{"id":19465,"date":"2021-08-30T09:46:42","date_gmt":"2021-08-30T07:46:42","guid":{"rendered":"https:\/\/leitzcloud.eu\/how-do-encryption-technologies-work\/"},"modified":"2026-04-13T12:40:18","modified_gmt":"2026-04-13T10:40:18","slug":"encryption-technologies","status":"publish","type":"post","link":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/","title":{"rendered":"How do encryption technologies work?"},"content":{"rendered":"\n<p>A <strong>secure encrypted cloud solution<\/strong> is essential for every company, but many are not exactly aware of what the different encryption methods involve or what they specifically mean.<\/p>\n\n\n\n<p>Encryption generally refers to a process that converts plaintext into unreadable characters using a key. With the help of the key, the encrypted text can be decrypted again. <\/p>\n\n\n\n<p>More and more data is being processed, stored, and transmitted digitally, which is why the need for secure encryption is increasing at the same time. The risks of data loss or misuse are well known.<br>This article aims to describe common methods in more detail and illustrate them using various examples. <\/p>\n\n\n\n<p>In general, there are various <strong>forms<\/strong> of encryption technologies. These include: <\/p>\n\n\n\n<p><a href=\"#section1\">1. Symmetric encryption<\/a><br><br><a href=\"#section2\">2. Asymmetric encryption<\/a><br><br><a href=\"#section3\">3. Hybrid encryption<\/a><\/p>\n\n\n\n<p>Accordingly, there are <strong>various methods<\/strong> that apply these forms of encryption.<\/p>\n\n\n\n<p><a href=\"#section4\">4. RSA method<\/a><\/p>\n\n\n\n<p><a href=\"#section5\">5. SSL and TLS<\/a><\/p>\n\n\n\n<p><a href=\"#section6\">6. AES-256-bit encryption<\/a><\/p>\n\n\n\n<p><a href=\"#section7\">7. End-to-end encryption<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section1\"><strong>Symmetric encryption<\/strong><\/h2>\n\n\n\n<p><strong>= also referred to as \u201csecret-key cryptography\u201d<\/strong><\/p>\n\n\n\n<p>In symmetric encryption, only one key is required for both encryption and decryption. Therefore, the key must be known to both the sender and the recipient.<br>The <strong>advantages<\/strong> are that the method is considered simple and the exchange of the message is fast. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png\" alt=\"\" class=\"wp-image-19333\" srcset=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png 600w, https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung-300x200.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Disadvantages<\/h3>\n\n\n\n<p>Since the exchange of the key should take place confidentially, this creates the key exchange problem. A secure way must be found to exchange the key without interception. The safest method would be a personal meeting, which is often not possible in practice.  <\/p>\n\n\n\n<p>If multiple messages are to be sent to different participants, the number of keys increases rapidly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Asymmetric encryption<\/strong><\/h2>\n\n\n\n<p><strong>= also referred to as \u201cpublic-key cryptography\u201d<\/strong><br><br>Asymmetric encryption requires two keys. The key used for encryption is public and accessible to everyone, while the second key used for decryption is private. <br><br>Asymmetric encryption has the <strong>advantage<\/strong> of being a method that offers a high level of security and cannot easily be broken by attackers. This method can also bypass the key exchange problem or be used to create digital signatures for authentication. <br><br>More about <a href=\"#section8\">digital signatures<\/a> can be found in the section that discusses the RSA method.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\"><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">Example<\/mark><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"section2\"><strong>Asymmetric encryption<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-center\">Assuming Anna wants to send Tom a secret message.<br>For the exchange, Tom must first generate a key pair. So that Anna can encrypt the plaintext message, she needs Tom\u2019s <strong>public key<\/strong>, which is fortunately public and therefore does not need to be communicated secretly. <\/p>\n\n\n\n<p class=\"has-text-align-center\">With the <strong>public key,<\/strong> Anna can now encrypt the message for Tom, and he can then decrypt it with his <strong>private key<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/asymmetrische-verschluesselung.png\" alt=\"\" class=\"wp-image-19326\" srcset=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/asymmetrische-verschluesselung.png 600w, https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/asymmetrische-verschluesselung-300x200.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Disadvantages<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Despite the high level of security this method provides, it is very computationally intensive and complex, especially when large amounts of data need to be encrypted.<br>As a result, the method is also much slower than symmetric encryption.<br>As a solution, <strong>hybrid encryption<\/strong> is therefore recommended.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section3\"><strong>Hybrid encryption<\/strong><\/h2>\n\n\n\n<p>Hybrid encryption is a combination of both methods. For example, a symmetric key is exchanged using the asymmetric method, so that the actual communication takes place symmetrically. <br><br>This not only avoids the computationally intensive and slow asymmetric method, but also bypasses the key exchange problem.<\/p>\n\n\n\n<p><mark style=\"background-color:#ffffff\" class=\"has-inline-color has-black-color\">Key pairs can, for example, be generated using the <strong>Diffie-Hellman method<\/strong>. This method is based on mathematical calculations and information exchanged between the communication partners. <\/mark><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"450\" height=\"311\" src=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/verschluesselung.png\" alt=\"\" class=\"wp-image-19332\" srcset=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/verschluesselung.png 450w, https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/verschluesselung-300x207.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Learn more about the encryption of leitzcloud on our website.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/leitzcloud.eu\/en\/encryption\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Learn more<\/mark><\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section4\"><strong>RSA method<\/strong><\/h2>\n\n\n\n<p>The name <strong>RSA <\/strong>is derived from the initials of the mathematicians who discovered the method. It is one of the most widely used asymmetric methods, used for encryption and the creation of <strong>digital signatures<\/strong>.<br><br>RSA has the property that plaintext letters do not always correspond to the same ciphertext letters. In addition, it consists of a key pair\u2014the private key cannot be derived from the public key. This method is therefore considered secure, as there is currently no algorithm that can factor a number larger than 789 bits into its prime factors. Modern RSA encryption therefore has a minimum key length of 3072 bits.   <br><br>To decrypt an RSA system, additional information is required, which is only contained in the private key.<br>The private key is based on a one-way function, meaning the function is easy to compute but cannot be reversed. With the required additional information, however, the inversion can be performed easily. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\"><mark style=\"background-color:#abb8c3\" class=\"has-inline-color\">Excursion<\/mark><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section8\">RSA signatures<\/h2>\n\n\n\n<p>As mentioned at the beginning, the RSA method can be used to create a digital signature that serves to authenticate the sender.<\/p>\n\n\n\n<p>Unlike asymmetric encryption, the sender creates the digital signature of the message using their private key, allowing the recipient to verify the digital signature with the public key. A distinction can be made between a universal and a <strong>non-universal <\/strong>signature. <\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">Non-universal signature<\/td><td class=\"has-text-align-center\" data-align=\"center\">Universal signature<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">A signature is created with the private key and attached to the transmitted message. If a third party intercepts the communication channel, they can also verify the sender\u2019s authentication.* <\/td><td class=\"has-text-align-center\" data-align=\"center\">The digital signature is additionally encrypted with the recipient\u2019s public key, so that only the recipient can verify the sender\u2019s authenticity.<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><em>*The authenticity of the sender does not necessarily need to be kept confidential at this point.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section5\"><strong>SSL and TLS<\/strong><\/h2>\n\n\n\n<p>SSL is the abbreviation for \u201cSecure Sockets Layer\u201d and describes the layers used by the encryption protocol during data exchange between two computers. Communication between them is encrypted and therefore protects against access by third parties. <\/p>\n\n\n\n<p>The main task of SSL is to give the web user the assurance that they are communicating securely with the server and to secure the HTTP protocol (Hypertext Transfer Protocol). The URL is displayed as HTTPS when the website is protected by an SSL certificate. It can also be recognized by a padlock icon in the URL bar or by it loading in green.  <\/p>\n\n\n\n<p><strong>TLS<\/strong> (\u201cTransport Layer Security\u201d) is the more modern version of SSL, offering higher security. Since SSL is still much more widely known than TLS today, it is often still referred to as SSL, or the combined term SSL\/TLS is used. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How exactly does it work?<\/h3>\n\n\n\n<p>SSL certificates verify online identity and consist of a key pair and verified identification data. Certificates can be requested from a certification authority. <\/p>\n\n\n\n<p>During a connection, the identity of the web server is requested, so a copy of the SSL certificate is sent to the requesting browser.<br>After the browser verifies the trustworthiness, the server can send back a digitally signed confirmation. If everything matches, an SSL-encrypted session can now be established. <\/p>\n\n\n\n<p>This process is called an \u201c<strong>SSL handshake.<\/strong>\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/ssl-handshake.png\" alt=\"\" class=\"wp-image-19329\" srcset=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/ssl-handshake.png 600w, https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/ssl-handshake-300x200.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section6\"><strong>AES-256-bit encryption<\/strong><\/h2>\n\n\n\n<p>The <a href=\"https:\/\/leitzcloud.eu\/en\/encryption\/\">AES method<\/a> is a symmetric encryption scheme, meaning only one key is used.<br>AES is a block cipher whose block size depends on the key length. The length is therefore available in 128, 192, and 256 bits. <\/p>\n\n\n\n<p>The predecessor DES (\u201cData Encryption Standard\u201d) was replaced by AES (\u201c<strong>Advanced Encryption Standard<\/strong>\u201d) due to its short key length of 56 bits. As computer processing power increased, DES could no longer guarantee sufficient security.<\/p>\n\n\n\n<p>The special feature of this encryption technology is the transformation that is applied to each block.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\"><mark style=\"background-color:#abb8c3\" class=\"has-inline-color\">Example<\/mark><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-4-encryption-rounds\">The 4 encryption rounds<\/h2>\n\n\n\n<p>The encryption uses four different methods to transform the blocks. These methods are applied repeatedly in multiple successive rounds. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Substitution method<\/h4>\n\n\n\n<p>Each byte is encrypted using a substitution box\u2014here, a rule is defined that determines which value a byte is replaced with.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. Shift Row<\/h4>\n\n\n\n<p>The rows of the table are shifted to the right by a certain number of columns\u2014the overflowing cells are appended on the left.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. Mix Column<\/h4>\n\n\n\n<p>The columns are multiplied by a specific matrix\u2014the bytes are not treated as numbers, but as polynomials.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4. Key Addition<\/h4>\n\n\n\n<p>Each block is linked with the current round key using XOR\u2014the XOR operation is performed bit by bit.<\/p>\n\n\n\n<p><mark style=\"background-color:#ffffff\" class=\"has-inline-color\">This method is used in <strong>various areas<\/strong>, including data transmission via Wi-Fi or VPNs, as well as general data transfer.<\/mark><br><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"351\" src=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/web-security.png\" alt=\"\" class=\"wp-image-19331\" srcset=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/web-security.png 500w, https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/web-security-300x211.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center\">Test leitzcloud now as a secure cloud solution<\/h4>\n\n\n\n<p class=\"has-text-align-center\">Secure your data in a securely encrypted cloud, with a <a href=\"https:\/\/leitzcloud.eu\/en\/secure-data-centers\/\">sustainable data center<\/a> in Germany.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/leitzcloud.eu\/en\/start-your-trial-2\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Store Data Securely Now<\/mark><\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section7\"><strong>End-to-end encryption<\/strong><\/h2>\n\n\n\n<p><strong>= also referred to as \u201cend-to-end encryption\u201d<\/strong><\/p>\n\n\n\n<p>End-to-end encryption fully encrypts the data between sender and recipient and can only be decrypted using the intended recipient\u2019s key. Encryption and decryption therefore take place exclusively at the endpoints of the transmission. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How exactly does it work?<\/h3>\n\n\n\n<p>With end-to-end encryption (E2EE), multiple encryption methods are used, so hybrid encryption is typically employed for the key exchange.<\/p>\n\n\n\n<p>The transmitted data is encoded using symmetric AES-256 encryption and additionally authenticated at the communication endpoints through a digital SSL certificate.<br>For even greater security, a digital signature can be added to the encryption to verify access authorization.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/ende-zu-ende-verschluesselung.png\" alt=\"\" class=\"wp-image-19330\" srcset=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/ende-zu-ende-verschluesselung.png 600w, https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/ende-zu-ende-verschluesselung-300x200.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Advantages<\/h3>\n\n\n\n<p>End-to-end encryption (E2EE) enhances data protection, as there is no access to personal data and it simultaneously prevents unauthorized access to data exchange.<\/p>\n\n\n\n<p>Additionally, it is a tamper-proof method, as the key that grants access is only known to the sender and the recipient.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A secure encrypted cloud solution is essential for every company, but many are not exactly aware of what the different encryption methods involve or what they specifically mean. Encryption generally refers to a process that converts plaintext into unreadable characters&#8230;<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-19465","post","type-post","status-publish","format-standard","hentry","category-articles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How do encryption technologies work? - leitzcloud by vBoxx<\/title>\n<meta name=\"description\" content=\"Encryption explained simply: How modern technologies secure your data in the cloud and protect it from unauthorized access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do encryption technologies work?\" \/>\n<meta property=\"og:description\" content=\"Encryption explained simply: How modern technologies secure your data in the cloud and protect it from unauthorized access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"leitzcloud by vBoxx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/leitzcloudbyvboxx\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-30T07:46:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T10:40:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png\" \/>\n<meta name=\"author\" content=\"Lea Juelicher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@leitzcloud\" \/>\n<meta name=\"twitter:site\" content=\"@leitzcloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lea Juelicher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/\"},\"author\":{\"name\":\"Lea Juelicher\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/person\\\/e98466594c5f872672e7da855427696d\"},\"headline\":\"How do encryption technologies work?\",\"datePublished\":\"2021-08-30T07:46:42+00:00\",\"dateModified\":\"2026-04-13T10:40:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/\"},\"wordCount\":1471,\"publisher\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/symmetrische-verschluesselung.png\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/\",\"name\":\"How do encryption technologies work? - leitzcloud by vBoxx\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/symmetrische-verschluesselung.png\",\"datePublished\":\"2021-08-30T07:46:42+00:00\",\"dateModified\":\"2026-04-13T10:40:18+00:00\",\"description\":\"Encryption explained simply: How modern technologies secure your data in the cloud and protect it from unauthorized access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/symmetrische-verschluesselung.png\",\"contentUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/symmetrische-verschluesselung.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryption-technologies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How do encryption technologies work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/\",\"name\":\"leitzcloud by vBoxx\",\"description\":\"Einfacher Datenaustausch und Zusammenarbeit in der Business-Cloud mit maximalem Datenschutz!\",\"publisher\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#organization\"},\"alternateName\":\"leitzcloud\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#organization\",\"name\":\"leitzcloud by vBoxx\",\"alternateName\":\"leitzcloud\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/leitzcloudLogo.png\",\"contentUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/leitzcloudLogo.png\",\"width\":1499,\"height\":304,\"caption\":\"leitzcloud by vBoxx\"},\"image\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/leitzcloudbyvboxx\\\/\",\"https:\\\/\\\/x.com\\\/leitzcloud\",\"https:\\\/\\\/www.instagram.com\\\/leitzcloud\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/leitzcloud\\\/\"],\"description\":\"Sichere Cloud-L\u00f6sungen f\u00fcr Ihr Unternehmen Zuverl\u00e4ssiger Schutz f\u00fcr Ihre Dateien, Kommunikation und Passw\u00f6rter \u2013 entwickelt und gehostet in Deutschland f\u00fcr maximale Datensicherheit. Entdecken Sie u.A. unsere sichere Cloudl\u00f6sung aus Deutschland.\",\"email\":\"kontakt@leitz-cloud.com\",\"telephone\":\"+49 69 8700 5778\",\"legalName\":\"LC by vBoxx GmbH\",\"foundingDate\":\"2019-10-02\",\"vatID\":\"DE326895475\",\"taxID\":\"DE326895475\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"ownershipFundingInfo\":\"https:\\\/\\\/leitzcloud.eu\\\/impressum\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/person\\\/e98466594c5f872672e7da855427696d\",\"name\":\"Lea Juelicher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g\",\"caption\":\"Lea Juelicher\"},\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/author\\\/l-juelicher\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How do encryption technologies work? - leitzcloud by vBoxx","description":"Encryption explained simply: How modern technologies secure your data in the cloud and protect it from unauthorized access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/","og_locale":"en_US","og_type":"article","og_title":"How do encryption technologies work?","og_description":"Encryption explained simply: How modern technologies secure your data in the cloud and protect it from unauthorized access.","og_url":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/","og_site_name":"leitzcloud by vBoxx","article_publisher":"https:\/\/www.facebook.com\/leitzcloudbyvboxx\/","article_published_time":"2021-08-30T07:46:42+00:00","article_modified_time":"2026-04-13T10:40:18+00:00","og_image":[{"url":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png","type":"","width":"","height":""}],"author":"Lea Juelicher","twitter_card":"summary_large_image","twitter_creator":"@leitzcloud","twitter_site":"@leitzcloud","twitter_misc":{"Written by":"Lea Juelicher","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/#article","isPartOf":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/"},"author":{"name":"Lea Juelicher","@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/person\/e98466594c5f872672e7da855427696d"},"headline":"How do encryption technologies work?","datePublished":"2021-08-30T07:46:42+00:00","dateModified":"2026-04-13T10:40:18+00:00","mainEntityOfPage":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/"},"wordCount":1471,"publisher":{"@id":"https:\/\/leitzcloud.eu\/en\/#organization"},"image":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png","articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/","url":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/","name":"How do encryption technologies work? - leitzcloud by vBoxx","isPartOf":{"@id":"https:\/\/leitzcloud.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/#primaryimage"},"image":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png","datePublished":"2021-08-30T07:46:42+00:00","dateModified":"2026-04-13T10:40:18+00:00","description":"Encryption explained simply: How modern technologies secure your data in the cloud and protect it from unauthorized access.","breadcrumb":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/#primaryimage","url":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png","contentUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2026\/03\/symmetrische-verschluesselung.png"},{"@type":"BreadcrumbList","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryption-technologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/leitzcloud.eu\/en\/"},{"@type":"ListItem","position":2,"name":"How do encryption technologies work?"}]},{"@type":"WebSite","@id":"https:\/\/leitzcloud.eu\/en\/#website","url":"https:\/\/leitzcloud.eu\/en\/","name":"leitzcloud by vBoxx","description":"Einfacher Datenaustausch und Zusammenarbeit in der Business-Cloud mit maximalem Datenschutz!","publisher":{"@id":"https:\/\/leitzcloud.eu\/en\/#organization"},"alternateName":"leitzcloud","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/leitzcloud.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/leitzcloud.eu\/en\/#organization","name":"leitzcloud by vBoxx","alternateName":"leitzcloud","url":"https:\/\/leitzcloud.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2024\/10\/leitzcloudLogo.png","contentUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2024\/10\/leitzcloudLogo.png","width":1499,"height":304,"caption":"leitzcloud by vBoxx"},"image":{"@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/leitzcloudbyvboxx\/","https:\/\/x.com\/leitzcloud","https:\/\/www.instagram.com\/leitzcloud\/","https:\/\/www.linkedin.com\/company\/leitzcloud\/"],"description":"Sichere Cloud-L\u00f6sungen f\u00fcr Ihr Unternehmen Zuverl\u00e4ssiger Schutz f\u00fcr Ihre Dateien, Kommunikation und Passw\u00f6rter \u2013 entwickelt und gehostet in Deutschland f\u00fcr maximale Datensicherheit. Entdecken Sie u.A. unsere sichere Cloudl\u00f6sung aus Deutschland.","email":"kontakt@leitz-cloud.com","telephone":"+49 69 8700 5778","legalName":"LC by vBoxx GmbH","foundingDate":"2019-10-02","vatID":"DE326895475","taxID":"DE326895475","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"ownershipFundingInfo":"https:\/\/leitzcloud.eu\/impressum\/"},{"@type":"Person","@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/person\/e98466594c5f872672e7da855427696d","name":"Lea Juelicher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g","caption":"Lea Juelicher"},"url":"https:\/\/leitzcloud.eu\/en\/blogs\/author\/l-juelicher\/"}]}},"_links":{"self":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts\/19465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/comments?post=19465"}],"version-history":[{"count":3,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts\/19465\/revisions"}],"predecessor-version":[{"id":19948,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts\/19465\/revisions\/19948"}],"wp:attachment":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/media?parent=19465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/categories?post=19465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/tags?post=19465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}