The IT Law Wiki


End-to-end encryption is

[e]ncryption at the point of origin in a network, followed by decryption at the destination.[1]
[t]he protection of information passed in a telecommunications system by cryptographic means, from point of origin to point of destination.[2]
[c]ommunications encryption in which data is encrypted when being passed through a network, but routing information remains visible.[3]


  1. Information Technology Security Handbook, Annex 1, Glossary.
  2. Department of Defense, National Computer Security Center, Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).
  3. NIST Special Publication 800-12.

See also[]