Encryption Authority
Encryption Authority is the reference hub for data encryption standards, cryptographic mechanisms, compliance requirements, and service-sector structure across the United States. This property covers 58 published pages spanning algorithm specifications, regulatory frameworks, key management standards, and professional qualification criteria — from symmetric and asymmetric encryption fundamentals to post-quantum cryptography and FIPS 140 validation standards. The content is structured for professionals, researchers, procurement teams, and compliance officers navigating a technically dense and regulation-intensive domain.
- What the system includes
- Core moving parts
- Where the public gets confused
- Boundaries and exclusions
- The regulatory footprint
- What qualifies and what does not
- Primary applications and contexts
- How this connects to the broader framework
What the system includes
Encryption, as a technical discipline and compliance domain, spans three distinct data states — at rest, in transit, and in use — and intersects with regulatory obligations imposed by at least a dozen named federal frameworks. The scope of this reference property reflects that breadth. Coverage extends across algorithm families (symmetric, asymmetric, hybrid), cryptographic infrastructure (public key infrastructure, certificate authorities, hardware security modules), regulatory compliance contexts (HIPAA encryption requirements, PCI DSS encryption requirements), and emerging frontiers including homomorphic encryption and post-quantum cryptography.
The content library is organized into five functional clusters:
- Algorithm and mechanism reference — specifications for AES, RSA, ECC, and hash functions, with classification of their respective use cases and known vulnerabilities
- Key management and infrastructure — lifecycle stages, custody frameworks, HSM deployment, and bring-your-own-key architectures
- Compliance and regulatory mapping — sector-specific requirements under HIPAA, PCI DSS, FISMA, CMMC, and NIST guidelines
- Deployment contexts — encryption applied to databases, cloud environments, mobile devices, IoT, backup media, and email
- Threat and edge-case analysis — side-channel attacks, ransomware abuse of encryption, quantum threat modeling, and algorithm vulnerabilities
The property is part of the broader Professional Services Authority network, which coordinates reference coverage across professional and technical verticals at national scope.
Core moving parts
Encryption systems consist of four structural components that interact across any implementation: the algorithm, the key, the key management infrastructure, and the protocol layer through which encrypted data moves.
Algorithm families define the mathematical transformation. The two primary families are:
- Symmetric encryption — a single shared key encrypts and decrypts. AES-256 is the dominant standard, validated under FIPS 197 and mandatory for federal systems protecting data at the SECRET classification level.
- Asymmetric encryption — a mathematically linked key pair (public and private) governs encryption and decryption separately. RSA and Elliptic Curve Cryptography (ECC) are the principal implementations; NIST SP 800-186 specifies approved elliptic curves for federal use.
Keys are the operationally critical variable. Algorithm strength is rendered irrelevant by weak key generation, improper storage, or failure to rotate. The cryptographic key lifecycle covers generation, distribution, storage, rotation, revocation, and destruction as discrete phases, each with its own failure modes.
Key management infrastructure involves the systems — hardware security modules, key management servers, certificate authorities — that enforce custody policies. NIST SP 800-57 Part 1 Rev 5 (available at csrc.nist.gov) is the primary federal reference for key management recommendations.
Protocol layers determine how encryption is applied in transit. TLS 1.3 is the current standard for transport-layer encryption; TLS and SSL protocol versions prior to 1.2 are deprecated and represent active vulnerability surfaces. Encrypted DNS protocols (DoH and DoT) extend transport-layer protection to DNS query traffic, closing a historically unprotected channel.
Where the public gets confused
Three persistent misconceptions structure the majority of misunderstandings in this domain.
Confusion 1: Encryption and hashing are equivalent
Hashing is a one-way transformation that produces a fixed-length digest; it cannot be reversed to recover the original data. Encryption is reversible by design — the holder of the correct key can decrypt. Passwords stored as bcrypt hashes are not encrypted; they are hashed. Treating these as interchangeable leads to architectural errors, particularly in authentication system design. The hashing vs. encryption reference page addresses this distinction with technical specificity.
Confusion 2: HTTPS means end-to-end encryption
HTTPS (TLS) encrypts data between a client and a server. It does not encrypt data within the server, in the database, or during server-side processing. A web application transmitting data over HTTPS to a server that stores it in plaintext in a database is partially protected — not end-to-end. Genuine end-to-end encryption ensures that only communicating endpoints hold decryption keys, with no intermediate party able to access plaintext.
Confusion 3: Strong algorithms guarantee security
AES-256 is computationally infeasible to brute-force with current hardware. However, the algorithm's strength does not protect against weak key generation, key exposure, improper implementation, or side-channel attacks. The 2020 SolarWinds breach and the 2023 MOVEit exploitation involved authentication and access control failures — not cryptographic weaknesses. Encryption protects data confidentiality; it does not substitute for access control, patch management, or secure software development.
Confusion 4: Tokenization is a form of encryption
Tokenization replaces sensitive data with a non-sensitive surrogate (a token) that has no mathematical relationship to the original value. Unlike encryption, there is no algorithm or key that transforms a token back to the original — a lookup table or vault mediates the relationship. PCI DSS addresses tokenization and encryption as distinct controls with different applicability criteria. The tokenization vs. encryption reference maps these distinctions formally.
Boundaries and exclusions
The encryption domain has defined edges that separate it from adjacent technical disciplines.
| Concept | Relationship to Encryption | Distinction |
|---|---|---|
| Steganography | Adjacent, not equivalent | Hides the existence of a message; does not cryptographically transform its content |
| Tokenization | Complementary control | Substitution without mathematical key relationship; no decryption path |
| Hashing | Distinct primitive | One-way; no key; not reversible |
| Obfuscation | Weaker, non-cryptographic | Code or data obscuring without cryptographic guarantees |
| Access control | Complementary layer | Governs who can access data; encryption governs whether accessed data is readable |
| Digital rights management (DRM) | Applied use of encryption | Uses cryptographic mechanisms but is a policy enforcement system, not a cryptographic primitive |
| VPN | Protocol layer | Uses encryption but is a network architecture; VPN ≠ encryption policy |
Steganography vs. encryption and digital signatures are covered as distinct reference topics within this property because they are routinely conflated with encryption in procurement and compliance contexts.
The regulatory footprint
Encryption requirements appear in at least 8 named federal regulatory frameworks, each with distinct scope, enforcement authority, and technical specificity.
HIPAA Security Rule — The U.S. Department of Health and Human Services (HHS) classifies encryption as an "addressable" implementation specification under 45 CFR § 164.312(a)(2)(iv) and 45 CFR § 164.312(e)(2)(ii). Addressable does not mean optional — covered entities must implement encryption or document a justified alternative. The safe harbor provision at 45 CFR § 164.402(2) eliminates breach notification obligations when encrypted data is accessed without the corresponding key.
PCI DSS v4.0 — Published March 2022 by the PCI Security Standards Council (pcisecuritystandards.org), Requirement 3.5 mandates strong cryptography for stored primary account numbers (PANs). Requirement 4.2 mandates strong cryptography for PANs in transit. Key management must satisfy the separation-of-duties and rotation requirements specified in Requirements 3.7.1 through 3.7.9.
FISMA and FIPS 140 — The Federal Information Security Modernization Act mandates that federal agencies use FIPS-validated cryptographic modules. FIPS 140-3, administered by NIST's Cryptographic Module Validation Program (CMVP), defines four security levels for cryptographic modules. Federal procurement of encryption products requires FIPS 140 validation — FIPS 140-2 validations remain recognized under a transition period.
NIST SP 800-series — NIST publishes the primary technical standards governing federal encryption practice. SP 800-175B Rev 1 (csrc.nist.gov) provides the master guideline for cryptographic standards selection. SP 800-57 governs key management. SP 800-131A Rev 2 specifies algorithm and key-length transitions, including the deprecation of SHA-1 and 1024-bit RSA.
Export controls — The Export Administration Regulations (EAR), administered by the Bureau of Industry and Security (BIS), classify encryption products under ECCN 5E002 (software) and 5D002 (technology). Mass-market encryption products meeting specific criteria qualify for License Exception ENC under 15 CFR § 740.17, but export to certain countries and end-users remains restricted. The U.S. export controls on encryption reference covers these classifications in detail.
CMMC Level 2 — Defense contractors subject to Cybersecurity Maturity Model Certification must implement FIPS-validated encryption for Controlled Unclassified Information (CUI) per NIST SP 800-171 Rev 2 § 3.13.10, enforced by the Department of Defense.
What qualifies and what does not
Not every data-protection mechanism constitutes encryption in the regulatory or technical sense. Qualification criteria are drawn primarily from NIST and FIPS definitions.
Qualifies as encryption:
- Transformations using NIST-approved algorithms (AES, RSA, ECC, ChaCha20) with cryptographic keys of specified minimum lengths
- FIPS 140-validated module implementations for federal contexts
- TLS 1.2 or 1.3 for transport-layer encryption; TLS 1.0 and 1.1 do not qualify under current NIST guidance (SP 800-52 Rev 2)
- AES-128, AES-192, and AES-256 for symmetric encryption; RSA-2048 minimum for asymmetric (SP 800-131A Rev 2)
Does not qualify as encryption under regulatory frameworks:
- XOR masking and similar non-cryptographic transformations
- Proprietary or undisclosed algorithms ("security through obscurity")
- Hashing alone — produces a digest, not recoverable ciphertext
- Password protection on ZIP files using legacy ZipCrypto (not AES-based)
- SSL 3.0 and TLS 1.0/1.1 — deprecated; not acceptable under PCI DSS v4.0 or NIST SP 800-52 Rev 2
- RC4 stream cipher — prohibited under RFC 7465
The encryption compliance reference maps these qualification thresholds against specific regulatory frameworks.
Primary applications and contexts
Encryption deploys across a set of well-defined operational contexts, each with distinct technical requirements and compliance obligations.
Database systems — Column-level, row-level, and transparent data encryption (TDE) represent the three structural approaches to database encryption. TDE protects the database file at rest but does not protect data accessible to compromised database administrator accounts — a documented limitation addressed through column-level encryption with separate key custody.
Cloud environments — Encryption for cloud environments involves provider-managed keys, customer-managed keys (CMK), and bring-your-own-key (BYOK) architectures. The key custody model determines the trust boundary: provider-managed keys mean the provider can theoretically access plaintext; BYOK ensures only the customer holds decryption capability.
Email — S/MIME and PGP/GPG represent the two dominant email encryption standards. S/MIME is certificate-based and requires a certificate authority; PGP/GPG uses a web-of-trust model. Neither is universally deployed, creating persistent gaps in email confidentiality at the protocol level.
Mobile devices — Encryption in mobile devices is governed by hardware-backed key storage (Android Keystore, Apple Secure Enclave) and full-disk or file-based encryption modes. iOS has enforced data protection encryption since iOS 8; Android has required full-disk encryption for qualifying devices since Android 6.0 (API level 23).
IoT devices — IoT device encryption operates under severe compute and memory constraints that preclude standard AES-CBC implementations on Class 0 and Class 1 devices (as defined by RFC 7228). Lightweight cryptographic standards — including NIST's Lightweight Cryptography standardization, which selected the ASCON algorithm family in 2023 — address this constraint class.
Backup and recovery — Encryption for backup and recovery introduces a specific tension: backup encryption must be strong enough to protect data at rest on portable media, but key loss renders backups permanently unrecoverable. Key escrow and key management practices are operationally critical in this context.
How this connects to the broader framework
Encryption does not operate as an isolated control — it functions within a layered security architecture where access control, identity management, network segmentation, and incident response interact with cryptographic protections.
The cryptographic key lifecycle connects encryption strength to operational outcomes: a correctly implemented AES-256 deployment fails if keys are stored in plaintext configuration files or never rotated. Entropy and random number generation connects to algorithm strength at the implementation level — weak random number generation compromised the RSA SecurID breach in 2011 and the Debian OpenSSL vulnerability disclosed in 2008, both of which undermined cryptographically sound algorithms through implementation failures.
The quantum threat trajectory connects present-day encryption decisions to a future constraint horizon. NIST's Post-Quantum Cryptography standardization project concluded its primary selection phase in 2022, selecting CRYSTALS-Kyber (key encapsulation) and CRYSTALS-Dilithium (digital signatures) as primary standards (NIST IR 8413). Organizations deploying long-lived encryption infrastructure must account for cryptographic agility — the capacity to swap algorithm implementations without rebuilding entire systems — to remain viable as quantum threats to encryption mature.
The regulatory layer connects encryption to audit, breach notification, and civil liability. The HIPAA safe harbor provision, PCI DSS scope-reduction for tokenized environments, and GDPR Article 32 (requiring "appropriate technical measures" including encryption) all create direct financial incentives for documented encryption compliance. The data breach cost estimator and [security