Scrambling data so that it can only be read by a computer with the appropriate key
Encryption key converts the message into an unreadable form
Message can be decrypted only by someone with the proper key
Private key encryption – senders and receivers share the same key
Public key encryption – encryption software generates the key