-
Encryption
Turns readable data (plaintext) into unreadable code (ciphertext) using a key.
✅ Used for: Protecting sensitive data in storage or transmission.
💡 Example: Your bank encrypts your data before sending it over the internet. -
Decryption
The reverse of encryption — it converts ciphertext back into readable text using the right key.
✅ Used for: Reading encrypted data only when authorized. -
Hashing
Transforms data into a fixed-length string using a one-way algorithm (cannot be reversed).
✅ Used for: Password storage, data verification, file integrity.
💡 Example: Login systems store password hashes, not the actual passwords. -
GUID (Globally Unique Identifier)
A 128-bit unique ID used to identify things (users, files, records) without conflicts.
✅ Used for: Databases, APIs, and distributed systems.
💡 Example: f47ac10b-58cc-4372-a567-0e02b2c3d479 -
Clear Text / Cipher Text
• Clear Text (Plaintext): Readable, unprotected data.
• Cipher Text: Encrypted, unreadable data.
❌ Never store or send passwords in clear text! -
Codex
Historically means book of codes — in modern computing, it refers to a collection of encoded or compressed data or code.
💡 Related term: Codec (Coder/Decoder) used in video/audio compression. -
Keygen (Key Generator)
A tool or algorithm that generates keys — either encryption keys or software license keys.
✅ Used for: Cryptography, authentication, or software licensing. -
Digital Signature
A cryptographic signature that verifies who sent the data and whether it was changed.
✅ Used for: Signing software, contracts, and secure emails.
💡 Works using asymmetric encryption (public/private keys). -
SSL/TLS
Security protocols that encrypt data between your browser and a website.
✅ Used for: HTTPS websites, secure APIs.
💡 TLS is the modern version of SSL. -
End-to-End Encryption (E2EE)
Only the sender and receiver can read the message — not even the service provider.
✅ Used for: Messaging apps like WhatsApp or Signal.
Examples:
Encryption: Converts readable data into coded form to protect it.
🔹 Example: A credit card number 4111-1111-1111-1111 becomes unreadable like A93F7B1C… before being stored.
• Decryption: Reverses encryption using the correct key so the data becomes readable again.
🔹 Example: When you log in, your browser decrypts the data received from the server using a secure session key.
• Hashing: A one-way process that turns any data into a fixed-length value — used to verify data integrity.
🔹 Example: “Password123” → ef92b778bafe771e89245b89ecbc08a44a4e166c06659911881f383d4473e94f (SHA-256).
• GUID (Globally Unique Identifier): A 128-bit unique ID that prevents duplication across systems.
🔹 Example: Each new customer record in a CRM system might have a unique ID like f47ac10b-58cc-4372-a567-0e02b2c3d479.
• Clear Text / Cipher Text: Clear text is readable; cipher text is encrypted and unreadable without the key.
🔹 Example: “HelloWorld” (clear text) → “x83@fG92!d” (cipher text).
• Codex: Refers to a structured or encoded collection of information or media.
🔹 Example: GitHub Copilot Codex — a large model trained on code to understand and generate programming solutions.
• Keygen (Key Generator): Creates cryptographic or software license keys for security or validation.
🔹 Example: A system might generate a 256-bit AES key like 8e9f73c4d20a84b3e12ab6759fa4f290 for file encryption.
• Digital Signature: Uses cryptography to verify authenticity and integrity of data or documents.
🔹 Example: When signing a PDF digitally, the system verifies your private key and ensures no one has modified the file.
• SSL/TLS: Protocols that secure web communication between browser and server.
🔹 Example: The padlock icon 🔒 in your browser’s address bar means SSL/TLS encryption is active (https://).
• End-to-End Encryption (E2EE): Only the sender and receiver can read the message — not even the service provider.
🔹 Example: WhatsApp messages are E2EE, meaning not even WhatsApp can see your conversations.
• storing passwords or checking file authenticity.
• GUID: A globally unique identifier that ensures each record or entity has a unique identity, especially in databases.
• Clear Text / Cipher Text: Clear text is readable data, while cipher text is encrypted and unreadable without a key — both represent data in different forms.
• Codex: Represents a collection of encoded data, structured information, or compressed media — essentially an organized form of coded knowledge.
• Keygen: A key generator that creates encryption or license keys, ensuring security or activation control.
• Digital Signature: Verifies authenticity and confirms that data or a document hasn’t been altered — commonly used in contracts and software signing.
• SSL/TLS: Security protocols that encrypt communication between browsers and servers to keep the web safe (HTTPS).
• E2EE (End-to-End Encryption): Ensures that only the sender and receiver can read the message, protecting privacy in messaging apps.