ALERT

[LAST CHANCE] Data Layer: Modern Business, Defined

End-to-End Encryption (E2EE)

Definition - What does End-to-End Encryption (E2EE) mean?

End-to-end encryption (E2EE) is a method used for securing encrypted data while it is moving from the source to the destination. The objective of end-to-end encryption is to encrypt data at the Web level and to decrypt it at the database or application server. It can solve the problem of revealing data while net sniffing if a Web server has been compromised. If implemented with trusted algorithms, end-to-end encryption can provide the highest level of data protection.

Techopedia explains End-to-End Encryption (E2EE)

In end-to-end encryption, the user initiates the encryption from a source device. This also provides greater flexibility to the user in deciding which data to encrypt. In this encryption method, the routing information, addresses, headers and trailers are not encrypted. Moreover, at each hop in the network, the headers and trailers do not undergo decryption or encryption. The hop computers read the routing information and pass on the data packets to their path.

The advantages of end-to-end encryption are as follows:
  • A separate key is not required for the decryption of the packet data in the hop computer on the network.

  • Greater flexibility to the user in deciding which data to encrypt. Selective encryption provides great help in the case of sensitive data.

  • Availability of choosing specific configurations helps in higher modularization of the functionality.

  • The file size involved is smaller, and the processing uses only a minimal yet sufficient set of resources and encryption time.
One disadvantage of end-to-end encryption is that the routing information, headers and trailers are not protected as they are not encrypted.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.