DESIGN TOOLS

Invalid input. Special characters are not supported.

Micron technology glossary

Encryption

Encryption is a foundational data security technology that protects sensitive information from unauthorized access and cyber threats. Converting readable data into a secure, coded format, encryption helps safeguard information across storage, transmission and cloud environments.

Learn more about the importance of encryption technology with Micron, or connect with our Sales Support team to discuss your data needs.

What is encryption?

Encryption definition: Encryption is the process of converting readable plaintext into unreadable ciphertext to prevent unauthorized access.

Encryption is a critical component of modern cybersecurity strategies, enabling organizations to protect sensitive data across various environments. Encryption applies to data in ​​motion, at ​​rest and stored in the cloud — ensuring security throughout the data lifecycle.

With global regulations like the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States, encryption is not just a best practice but often a legal requirement. These frameworks mandate that organizations handling personal data implement “appropriate technical measures” to protect it. Encryption is one of the most recognized measures for securing data during transfer and storage, helping prevent unauthorized access and data breaches. 

How does encryption work?

Encryption algorithms use mathematical formulas to transform plaintext into ciphertext. This encrypted data can be accessed only by someone with the correct decryption key. 

For example, if the plaintext is ‘hello’ and the encryption algorithm simply shifts each letter forward by one place in the alphabet, the ciphertext becomes “ifmmp”.

What is the history of encryption?

The history of encryption has evolved rapidly since the late 20th century, driven by advances in computing and the growing need for secure digital communication.

  • 1977, DES (Data Encryption Standard): First U.S. government-approved encryption method using a 56-bit key.
  • 1978, RSA (Rivest-Shamir-Adleman): Introduced asymmetric encryption​ ​with public and private keys for enhanced data encryption.
  • 1990s, encryption debate: Law enforcement agencies argued that strong encryption could hinder criminal investigations because they couldn’t access encrypted communications. They pushed for weaker encryption or government “backdoors” to allow lawful access. Privacy advocates and tech companies opposed this, citing risks to security and civil liberties. The debate led to the eventual rejection of mandated backdoors, and strong encryption standards like AES became widely adopted in the 2000s. 
  • 2000s, Advanced Encryption Standard (AES) and elliptic curve cryptography (ECC): AES was adopted by the U.S. government and became the standard for secure encryption. ECC followed as an advancement in public-key cryptography, offering strong security with smaller keys — ideal for mobile and resource-constrained devices. (Note: In memory and storage systems, ECC refers to error correction code.)

Today, encryption is a sophisticated and essential ​data security too​l ​​for protecting digital assets​​.​

What are the key types of data encryption?

Symmetric encryption

Symmetric encryption uses a single key for both encryption and decryption. It’s fast and efficient. 

  • Data Encryption Standard (DES): An early symmetric encryption standard from the 1970s using a 56-bit key. Now largely obsolete due to vulnerability to brute-force attacks.
  • Advanced Encryption Standard (AES): A modern symmetric encryption standard supporting 128-, 192-, and 256-bit keys, widely adopted for its strong security and efficiency.

Asymmetric encryption

Asymmetric encryption uses a public key to encrypt and a private key to decrypt. It offers enhanced security for sensitive communications.

  • Rivest-Shamir-Adleman (RSA): Uses a private and public key pair to encrypt and secure data.
  • Elliptic curve cryptography (ECC): Uses smaller keys to encrypt data, making it suitable for securing web traffic.

End-to-end encryption

End-to-end encryption ensures that data is encrypted on the sender’s device and decrypted only on the receiver’s device. It’s commonly used in messaging and email platforms.

One-way encryption

One-way encryption is a method of converting data into a format that cannot be reversed. This irreversible process is commonly used for password protection and secure authentication. Because the original data cannot be retrieved from the encrypted output, one-way encryption is considered one of the most secure forms of encryption.

How is encryption used?

Encryption is used across industries to protect:

  • Financial transactions: Combining symmetric and asymmetric encryption for secure transfers.
  • User credentials: One-way encryption secures passwords and login data.
  • Cloud storage and communications: Encryption ensures privacy, compliance and data integrity.

Encryption also plays a vital role in securing IoT devices, automotive systems and industrial applications. 

Frequently asked questions

Encryption FAQs

Encryption is the process of converting readable data (known as plaintext) into a coded format (called ciphertext) to prevent unauthorized access. It’s essential for protecting sensitive information, ensuring privacy, and meeting compliance standards across jurisdictions. These include:  

  • General Data Protection Regulation (GDPR) – European Union 
  • California Consumer Privacy Act (CCPA) – United States
  • Personal Information Protection and Electronic Documents Act (PIPEDA) – Canada 
  • Lei Geral de Proteção de Dados (LGPD) – Brazil 
  • Asia-Pacific Economic Cooperation (APEC) Privacy Framework – Asia-Pacific region 
  • African Union Convention on Cyber Security and Personal Data Protection – Africa 

Encryption helps organizations safeguard data for their customers, reinforcing trust in digital systems and enabling compliance with evolving regulatory requirements.

While encrypted data can be targeted, strong encryption algorithms like AES 128-bit make it extremely difficult to crack. AES encryption has never been broken by brute force.

AES 256-bit encryption is currently the strongest and most widely trusted encryption standard, used by governments and enterprises worldwide.