Sunday, January 31, 2016

ENCRYPTION


When we hear of data security, one of the terms we hear most often is encryption. But how many people does actually know what encryption is? Let’s get to know about encryption a little bit more.

The word encryption is derived from the Greek word kryptos, which means concealed or secret. The encryption use is almost as ancient as the art of communication itself. Before the introduction of the Diffie-Hellman key exchange and RSA algorithms, governments and their armies were the only real users of encryption. With the introduction of Diffie-Hellman and RSA led to the extensive use of encryption in the consumer and commercial areas to safeguard data both being sent across a network, which is called the data in transit and stored on flash drive, smartphone or a hard drive which is called data at rest.
Encryption is the method of changing an original message into an arrangement that cannot be used by unsanctioned persons. With this procedure, anybody that does not have the understanding and equipment to change an encrypted message back to its original format will be incapable of deciphering it. The science of encryption is known as cryptology and it incorporates two disciplines, which is known as cryptography and cryptanalysis. Cryptography comprises of procedures that is involved in coding and deciphering messages so that others cannot comprehend them. Cryptanalysis is the procedure of decrypting the original message or plaintext from an encoded message or ciphertext without the knowledge of keys and algorithms used to perform the encryption.


Data that is frequently signified to as the plaintext is encrypted using an encryption algorithm and an encryption key. This procedure creates ciphertext, which can only be viewed, in its original form if decrypted with the right key. Decryption is merely the opposite of encryption, following the same procedure but reversing the order in which the keys are applied. Currently encryption algorithms are separated into two categories: symmetric and asymmetric. Symmetric encryption algorithms can be separated into stream ciphers and block ciphers. Stream ciphers encrypt a single bit of plaintext at a time, while block ciphers take a number of bits, which is normally 64 bits in modern ciphers, and encrypt them as a single unit. Some of the example of common symmetric encryption algorithms is blowfish, cast 5, serpent etc. Asymmetric encryption algorithms also known as public key algorithms, on the other hand use different keys for encryption and decryption. The decryption key cannot be derived from the encryption key. Public key procedures are significant as they can be used for transmitting encryption keys or other data securely even when the parties have no chance to concur on a secret key in private. Some of the common asymmetric encryption algorithms are RSA encryption algorithm, Diffie-Hellman, Digital Signature Algorithm etc.
The knowledge of the distinctive states of data can be of help in choosing the kinds of encryption and security measures that are suitable for protecting it. There are three fundamental states of data: data at rest, data in motion, and data in use. Data at rest is a term that signifies to data stored on a device or backup medium in any arrangement. It can be data stored on hard drives, in offsite cloud backup, backup tapes, or even on mobile devices. It makes it a data at rest because it is an inactive data that is not presently being transferred across a network or actively being read or processed. Data at rest is normally in a constant state. The second stage of data is data in motion. It is a data that is presently moving across a network or sitting in a computer’s RAM prepared to be read, updated, or processed. Data passing through the networks from local to cloud storage or from a central mainframe to a remote terminal must be encrypted so that it becomes impossible to read or be manipulated by hacker or any machine amid the data’s destination and the source. This data in motion contains data moving through cables and wireless transmission and it can also be emails or files transferred over FTP or SSH. The third stage is the data in use. It is a data that is not just being kept inactively on an external storage media or hard drive but is being processed by one or more applications. The data is presently in the process of being created, updated, added, or deleted. It also comprises data being watched by users retrieving it through numerous endpoints. Data in use is vulnerable to different kinds of threats contingent upon where it is in the system and who is able to use it. The most defenseless point for data in use is at the endpoints where users are able to access and interact with it.
Data at rest may exist on any kind of long-lasting storage media, such as disk or tape. The media is protected using encryption procedures, which gives the advantage of preventing it from reading or writing of data without the accurate decryption key. Algorithms used in encryption guarantees that reading data without the right key is almost impossible. One of the big disadvantages of encrypting a data at rest as it relates to keys is that the security of data turns out to be the security of the encryption key. If one looses that security key then they successfully lose the data. Encrypting data and generating the keys is essential to encrypt and decrypt the data and it can be very expensive. Regardless of the type of encryption used, the systems performing the heavy lifting must have accessible resources.

References

ASPG. (2015, n.d n.d). The Three States of Digital Data. Retrieved January 28, 2016, from Advanced Software Products Group: http://aspg.com/three-states-digital-data/#.VVdx01yNQRY
E&D.com. (2015, n.d n.d). Encryption Algorithms. Retrieved January 28, 2016, from Encryption and Decryption.com: http://www.encryptionanddecryption.com/algorithms/encryption_algorithms.html
Mattord, M. E. (2014). Management of Information Security (Fourth ed.). Stamford, Connecticut: Cengage Learning.
Rouse, M. (2015, n.d n.d). Encryption. Retrieved January 28, 2016, from Tech Target Search Security: http://searchsecurity.techtarget.com/definition/encryption
Tangient LLC. (2015, n.d n.d). Encryption Advantages and Disadvantages. Retrieved January 28, 2016, from Networking116: http://networking116.wikispaces.com/Encryption+Advantages+and+Disadvantages
Rakhmanov, M. (2011, February 23). Picture Credit: Network Encryption in Modern Relational Database Management Systems. Retrieved January 28, 2016, from Team Shatter: http://www.teamshatter.com/topics/general/team-shatter-exclusive/network-encryption-in-modern-relational-database-management-systems/ 

No comments:

Post a Comment