encryption key. The process results in ciphertext, which only can be viewed in its original form if it is decrypted with the correct key.

 

Contact TQT - Request a demo

Quantum Safe Data Management

Some of the types are:

HASH – mathematical process that scrambles data into a fixed-length, random value that cannot be reversed or decoded. The purpose of hashing is to verify the authenticity of data. Example: “Hello” hashed is

b185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969

AES 256 – Advanced Encryption Standard is a symmetric encryption algorithm that uses a 256-bit key to convert data into a cipher.

The process involves several transformations on the data, including data substitution, shifting rows, mixing columns, and applying an encryption key.

PQC – Post-quantum cryptography refers to a set of classical cryptographic algorithms that are believed to be “quantum-safe,”

meaning that they are expected to remain safe even in the presence of quantum computers. The goal of post-quantum cryptography

(also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical

computers and can interoperate with existing communications protocols and networks.

 

Locktera – uses all 3 types in a multi-layer security architecture at the file level.