Southern New Hampshire UniversityCYB - 250 – R4974 03:38:18 GMT -05:003-2 Journal: CryptographyEncryption involves rearranging the components of data in a way that can only be decrypted with the help of a decryption key (Craven, n.d.). Plaintext is data before it is encrypted. Algorithms use plaintext as input. Cryptography or encryption keys rework the data and produce ciphertext output as part of the algorithm. A cipher or encryption method converts plain text into encrypted communication. A plain text document consists of any readable information presented in a format that can be accessed and used without needing a decryption key or special tools (Encryption Consulting LLC, 2023).Symmetric encryption, also called secret key encryption, uses just one key, called a shared secret, for both encrypting and decrypting. A Symmetric encryption solution encrypts and decrypts electronic data using only one key (a secret key). Decryption requires a key exchange between the communicating entities. A symmetric encryption algorithm scrambles data, so anyone without the secret key cannot understand it (Craven, n.d.).Unlike symmetric encryption, which is secure data transfer over an insecure network like the Internet, asymmetric encryption uses public and private keys for encryption and decryption. Although asymmetric encryption is less