Make your own free website on

[All about ENCRYPTION]

Lets take a look at this first:


This used to be the word "test" (no quotes). Without me telling you, you would have never known what that said. I used an encryptor to convert the word from "plain text" (Words easily understandable) to "encrypted text" (text not easily understandable that normally requires a "translation" to read).

You can check out the translator tool that I used online here.

Encryption has been used throughout the years to protect important information. If somebody somehow intercepted your information, they could read everything! By encrypting your message, if somebody intercepts it, your information is safe! How safe your information actually is, however, depends on what kind of encryption you use!

Types of encryption:

Cipher Encryption
Cipher Encryption is a type of encryption that can be only read if the person who is reading it has a "key". A key is some kind of tool that allows the reader to reverse what the writer did to the information to encrypte it.
Hash Encryption
Hash Encryptions are a type of encryption that can't be reversed or translated. They're are used to prove the authenticity of information most of the time. They almost always used with computers and the transfering of data. It is used to prevent hackers from editing important information being sent to and from your computer.
Private Cipher
Private Ciphers are a type of encrytion that are very similar to normal Ciphers. The only difference is that only the sender knows the key to the cipher. These are normally used to protect personal information with a passwords. The computer will encrypte the data based on the "password" provided. The computer will not store your password to check if you got it right the next time you use it, instead it will try to decrypte the data using the password as a "key". If the data decryptes, then it is the password, otherwise it is an incorrect password.

Try this quick quiz to test your knowledge on what you just learned:

All elements, JavaScript, and information on this page is the work of Dade Lamkins.