01. End-to-end encryption encrypts data at the sender's device before transmission and decrypts it at the recipient's device, making it unreadable to any intermediaries during transmission and ensuring confidentiality and integrity.
02. Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses separate public and private keys.
03. Common symmetric algorithms include AES, DES, 3DES, and Blowfish, while RSA is an example of an asymmetric algorithm. Hybrid encryption combines the two for enhanced security.