# Encryption Basics

To proceed with a better understanding of HexaEight Authentication, it is crucial to comprehend the fundamentals of HexaEight Encryption. The reliability of strong Encryption is imperative for HexaEight Authentication.

These following three components are used while performing the encryption or decryption process.

  1. User/Resource Name
  2. User/Resource Password
  3. Asymmetric Shared Key of Destination
  • For the encryption of data to take place, it must first be converted to an acceptable format called HEByte Format.
  • HexaEight Libraries provide the necessary function to convert any raw data format to HEByte Format and vice versa.
  • After the data is converted to HEByte Format, encryption and decryption processes can be applied to it.
Encryption Process
%%{init: { 'theme': 'forest' } }%%
erDiagram
    OriginalData ||--|| HEByteFormat : Converted-Into
    HEByteFormat ||--|| Encrypted-Data : Compute-Key-And-Apply-Encryption
        HEByteFormat {
        Convert-UserName-To BigInteger
	Convert-Password-To BigInteger
	Convert-Asymmetric-Shared-Keys-To BigInteger
	Encryption Requires-UserName-Password-And-Asymmetric-Shared-Keys
	}
Decryption Process
%%{init: { 'theme': 'forest' } }%%
erDiagram
    Encrypted-Data ||--|| HEByteFormat : Compute-Key-And-Apply-Decryption
        Encrypted-Data {
        Convert-UserName-To BigInteger
	Convert-Password-To BigInteger
	Convert-Asymmetric-Shared-Keys-To BigInteger
	Decryption Requires-UserName-Password-And-Asymmetric-Shared-Keys
	}
    HEByteFormat ||--|| OriginalData : Converted-Into
Summary

HexaEight relies on three components to perform the encryption and decryption process

  • User/Resource Name
  • User/Resource Password
  • Asymmetric Shared Keys

After the generation of the Login Token, it is important to keep the User/Resource Password secure and not share it with anyone to prevent unauthorized access to the account.