Edit This Page


Get started

Learn the basics of encryption and how it can help protect you and your network.

Learn about

What is encryption


Encryption is the mathematical science of codes, ciphers, and secret messages.

Encryption is old

Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient.

Encryption with computers

Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages.

Current encryption uses

Today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor.

Understanding encryption

Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations.

Private and public keys


One of the most important concepts to understand in encryption is a key.

Private keys

Common types of encryption include a private key, which is kept secret on your computer and lets you read messages that are intended only for you.

Key signatures

A private key also lets you place unforgeable digital signatures on messages you send to other people.

Public keys

A public key is a file that you can give to others or publish that allows people to communicate with you in secret, and check signatures from you.

Matching keys

Private and public keys come in matched pairs, like the halves of a rock that has been split into two perfectly matching pieces, but they are not the same.

Security certificates

Encryption with HTTPS

The Web browser on your computer can make encrypted connections to sites using HTTPS. When they do that, they examine certificates to check the public keys of domain names (like www.google.com, www.amazon.com, or ssd.eff.org).

Verifying websites

Certificates are one way of trying to determine if you know the right public key for a person or website, so that you can communicate securely with them.

Certificate errors

From time to time, you will see certificate-related error messages on the Web. Most commonly, this is because a hotel or cafe network is trying to break your secret communications with the website.

Other certificate problems

It is also common to see an error because of a bureaucratic mistake in the system of certificates.

Breaking your encrypted connections

Occasionally, however, it is because a hacker, thief, police agency, or spy agency is breaking the encrypted connection. Unfortunately, it is extremely difficult to tell the difference between these cases.

Be careful with sensitive information

This means you should never click past a certificate warning if it relates to a site where you have an account, or are reading any sensitive information.

Key fingerprints

Verifying identity

"Key fingerprints," are strings of characters like "342e 2309 bd20 0912 ff10 6c63 2192 1928" that allow you to uniquely and securely check that someone on the Internet is using the right private key.

Checking fingerprints

If you check that someone's key fingerprint is correct, that gives you a higher degree of certainty that it's really them.

Fingerprints aren't perfect verifier

But it's not perfect, because if the keys are copied or stolen someone else would be able to use the same fingerprint.


What is gitbook used for?

To read books To book hotel named git To write and publish beautiful books GitBook.com lets you write, publish and manage your books online as a service.

Is it quiz?

Yes No


  • en/topics/understand-4-digisec/4-secure-communications/1-1-intro.md: Learning about secure communications
  • en/topics/tool-3-enigmail/0-getting-started/1-1-intro.md: Using Enigmail for encrypted emailing
  • en/topics/practice-4-safe-social-networks/3-facebook-chat/1-1-intro.md: Chatting securely on social networks

See also: