Who's this for?

Answer 3 quick questions to get matched with the best protection. Firstly, choose who or what you need to cover below.

What are you most concerned about?

We'll suggest the best coverage for your concerns. Select all that apply.

How many devices do you need to protect?

For the best protection, cover every device you use online.

Creating your recommendation

norton:productquiz:iconturninggears
Did you know?
Norton technology blocks millions of cyberthreats every day.
Trusted by millions of customers around the globe.
Norton™ Mobile Security
Standard
A$32.99
A$32.99first yr

Automatically renews at {ar}/year,
unless the renewal is cancelled.
Price is subject to change.
See subscription details below.*

  • Protection for 1 iPhone® or iPad®
  • Scam Protection
  • Wi-Fi Security
  • Internet Security
  • Device Security
Norton AntiVirus
Plus
A$75.99
A$75.99first yr

Savings compared to the renewal price of {ar}/year.
See subscription details below.*

  • 1 PC or Mac
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 2 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
Norton 360
Standard
A$104.99
A$104.99first yr

Savings compared to the renewal price of {ar}/year.
Price is subject to change.
See subscription details below.*

  • 1 PC, Mac, tablet, or phone
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 10 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private internet connection
Norton Identity Advisor
Plus
A$119.99
A$119.99/first yr

Payment method required.
If not cancelled: {sale}/first year.
Then {ar}/year.
See subscription details below.*

  • Identity Restoration Support
  • Financial Monitoring​
  • Social Media Monitoring17
  • Dark Web Monitoring​§
  • Stolen Wallet assist
  • Identity Theft Insurance
Norton 360
Deluxe
A$149.99
A$149.99first yr

Savings compared to the renewal price of {ar}/year.
Price is subject to change.
See subscription details below.*

  • 3 PCs, Macs, tablets, or phones
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 50 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private internet connection
  • Dark Web Monitoring§
  • Parental Control
Norton VPN Standard
VPN
A$129.99
A$129.99first yr

Savings compared to the renewal price of {ar}/year.
See subscription details below.*

  • IP masking to hide your online activities
  • Access your favorite content across borders
  • Ad Blocker to browse without annoying ads14
  • No-log policy to ensure your privacy
  • Kill Switch to help prevent privacy exposure
  • IP Rotation and Double VPN for extra privacy
  • AI-powered protection against scams, phishing, and malware.
  • Monitoring for your info on the dark web§
  • Password Manager to use strong passwords
  • 10GB of Cloud Backup4 for valuable files
A$349.99
A$349.99first yr

Savings compared to the renewal price of {ar}/year.
See subscription details below.*

  • 10 PCs, Macs, tablets, or phones
  • Get always-on cyber protection for your business devices.
  • Get 24/7 business tech support and expert help with virusesΔ.
  • Work and bank safer online with our secure browser22.
  • Store your passwords and usernames in our encrypted vault.
  • Close security holes with our automatic Software Updater21.
  • Enjoy more reliable PCs with our cleaner and optimizer21.
  • Monitor employee identity leaks on the dark web (5 contacts)§
  • Backup up to 500GB of your data in our secure cloud21.
  • Connect to the web more safely on-the-go with our VPN.
  • Enjoy safer and more reliable PCs with Driver Updater21.
Norton 360
Premium
A$194.99
A$194.99first yr

Savings compared to the renewal price of {ar}/year.
Price is subject to change.
See subscription details below.*

  • 5 PCs, Macs, tablets, or phones
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 100 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private internet connection
  • Dark Web Monitoring§
  • Parental Control
Norton
Small Business
A$249.99
A$249.99first yr

Savings compared to the renewal price of {ar}/year.
See subscription details below.*

  • Get always-on cyber protection for your business devices.
  • Get 24/7 business tech support and expert help with virusesΔ.
  • Work and bank safer online with our secure browser22.
  • Store your passwords and usernames in our encrypted vault.
  • Close security holes with our automatic Software Updater21.
  • Enjoy more reliable PCs with our cleaner and optimizer21.
  • Monitor employee identity leaks on the dark web (5 contacts)§
  • Backup up to 250GB of your data in our secure cloud21.
Norton
Small Business
A$99.99/year

Price shown is for first year.
Plus applicable sales tax.
See subscription details below.* 

  • 5 PCs, Macs, tablets, or phones
  • Get always-on cyber protection for your business devices.
  • Get 24/7 business tech support and expert help with virusesΔ.
  • Work and bank safer online with our secure browser22.
  • Store your passwords and usernames in our encrypted vault.
  • Close security holes with our automatic Software Updater21.
  • Enjoy more reliable PCs with our cleaner and optimizer21.
  • Monitor employee identity leaks on the dark web (5 contacts)§
  • Backup up to 250GB of your data in our secure cloud21.

 

Your personalized matches

norton:productquiz:iconshieldnumber60
60-day money-back guarantee
  • Best choice

  • Better choice

  • Good choice

*Important subscription, pricing, and offer details:

  • By subscribing, you are purchasing a recurring subscription which will automatically renew.
  • The price quoted today is valid for the offered introductory term. After that, your subscription will be billed at the applicable monthly or annual renewal price here. The price is subject to change, but we will always send you a notification email in advance.

2 Requires an automatically renewing subscription for a product containing antivirus features. For further terms and conditions, please see norton.com/virus-protection-promise.
4 Only available on Windows systems (but not in S mode or on ARM processors).
21 Utilities Ultimate, Driver Updater, Software Updater, and Cloud Backup features are only available on Windows (excluding Windows in S mode and Windows running on ARM processor).
22 Private Browser is only available on Windows (excluding Windows in S mode and Windows running on ARM processor) and Mac.
Monitoring available on Windows™ PC, iOS, and Android™ devices. Not all features available on all platforms.
§ Monitoring not available in all countries and varies based on region.

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

What is encryption? How it works + types of encryption

Most of us jump online without thinking about what happens behind the scenes, trusting that the details we enter and the messages we send are safely protected. But the internet isn’t always so forgiving, and your personal information can be more exposed than you realise. Knowing how encryption works is a smart start, and using reliable security like Norton 360 Deluxe helps protect your devices and data so you can browse with greater confidence.

AV Comparatives award

2025

Approved

Anti-Phishing

av test award

2025

Top Rated Product

A woman reads about encryption on her tablet, answering the question, "What is encryption?"

What is encryption?

Encryption is a cybersecurity technique that scrambles plain, readable text into an unreadable format called ciphertext. Only someone with the matching decryption key can convert the information back into something understandable.

Each time you browse the web, sign in to an account, or make a purchase, your details pass through connected servers. Without strong protection, a cyber-criminal who intercepts that data may attempt to use it. Encryption stops that by transforming the information into something that makes no sense to anyone without the key.

You often use encryption without realising it, because many apps and websites automatically protect your information as it moves online. Whether you’re messaging your doctor, signing in to online banking, or sharing a confidential work file, encryption works in the background.

 A graphic showcases when encryption is used, further answering the question, "What is encryption?"

How does encryption work?

Imagine sealing your message in a locked box before sending it. The only person who can open the box is the one who holds the matching key. Encryption follows this same idea. It uses an encryption key to scramble data into ciphertext and relies on a corresponding decryption key to decrypt it back into readable text.

A diagram explains how encryption works, further answering the question, "What is encryption?"

These keys are created using algorithms. Although the encrypted message appears to be a jumble of characters, the algorithm arranges it so that it can be decrypted only with the correct key.

Types of encryption

Encryption keys are made up of random numerical values generated by algorithms. Symmetric and asymmetric encryption are the two most commonly used types of encryption today.

An image explains the difference between symmetric and asymmetric encryption, further answering the question, "What is encryption?"

Symmetric encryption

Symmetric encryption uses a single shared key for both encryption and decryption. This might be a password or a randomly generated string of characters. There are two styles of symmetric algorithms:

  1. Block algorithms encrypt data in fixed-sized chunks.
  2. Stream algorithms convert data one piece at a time.

Symmetric encryption is fast and efficient, which makes it ideal for everyday secure communication. Its main weakness is that both parties must hold the same secret key. If that key is intercepted, copied, or shared insecurely at any point, anyone who gets their hands on it can unlock every message protected by it. This creates a single point of failure, meaning the entire conversation is only as secure as the key itself and the way it’s exchanged.

Asymmetric encryption

Asymmetric encryption, also called public key cryptography, uses two keys instead of one. A public key is shared openly, while a private key is kept secret. Depending on what you want to achieve, the keys can be used in different ways:

  1. Encrypting with a public key ensures that only the matching private key can unlock the message.
  2. Encrypting with a private key allows the recipient to confirm the sender’s identity, because only the corresponding public key can decrypt it.

Asymmetric encryption is highly secure, but it can be slower due to longer key lengths and more complex calculations. For this reason, many systems use a combination of both symmetric and asymmetric methods.

What is an encryption algorithm?

An encryption algorithm is a set of rules that tell a device how to convert readable data into ciphertext. Although the output appears random, the algorithm follows a structured pattern, so the information can be unlocked again with the correct decryption key. Here are some of the most widely used encryption algorithms, from older systems to advanced modern standards.

  1. Data Encryption Standard (DES): Created in the 1970s, DES was once considered secure, but its 56-bit key is now too short to withstand modern attacks, making it unsuitable for protecting sensitive data.
  2. Triple DES (3DES): This method strengthened DES by applying three rounds of encryption. While more secure than DES, it still doesn’t meet today’s standards, and many systems have begun phasing it out in favour of stronger options.
  3. Advanced Encryption Standard (AES): Widely considered the industry standard, AES uses long key lengths and multiple rounds of encryption. Even a 128-bit AES key has never been cracked and would take trillions of years to brute-force crack. It’s considered the safest.
  4. Rivest-Shamir-Adleman (RSA): A popular asymmetric algorithm used for secure data transfer. Encrypting with a public key ensures only the matching private key can read the message, while encrypting with a private key allows the recipient to verify the sender’s identity.
  5. Twofish: A fast, free-to-use symmetric algorithm that relies on a 128-bit key. It is built to resist brute force attacks and works efficiently across both hardware and software.
  6. Elliptic curve cryptography (ECC): This advanced asymmetric method uses the mathematics of elliptic curves to create highly secure encryption. There is currently no known way to break the underlying mathematical problem, making it more secure than many earlier algorithms.

How encryption keeps internet browsing secure

Most trustworthy websites use Transport Layer Security, or TLS, the modern version of SSL. TLS protects information as it moves between you and a website, such as payment details or personal information you enter.

To check whether a site is using TLS, look for the padlock symbol next to the web address and the ‘s’ in https.

It’s best to use TLS-secured sites when you’re submitting sensitive information online, like tax details or licence renewals, or when your workplace requires encrypted communication.

How cybercriminals use encryption against you

Cybercriminals can use encryption maliciously through ransomware attacks that can target individuals, businesses, or even governments. Ransomware locks your files using strong encryption and demands payment to restore access. To help protect yourself:

Encryption is essential for protecting your personal information, but ransomware underscores the importance of staying alert.

Stay protected in an increasingly connected world

As more of our personal lives, work, and everyday tasks shift online, the risks of sending information through unencrypted channels become harder to ignore. Sensitive data can fall into the wrong hands without you ever knowing. Encryption helps close those gaps, but it works best when paired with reliable, always-on protection.

Norton 360 Deluxe adds that extra layer of defence by helping safeguard your devices, blocking suspicious activity, and protecting the information you share online. Focus on what you’re doing instead of worrying about who might be watching. It’s one of the simplest ways to enjoy greater peace of mind every time you browse.

FAQs

Can a hacker see encrypted data?

A hacker may be able to intercept encrypted data, but they’ll only see unreadable ciphertext unless they manage to obtain the key or break the encryption.

What is the most common encryption attack?

Brute-force attacks are the most common method for attempting to break encryption. Strong, modern encryption uses long keys that make brute-force attacks impractical.

How do you keep encrypted data safe?

Use apps with end-to-end encryption, enable device encryption, turn on two-factor authentication, and keep your systems up to date to stay protected.

Clare Stouffer
Clare Stouffer is a social media marketing manager for Norton. She has a passion for breaking down complex topics into accessible, educational content.

Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 


Want more?

Follow us for all the latest news, tips, and updates.