Preview

Data Encryption

Good Essays
Open Document
Open Document
757 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Encryption
The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide a better understanding of data encryption. Cryptographic Methods There are two standard methods of cryptography, asymmetric encryption and symmetric encryption. Data that is in its original form (unscrambled) is called plaintext. Once the data is scrambled and in its encrypted form it is called cipher text. The cipher text, which should be unintelligible to anyone not holding the encryption key, is what is stored in the database or transmitted down the communication line.
Asymmetric encryption (also know as public key encryption) uses two separate keys, a public key and a private key. The private key is available only to the individual receiving the encrypted message. The public key is available to anyone who wishes to send data or communicate to the holder of the private key. Asymmetric encryption is considered very safe but is susceptible to private key theft or breaking of the private key (this is virtually impossible and would constitute trying billions of possible key combinations)
(4). Types of public key algorithms include Riverst-Shamir-Adelman (RSA), Diffie-Hellman, Digital Signature Standard (DSS), EIGamal, and LUC (5). Symmetric encryption uses only one key (a secret key) to encrypt and decrypt the message. No public exchange of the key is required. This method is vulnerable if the key is stolen or if the ciphertext is broken
(4). Types of symmetric algorithms include DES, Blowfish, International Data Encryption Algorithm



Bibliography: 1. Bay Networks, Inc. (1997). Configuring Software Encryption. www.baynetworks.com 2. Biasci, L. (1999). Cryptology. www.whatis.com. 3. Frazier, R.E., (1999). Data Encryption Techniques. www.softstrategies.com. 4. Litterio, F., (1999). Cryptology: The Study of Encryption. www.world.std.com. 5. SSH Communications Security, (1999). Cryptographic Algorithms. www.ipsec.com. 6. SSH Communications Security, (1999). Introduction to Cryptography. www.ipsec.com.

You May Also Find These Documents Helpful

  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cmgt/554 Week 2

    • 1453 Words
    • 6 Pages

    In order for an organization to be able to have an efficient and successful organization the proper Information Technology system (IT) must be in place, this document will demonstrate what system is in place to make sure system is running successfully.…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Case Project

    • 650 Words
    • 3 Pages

    Keys form the basic foundation for public key infrastructure and it is important that each key be carefully handled. The proper management of keys includes key storage, key usage, and key-handling procedures. There are different ways to store keys; public keys can be stored by embedding the key within digital certificates, while private keys can be stored on a person’s personal computer. However, there are drawbacks to storing keys using software; software can leave openings for an…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Data Encryption Standard (DES), ROT13, and Enigma are all examples of algorithm for the encryption of electronic data…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are many security challenges associated with digital signatures. E-Government security and e-business is implemented legally as well as practically by CryptBot e-sign. The security is planned to secure all email sending, encrypting, digitally signing, decrypting and storing and gathering all types of data in the way to authenticate. This works to maintain privacy and avoid rejection by the signer.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays

Related Topics