enabled by decryption decoding the encrypted information. A secret key or

a password is required for the process of decryption. It is necessary to

scrutinize the access from unauthorized organizations or individuals, as the

information travels over the Internet. A prompt or window is received by

the recipient of the decrypted data, who can access the encrypted data with

a password. As a result of encryption, the decryption system extracts and

converts the data, transforming it into words and images, which the reader

and a system can understand. Decryption can be done either manually or

automatically. It may also be performed with a set of keys or passwords.

Turning ciphertext back into plaintext is decryption. Algorithms, keys, and

key management facilities are comprised in a cryptographic system for

decryption.

Cipher modes

Let us define cipher modes.

Encryption algorithms can have different modes of operation. For

confidentiality or authentication, a companion algorithm tailors the

symmetric-key algorithm for different applications known as modes.

During encryption, you must specify which cipher and mode to use. The

cipher and mode used are randomly selected from the ciphers, that is,

common between the two servers taking part in communication. All servers

and client computers that participate in encrypted communication should

ensure that the ciphers and modes used are common. If you include more

ciphers and modes between which the database server can switch,

encryption becomes more secure.

A “cipher” is the algorithm that encrypts and decrypts data, whereas the

“cipher mode” defines how the cipher encrypts and decrypts it.

The cryptographic algorithms that you use to encrypt/ decrypt data are the

ciphers, whereas cipher modes define the “mode of operation” for applying

the cipher. Both are complementary and can be chosen separately.

The Data Encryption Standard (DES) is a cryptographic algorithm

designed to encrypt and decrypt data by using 8-byte blocks and a 64-bit

key.