Ինտերնետ հասարակության Հայաստան հատված

From Symmetric to End-to-End: Encryption Mechanisms Presented in Yerevan

Whether internet communication is accessible only to its participants – or to third parties as well – depends on encryption. Encryption is a crucial tool for preventing unauthorized access and ensuring data protection and security.

This digital security tool – encryption has various levels and types, which were presented by cybersecurity engineer Areg Shmavonyan during the event titled “Encryption: The Key to a Safe Internet”, organized by the Internet Society Armenia Chapter PO.

More than 50 students from four educational institutions participated in the event, including Yerevan State University, Armenian State University of Economics, French University in Armenia, and the State College of Informatics.

“Encrypt your communication on online platforms and keep your personal, financial, legal  and even basic location  data away from prying eyes and ears,”
urged Areg Shmavonyan during his talk.

He also explained the encryption mechanisms used in popular applications, emphasizing that in some apps (such as Signal and WhatsApp), encryption is automatic, while in others (like Telegram), it is optional and must be activated by the user.

The audience was introduced to the main types of encryption:

  • Symmetric Encryption – The same key is used for both encryption and decryption. It is fast but requires high security in key storage.
  • Asymmetric Encryption – Involves a pair of public and private keys. The public key is used to encrypt data, while the private key decrypts it. This method is widely used for electronic signatures and establishing secure communication.
  • End-to-End Encryption – Ensures that only the sender and the recipient can access the content of a message, completely excluding third-party access.

The use of encryption is also a sign of responsible and safe internet behavior.

Facebook
Twitter
LinkedIn
Igor Mkrtumyan 87_result
Today marks the 87th anniversary of Igor Mkrtumyan’s birth.
IMG_8691_result
Artificial Intelligence in Medicine: Opportunities, Limitations and Responsibility
glxavor_photo_2026-03-13 12.52
Internet Governance and DNS Development Take Center Stage at ICANN85
2026-03-06 18.03
WSIS+20 Reaffirms Commitment to the Multistakeholder Model of Internet Governance
1000052388_result
“Unseen” Podcast: Advancing Media Inclusion for People with Visual Impairments
photo_2026-03-02 18.44
The “Aragats” Computer: When 28-Year-Old Sergey Mergelyan and Armenia Entered the Global Technology Arena
Կայքի համար - 11_result
Libraries on the Path to Digital Transformation: Shaping the Future
629583764_1465009568336224_3680530027662755212_n_result
What Future Should Regional Libraries Have, and How Can Their “Second Life” Be Secured in the Digital Age?
ChatGPT Image 9 Feb 2026, 13_08_04_result
A Safer Internet Starts with Each of Us: 10 Essential Steps
Safer Internet Day_result
Safer Internet Day: A Global Initiative Bringing Together Over 180 Countries
Subscribe for our newsletter.