what-is","metadata":{}}]}}]},"metadata":{"auth":{},"testAttributes":{}},"context":{"page":{"pageUrl":"https://aws.amazon.com/what-is/cryptography/"},"environment":{"stage":"prod","region":"us-east-1"},"sdkVersion":"1.0.129"},"refMap":{"manifest.js":"289765ed09","what-is-header.js":"2e0d22c000","what-is-header.rtl.css":"ccf4035484","what-is-header.css":"ce47058367","what-is-header.css.js":"004a4704e8","what-is-header.rtl.css.js":"f687973e4f"},"settings":{"templateMappings":{"category":"category","headline":"headline","primaryCTA":"primaryCTA","primaryCTAText":"primaryCTAText","primaryBreadcrumbText":"primaryBreadcrumbText","primaryBreadcrumbURL":"primaryBreadcrumbURL"}}}

cryptography","metadata":{}}]}},{"fields":{"faqQuestion":"What is cryptography used for?","faqAnswer":"

Cryptography has its roots in sending sensitive information between military and political figures. Messages could be encrypted so that they appear to be random text to anyone but the intended recipient. \n

Today, the original techniques for encryption have been thoroughly broken. They're broken to the point that they are only found in the puzzle sections of some newspapers. Fortunately, the field has made major advancements in security, and the algorithms used today rely on rigorous analysis and mathematics for their security. \n

As security has advanced, the field of cryptography has expanded to include a broader range of security goals. These include message authentication, data integrity, secure computation, and more. \n

Cryptography is at the foundation of the modern society. It's the basis of countless internet applications via the Secure Hypertext Transfer Protocol (HTTPS), secure text and voice communication, and even digital currencies.","id":"seo-faq-pairs#what-is-cryptography-used-for","customSort":"2"},"metadata":{"tags":[{"id":"seo-faq-pairs#faq-collections#cryptography","name":"cryptography","namespaceId":"seo-faq-pairs#faq-collections","description":"

cryptography","metadata":{}}]}},{"fields":{"faqQuestion":"What is encryption?","faqAnswer":"

An encryption algorithm is a procedure that converts a plaintext message into an encrypted ciphertext. Modern algorithms use advanced mathematics and one or more encryption keys. These make it relatively easy to encrypt a message but virtually impossible to decrypt it without knowing the keys. \n

Encryption techniques fall into two categories, symmetric and asymmetric, based on how their keys function.","id":"seo-faq-pairs#what-is-encryption","customSort":"3"},"metadata":{"tags":[{"id":"seo-faq-pairs#faq-collections#cryptography","name":"cryptography","namespaceId":"seo-faq-pairs#faq-collections","description":"

cryptography","metadata":{}}]}},{"fields":{"faqQuestion":"What is symmetric-key cryptography?","faqAnswer":"

Symmetric-key cryptographic algorithms use the same cryptographic keys for both the encryption of the plaintext and the decryption of the ciphertext. Symmetric encryption requires that all intended message recipients have access to a shared key. \n

The following illustrations show how encryption and decryption work with symmetric keys and algorithms, assuming that all parties share the same key. \n

In the first illustration, a symmetric key and algorithm are used to convert a plaintext message into ciphertext. The second illustration shows the same secret key and symmetric algorithm being used to turn ciphertext back into plaintext.                 \n

   \"\" \n

One of the most popular block ciphers is the Advanced Encryption Standard (AES). This block cipher supports 128-, 192-, or 256-bit keys. AES is often combined with Galois/Counter Mode (GCM) and known as AES-GCM to make an authenticated encryption algorithm. \n

AES is the industry standard for encryption performed around the world. Its security is well understood, and efficient software and hardware implementations are widely available.","id":"seo-faq-pairs#what-is-symmetric-key-cryptography","customSort":"4"},"metadata":{"tags":[{"id":"seo-faq-pairs#faq-collections#cryptography","name":"cryptography","namespaceId":"seo-faq-pairs#faq-collections","description":"

cryptography","metadata":{}}]}},{"fields":{"faqQuestion":"What is asymmetric (public-key) cryptography?","faqAnswer":"

  \n

Asymmetric (or public-key) cryptography consists of a broad set of algorithms. These are based on mathematical problems that are relatively easy to perform in one direction, but which cannot be easily reversed. \n

One famous example of this type of problem is the factoring problem: for carefully chosen prime numbers p and q, we can compute the product N=p*q quickly. However, given only N, it is very hard to recover p and q. \n

A common public-key cryptographic algorithm based on the factoring problem is the Rivest-Shamir-Adleman (RSA) function. When combined with an appropriate padding scheme, RSA can be used for multiple purposes, including asymmetric encryption. \n

An encryption scheme is called asymmetric if it uses one key—the public key—to encrypt data, and a different but mathematically related key—the private key—to decrypt data. \n

It must be computationally infeasible to determine the private key if the only thing one knows is the public key. Therefore, the public key can be distributed broadly while the private key is kept secret and secure. Together the keys are referred to as a key pair. \n

One popular asymmetric encryption scheme is RSA-OAEP, which is a combination of the RSA function with the Optimal Asymmetric Encryption Padding (OAEP) padding scheme. RSA-OAEP is typically only used to encrypt small amounts of data because it is slow and has ciphertexts which are much larger than the plaintext.","id":"seo-faq-pairs#what-is-asymmetric-cryptography","customSort":"5"},"metadata":{"tags":[{"id":"seo-faq-pairs#faq-collections#cryptography","name":"cryptography","namespaceId":"seo-faq-pairs#faq-collections","description":"

cryptography","metadata":{}}]}},{"fields":{"faqQuestion":"What is hybrid encryption?","faqAnswer":"

Because public-key algorithms like RSA-OAEP are less efficient than their symmetric counterparts, not commonly used to directly encrypt data. However, they do serve an important role in the cryptographic ecosystem by providing a means for key exchange. \n

In order to use symmetric encryption, parties must share a key. Although this key could be sent over an existing encrypted channel, we wouldn’t need a new key if we already had a secure channel. Instead, we solve the key exchange problem using public-key cryptography. \n

Here are two common methods for exchanging symmetric keys. \n

AWS Cryptography next steps

Check out additional product-related resources
View free offers for Security services in the cloud 
Sign up for a free account

Instantly get access to the AWS free tier. 

Sign up 
Start building in the console

Get started building in the AWS Management Console.

Sign in