With the Encryption integration, you can encrypt, decrypt, and sign your files using symmetric or asymmetric encryption.
Data breaches are becoming more and more common in today’s interconnected world and data security is a primary concern. Encryption technology is one of the key methods for protecting information, by scrambling data to make sure unintended recipients are not able to make any sense of the data. To keep your data and information secure, you can use the Encryption integration, which encrypts, decrypts and signs your files using symmetric or asymmetric encryption.
The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.
Because the algorithm behind symmetric encryption is less complex and executes faster, this is the preferred technique when processing bulk data. On the other hand, asymmetric encryption is considered to be more secure than symmetric encryption as it uses two keys for the process: the public key used for encryption is available to everyone, while the private key is not disclosed.
When you use symmetric encryption, you can encrypt and decrypt files. When you use asymmetric encryption, you can encrypt, decrypt, and sign files.
For more information, see Automation Hub.