In monetary terms, the value of the data in a computer often exceeds the actual cost of the hardware and software of the machine. Therefore, encrypting the information data in our computer system is of utmost importance.
Encryption plays an important role in protecting data, not only for maintaining confidentiality of information but also to protect data from damage, destruction or alteration. An important part of the encryption process is that it allows verification of the source of information, just like an electronic signature, where the decryption key is available, while the secret encryption key guarantees the authenticity and integrity of a file.
The encryption technologies and algorithms are not limited by the properties of the storage media used. This means that data is modified to the extent that no useful information can be extracted from them, while the resources remain unaffected. It does not matter if the encryption algorithm is known to the public, because confidentiality is guaranteed by the secrecy of the unique key used for decryption.
Just because the encryption is independent of the characteristics of a storage or communication medium, it can be used for secure transfer of data through open communication channels and to protect data in portable storage devices that have been lost or the user has chosen to reject. Even if an offender has access to a file, he will not be able to decrypt the contents nor read them without the secret key.