What are the Most Common Encryption Methods and Their Algorithms?

Encryption Methods and Their Algorithms

Today we live in a time when cybercrime is rampant and if you don’t protect our private information, you leave it exposed to criminals and other bad actors. Fortunately, you can use encryption to secure your data from them and get a little peace of mind when exchanging important information online. 

With that in mind, we are going to look over the two encryption methods in this article, explain what they are, how each works, their pros and cons, as well as the different encryption algorithms of both. 

But, before we dive into explaining the encryption methods, we should first explain what is encryption in the first place.

What is Encryption and Why do We Need it?

When you hear the word “encryption” you might think about modern computers, but encryption has been around since ancient times. 

But what is encryption?

Norton defines encryption as “the process of taking plain text, like a text message or email and scrambling it into an unreadable format – called ‘cipher text’.”

Such a message can only be read by the intended recipient if they possess the “secret” key that allows them to decrypt the message. Otherwise, the data should be scrambled and unreadable.

So why do we need encryption?

Today data is a very valuable commodity and  data theft is a very real threat every time you are online. Because of this, you need a way to protect your data against hackers, but also against the government. That is where encryption comes in to protect your personally identifiable information (PII) and other sensitive personal and business data.

What encryption methods are there?

There are two main encryption methods in use today – symmetric and asymmetric encryption. All different types and encryption algorithms are based on them.

Let’s take a closer look at both of these encryption methods.

Symmetric Encryption

Symmetric, or secret key algorithm, is an encryption method which uses a single key to encrypt and decrypt a message.

How does symmetric encryption work?

First, a sender uses a public encryption key to encrypt the message from plaintext to ciphertext. 

Once the data is encrypted, the other side can only read it using an encryption key which allows them to turn the data back into its original form.

What are the pros and cons of symmetric encryption?


  • It is fast to both encrypt and decrypt a message


  • For each new exchange and participant, a new key has to be generated
  • Exchanging keys is not secure and must be done by secure channels (often in person)

As for the different algorithms used in symmetric encryption, they can be classified into two categories: 

  • Block algorithms encrypt the data block-by-block, with each block consisting of a set of bits that are encrypted using a public key.

The main problem with this type of algorithm is in the fact that data is kept in the memory of the encryption system as it waits for data blocks to be completed. This can obviously compromise data security and integrity.

  • Stream algorithms encrypt data not by blocks, but rather byte by byte (or even bit by bit). This means that data is not kept in the system memory without encryption like with block algorithms and is, therefore, a safer way.

The two most block common symmetric encryption algorithms are:

  1. DES (Data Encryption Standard)

DES is a block-type symmetric encryption that uses 64-bit size blocks. However, DES can only have 56-bit long keys, as 8 bits are check bits.

This algorithm was developed by IBM in the 1970s and is based on the LUCIFER block cipher developed by Horst Feistel in 1971 and was the main data encryption standard for about 20 years until the appearance of AES.

Today DES is largely deprecated and is considered weak and easily broken by modern computers, although a version of it, called 3DES (Triple Data Encryption Standard) is often used in EMV chip cards.

  1. AES (Advanced Encryption Standard) replaced DES at the beginning of the 21st century and is today the de-facto data encryption standard, at least when it comes to symmetric encryption methods.

For example, where a 56-bit DES key can be deciphered in 6 minutes or 360 seconds by a modern computer, a 128-bit AES key would take around 36 quadrillion years.

Instead of the Feistel cipher, AES uses a substitution-permutation network and operates with 128-bit (16bytes) blocks and uses 128, 192 and 256-bit keys.

AES is used in:

  • Wireless networks along with WPA2
  • Virtual Private Networks (VPN)
  • Archive and compression tools like RAR and WinZip
  • Password managers like LastPass
  • Operating systems (OS), specifically in file systems
  • Mobile apps like Snapchat
  • Programming language libraries like Java and Python

When it comes to the stream key algorithms, the most widely used one is CHACHA20, which is also used internally by Google.

Asymmetric Encryption

Unlike symmetric encryption that uses public key encryption, asymmetric, or public key encryption uses a pair of keys to encrypt and decrypt a message.

This solves the problem of exchanging the secret key in a secure way that symmetric encryption suffers from the most, but introduces a new one. Asymmetric encryption as a result of using two keys, public and private, is slower.

How does the public key encryption work?

Let’s say that person A wants to send a secret message to person B. To prevent a third party (like a hacker) from reading the message, they first need to turn plaintext into ciphertext using public key encryption. 

However, in order to read the original message and turn the ciphertext back into plaintext, the recipient needs to use the private key. The intended recipient should be the only one in possession of the private key.

So what are the pros and cons of asymmetric encryption?


  • The recipient is able to verify that the message came from the sender
  • It allows the recipient to detect if the message was altered in any way during transit and is in its original form
  • The sender cannot deny that they sent the message, as the message acts like a physically signed document
  • The key distribution is more secure and convenient. Anyone can own and publish public keys, but the private key is kept secret and in the possession of the intended recipient


  • It’s much slower than using a single key symmetric encryption method and this makes it unsuitable for larger and bulk messages
  • If the private key is lost, the recipient will become unable to read/decrypt the message
  • Public keys are not authenticated and it can be a problem to verify that they belong to the sender

Asymmetric encryption algorithms:

  • RSA

The most common asymmetric encryption algorithm is Rivest Shamir Adleman, or RSA.

This public key algorithm was developed in 1978 and can be used for both encrypting data and signing it digitally through a series of modular multiplications.

Since RSA uses 1024-bit and 2048-bit key length, it provides an excellent level of security, however the length of the key means that the decryption algorithm is slower than with shorter keys.

  • ECC

In addition to RSA, we also have the Elliptic Curve Cryptography, or ECC. This algorithm method was originated by Neal Koblitz and Victor S. Miller in 1985 and was implemented in 2004.

The ECC uses a mathematical operation based on the Elliptic-curve Diffie-Hellman. Because of this the mathematical operation in ECC is easy to complete, but almost impossible to reverse, which means it’s not possible to reveal the private key.

ECC is also considered a future of encryption. For instance, a 164-bit ECC key matches the security of a 1024-bit RSA key.


This was an overview of the two encryption methods and their different types of algorithms. As we live in an age of data, encryption and cryptography should no longer be considered the domain of the military and the government, but of anyone whose data might be at any point exposed. 

We hope this overview of encryption methods has given you a better perspective of them and why they are important and how they can help protect your data.

Speaking of protecting your data, your email is often the first thing hackers will turn to in order to steal it. CTemplar: Armored Email uses 4096-bit encryption on the client-side to keep your email messages, subjects and attachments encrypted and safe.

Sign up to CTemplar to get your encrypted email and protect your privacy.