Encryption: Everything should be secret
Encryption transforms 'plain text' into 'ciphertext', which the recipient can only read if they have the right 'key' to decipher it. The process is old, its use began long before the 'digitalization of the world'. Not only texts can be encrypted, but also voice recordings or (moving) images.
A particularly simple form of 'coding' is, for example, Morse code. Anyone who cannot convert the acoustic characters back into meaningful letter sequences with the help of a learned key will only hear a 'beep-beep-beep-beep'.
In the digital world, encryption is now largely automated. Anyone writing an email no longer notices that their message has been 'encrypted' before it is sent. Decryption then requires the appropriate key, which converts a ciphertext back into plain text. Most hacking attempts therefore focus on the theft of 'keys' (e.g. passwords). The carelessness of some users here is truly breathtaking. Thousands of times, sequences of digits such as '1234', 'I' or 'password' are still used.
De-ciphering' or 'deciphering' must be separated from 'key theft' or 'decryption'. This is where 'cryptanalysts' come into play, who draw conclusions about the method used from regularities in the character sequences. Historically, the 'cracking' of the German Enigma machine with the help of the Turing bomb is the most famous example.