Free Essay

Different Types of Encryption

In:

Submitted By 123happy
Words 1201
Pages 5
Different types of Encryption

Esther Dyson, a former journalist and Wall Street analyst have said that Encryption is a powerful defensive weapon for free people. It offers a technical guarantee of privacy, regardless of who is running the government. It's hard to think of a more powerful, less dangerous tool for liberty. To explain this interesting statement, it is important to define the term Encryption. “Encryption is the conversion of a message or data file into a form that cannot be understood by unauthorized readers.” (Dyson) Encryption can be thought as locking something valuable into a strong box with a key. Sensitive data is encrypted by using a key algorithm, which renders it unreadable without the knowledge of the key. Data encryption keys are determined at connect time between a connection and the computer on the other end. The use of data encryption can be initiated by a personal computer or by the server it’s connecting to. On these terms, “Encryption is the technology that makes E-COMMERCE possible because it underlies the security systems used to protect electronic financial transactions.” (Dyson)
Similarly, Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford University, gives another definition for the term. “Encryption is a method for users to securely share data over an insecure network or storage server.” (Boneh, Sahai and Waters) Since there are many transactions people do every day such as online banking or online shopping, it is necessary to make sure that they are done safely with the use of Encryption.
As a matter of fact, the applications of encryption are very important. First of all we have data protection. Here we are referring to files and email encryption. The data is protected in the hard disk in case a hacker gets into the system. However, if the person who has the key of the encryption to decode the message shares it, then the encryption will not be effective. On the other hand, Encryption is also used for authentication which means proof of identification. For example, if the user wants to log into a system using his or her username and password, all the details will be sent over the network already encrypted. This is the reason why an additional ‘s’ will appear next to http.
With this in mind, it is essential to mention that since the 1970, Modern Cryptography has been creating methods and techniques to avoid activities such as hacking, sniffing, etc. Here my personal experience serves as an illustration. I remember going to Dunken Donuts to have a coffee and “play” with my Kindle Fire HD. I went to Facebook and then I decided to get to bankofamerica.com to check my debit balance. I have always heard about the possibility of having my bank account hacked, but I never really thought it could ever happen to me, which is not very wise. So I stopped going in public places to check my bank account until I found out that my bank has actually an encrypted web site, and therefore it is very safe. Here is the reason why I found very interesting to find out what encryption is and how it actually works.
For the purpose of understanding how Encryption works, a common classification of Encryption is given now. The first method of encryption ever created is known as Symmetric Key, which is also known as a single key encryption. This method uses the same key to encrypt and decrypt the message. There are two types of algorithms for Symmetric Key: The Stream Cipher and the Block Cipher. In the Stream Cipher the plain text are encrypted one at the time, and each bits of plain text are then converted into sequential changing digits. In the Block Cipher a block of plain texts are encrypted, and each block has fixed length and unwavering digits. An example is AES. We can clearly see that Encryption is merely converting data from its normal, readable state that it is called here plaintext to secure data called cipher text that can only be read by a recipient that has a secret key. But this method did not provide much security at that time because what if someone gets hold of the key and is able to decipher the message.
Consequently, the method that arose to better the previous method is the Asymmetric Encryption. According to Dr. Kamaljit, member of the Amitya Institute of Technology and Science in Gujarat, India “Asymmetric Encryption uses two different keys for encryption and decryption. A public key is used for the encryption and then a private one for the decryption”. Therefore, Asymmetric Encryption is like a combination of public and private key. “Private Key is only known by your computer,” he continues, while the private key is given to other computers with which it wants to communicate securely. Everyone can have a public key, but in order to decode the message we need a private key.” (Lakhtaria) Asymmetric Encryption is also known as Public key encryption, and PGP (Pretty Good Privacy) is one of the most popular ones. Also we have RSA and El –Gamal.
Furthermore, to continue with our outline about the improvements on Encryption, Boneh, Sahai, and Waters in their article Functional Encryption talk about a more recent method of encryption. Previously, we mentioned that asymmetric encryption needs two different keys to be able to decode a message, and it is also pretty much like “all or nothing,” meaning that asymmetric decryption can only decode the entire plain text or learns nothing about the plaintext. To solve this issue, in functional encryption the decryption key may reveal only partial information about the plaintext. For example, functional decryption is able to decrypt an encrypted image but nothing else. So with this new method, Boneh sustains: “A decryption key enables a user to learn specific function of the encrypted data and nothing else.”
Finally, Biometric Encryption is a new process that joins the PIN or key to biometric. “It is not possible to get key or biometric from the stored master file/template. The key can be recreated only by producing the live biometric sample on the verification. The digital key is randomly generated on sign up; the user will not have a clue about it. The key is completely independent of the biometrics. Once the biometric is obtained, the biometric algorithm will attach the key to the biometric securely, and stores as the private template. Once the registration is over both key and biometrics is discarded.” (Lakhtaria)
In the final analysis, it is safe to say that Encryption has become one of the most important technologies in the safety and security industry. The challenge now is to ensure that these methodologies are able to handle new ways of stealing private information and to completely satisfy companies and personal needs.

Works Cited

Boneh, Dan, Amit Sahai and Brent Waters. "Functional Encryption." A New Vison for Public Key Cryptography (2012): 56-64. 13th October 2013.
Dyson, Esther. "Encryption. Essential Internet." (2003): 77-79.
Lakhtaria, Kamaljit. "Protecting Computer Network with Encryption Technique: A Study." International Journal of U-2E- Service Science of Technology 42 (2011): 43-51. Academic Search Complete. 15 October 2013.

Similar Documents

Premium Essay

It255

...2. Cryptography: Overview An overview of the main goals behind using cryptography will be discussed in this section along with the common terms used in this field. Cryptography is usually referred to as "the study of secret", while nowadays is most attached to the definition of encryption. Encryption is the process of converting plain text "unhidden" to a cryptic text "hidden" to secure it against data thieves. This process has another part where cryptic text needs to be decrypted on the other end to be understood. Fig.1 shows the simple flow of commonly used encryption algorithms. Fig.1 Encryption-Decryption Flow As defined in RFC 2828 [RFC2828], cryptographic system is "a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context." This definition defines the whole mechanism that provides the necessary level of security comprised of network protocols and data encryption algorithms. 2.1 Cryptography Goals This section explains the five main goals behind using Cryptography. Every security system must provide a bundle of security functions that can assure the secrecy of the system. These functions are usually referred to as the goals of the security system. These goals can be listed under the following five main categories[Earle2005]: Authentication: This means that before sending and receiving data using the system, the receiver and sender identity should be verified...

Words: 6825 - Pages: 28

Premium Essay

Implement a Vpn Tunnel Between a Microsoft Server and Microsoft Client

...environment. There are two different things that I checked off for configuring the VPN but the role that actually allows the VPN to work is the Routing and Remote Access Services role. 2. What was the IP host range that was allocated for the remote VPN client pool? The IP host range that was set up for the VPN had three IPs from 172.30.0.20 to 172.30.252 3. How many encryption settings are available from the remote access server? Which one is the best? Which one provides backward compatibility? There were three different encryption settings. They are Basic Encryption (MPPE 40-bit), Strong Encryption (MPPE 56-bit), and Strongest encryption (MPPE 128-bit). The strongest is the MPPE 128-bit encryption but it is not backwards compatible. The MPPE 40-bit is backwards compatible though. 4. During a remote access session how many times is a client asked to provide credentials? Is this an example of multi-factor authentication? Explain. I was only asked one time to login to the remote access through VPN, but if I was asked multiple times it would still not be considered multi-factor authentication. The reason for this is that multi-factor authentication is where there are different ways to authenticate who you are not just the same login over and over that is just considered authentication. 5. Why is it important to use strong encryption in both authentication and communication protocols? Explain. It is important to have strong encryption in authentication and communication...

Words: 639 - Pages: 3

Premium Essay

Sandwich Blitz Unit 7 Checkpoint

...Encryption My third critical thinking will be discussing and analyzing encryption. In the first part, I will be pretending that I am a chief officer of information technology at a retail store in Medina which has five thousand customers subscribing to its electronic services. In the second part, I will be providing a report about the necessity of using encryption methods for the available electronic services to achieve a higher security level. In the third part, I will be providing a diagram for encryption. In the fourth part, I will be adding recommendations related to encryption. In the last part, I will be adding my point of view and will be ending my report with conclusion and references. Encryption is defined as a method of converting electronic information into a secret codes, called cipher text, which cannot be easily understood by normal users except authorized parties. Additionally, the aim of encryption is to protect secret information for government or commercial companies from getting hacked or stolen by perpetrators or hackers....

Words: 734 - Pages: 3

Free Essay

Encryption and Its Uses in Communication

...Encryption is a very important aspect of our daily lives. Everywhere we go and everything we do now involves some sort of encryption technology. From turning on our cars to using a card access to gain entry to our workplace, encryption is there. More specifically, encryption in communication is a vital component to everyday life. Without encryption, our lives would be much different and unsecure. According to Oded Goldreich (2004), There are 2 main types of encryption: One is called Symmetric-key and the other is public-key encryption (pp 375-376). The Symmetric-key algorithm uses the same cipher for both encryption and decryption. Conversely, the public-key algorithm requires 2 separate keys. One of these keys encrypts the text or message and the other decrypts it. A big drawback to using the Symmetric-key system is that both parties must possess the single, shared key (Mullen & Mummert, 2007). The public-key system kept both parties having separate keys that neither even knew about, but could still decipher the message. Encryption is defined as the activity of converting data or information into code. There are a lot of different ways that we use encryption. Cell phones, web browsers, wireless access, and computer passwords are all different types of communication encryption. Encryption is definitely not a new technology. It has been used by militaries and governments to communicate secretly for years. Cell phones are a prime example of the encryption we use today. In fact...

Words: 1437 - Pages: 6

Free Essay

Symmetric Key Encryption

...Symmetric key encryption is also known as shared-key, single-key, secret-key, and private-key or one-key encryption. In this type of message encryption, both sender and receiver share the same key which is used to both encrypt and decrypt messages. Sender and receiver only have to specify the shared key in the beginning and then they can begin to encrypt and decrypt messages between them using that key. Examples include AES (Advanced Encryption Standard) and TripleDES (Data Encryption Standard). Advantages - Simple: This type of encryption is easy to carry out. All users have to do is specify and share the secret key and then begin to encrypt and decrypt messages. - Encrypt and decrypt your own files: If you use encryption for messages or files which you alone intend to access, there is no need to create different keys. Single-key encryption is best for this. - Fast: Symmetric key encryption is much faster than asymmetric key encryption. - Uses less computer resources: Single-key encryption does not require a lot of computer resources when compared to public key encryption. Disadvantages - Need for secure channel for secret key exchange: Sharing the secret key in the beginning is a problem in symmetric key encryption. It has to be exchanged in a way that ensures it remains secret. - Too many keys: A new shared key has to be generated for communication with every different party. This creates a problem with managing and ensuring the security of all these keys. - Origin...

Words: 729 - Pages: 3

Free Essay

Symmetric and Asymmetric

...symmetric and asymmetric symmetric and asymmetric...

Words: 628 - Pages: 3

Free Essay

General Introductio

...NATIONAL UNIVERSITY OF RWANDA FACULTY OF APPLIED SCIENCES DEPARTMENT OF COMPUTER SCIENCE ACADEMIC YEAR 2011 Performance analysis of Encryption/Decryption algorithms using SimpleScalar By: MANIRIHO Malachie and NIZEYIMANA Jean-Paul Supervisor: Dr.-Ing. NIYONKURU Adronis Huye, 2011 CHAPTER ONE: GENERAL INTRODUCTION 1.1. BACKGROUND TO THE STUDY There are various security measures that can be imposed in order to secure the information stored. As more and more technologies evolve, an irresponsible person may try to find a way to excavate any loopholes within the system in order to penetrate into the heart of its weaknesses. This is due to the fact that human-made designs can also be broken by another human. Thus, over time security measures must constantly be reviewed and strengthened in order to combat hackers or culprits hot on the heels of system developers who are also using high technologies. One of the means to secure the data is to apply a secret code of encryption. By having it encrypted, the sender can pass the data to the receiver and only the receiver or authorized personnel can have access to the data provided they have been given a key by the sender to decrypt it in order for them to view the information. Thus, without having the right key, nobody is able to read the encrypted data received or stored. Even if hackers or unauthorized person managed to intercept or steal the data, it would be...

Words: 7475 - Pages: 30

Premium Essay

Data Encryption

...Unit 2 Assignment – Data Encryption Security & Lab 3.10D and Lab 3.10E Oren Shedo Kaplan University Abstract Computer key encryption is becoming popular day by day because of hackers within the online world. Hackers are cracking into peoples systems left and right for their own personal gain and gaining information that can be used for identity theft. Identity theft is one of the biggest cybercrimes out there today. There are numerous security protocols and techniques out there to secure your computer though from hackers and curious people out there in the Internet. Security protocols such as secure socket layer and transport layer security are the most popular now for securing ecommerce websites. Secure socket layer is even popular for securing peoples email system as well as sender policy framework for filtering spam mail and not cluttering your inbox with junk. Another topic that is popular these days is what type of security key should we put on our networks. This report will go through why a WPA2 type security key is vital to a network for security. Part 1 - Lab 3.10D – Using the Windows Encrypting File System (EFS) 1. 2 to 6. 7. When a networked user tried to access the encrypted test3 folder, they were given an access denied error. 9. 11. When transferring test1.txt into the test3 folder, it turned into an encrypted file. 12. 13-14. for #13, the test5.txt stayed encrypted within the test folder. 16. Operation of exporting certificate was...

Words: 1801 - Pages: 8

Free Essay

Nt110 Video Summary 5

...Security Topics * Local Security * Physical Security * Firewall * Authentication * Encryption * Wireless Security * Viruses * Physical Security video 5.01 * Lock and control access to serves * Lock server and computer cases * Use audible alarms * Create administrative alerts * Locate servers room in high traffic area * Store backup tapes in secure area * Lock users operating system * Physically destroy old hard drive Authentication Policies * CMOS passwords * Username and password * Smart card and pin * Key fob * Biometric CMOS passwords Power-on Password * Supervisor’s password * User password * Full access * Liminted access * View only access * No access * Hard Drive Password * Protects data even if HD is stolen * Password required each time the system boots Reset CMOS password * Acess CMOS settings * Reset jumper * Remove/replace CMOS battery Create strong password * Six or more chraractors * Passphrase * Upper and lower case letters * Mix in numbers and symbols * Don’t use * Consecutive letters * Consecutive numbers * Consecutive keys Kerberos * Authentication method used by windows to encrypt passwords * Passwords are case sensitive This video shows the proper way to secure servers and...

Words: 1170 - Pages: 5

Premium Essay

Database Encryptin Solution

...Database Encryption Solution Introduction Critical data in a database needs to be protected against internal and external threats. A database encryption solution can be used to achieve this protection in addition to providing the regulatory requirements. In the past, access control was used as a means of protecting information against access by unauthorized users. Access control did not prove very effective and this has led to the adoption of encryption where information is transformed into some form that cannot be understood by unauthorized users. Decryption is the process by which the transformed text is retransformed into a form that can be understood. This paper will seek to analyze a database encryption solution that will protect critical data against internal and external threats and at the same time meet regulatory requirements. 2. Choosing the Point of Encryption Encryption can be done at different places within an enterprise. Encryption is used to minimize the number of people who access the encryption keys. Before encryption, implementation decisions needs to be made (Mattsson, (2005, p.2). The most important thing is choosing the point of implementation. This helps in determining the work that needs to be done so that integration is effective and also determining the security model. Data needs to be protected both when at rest and during movement between applications and the database. 2. 1. Database-Layer Encryption In this case, an enterprise...

Words: 1274 - Pages: 6

Free Essay

Aic Triad

...environments. What makes the AIC triad different from any other theory is that when it is used properly it forms the cornerstone of every aspect of computing and network security. Most IT security practices are focused on protecting systems from loss of confidentiality, loss of integrity, and loss of availability; these three together are referred to as the security triad, the CIA triad, and the AIC triad. Regardless of the order in which the letters are organized in the acronym, they refer to the same principles. Confidentiality, Integrity and Availability are the cornerstones to which a network is comprised. Each with its own independent yet very important role in networking. Confidentiality refers to access control and ensures that it is restricted to the individuals who have been previously authorized to access a network or one of its resources. Integrity addresses the validity of data and any networked object. It ensures that the unauthorized changes to the data or object is noticed so that appropriate actions can be taken. Availability’s meaning is essentially as simple as the word itself. It refers to the principle that addresses the need for an authorized user to have access to a resource as quickly as possible based off the networks functioning abilities. Availability In an information technology (IT) environment availability is one of the most important aspects. Each type of networked environment requires a different level of availability. A great example...

Words: 1508 - Pages: 7

Premium Essay

Wpa2 Wireless Encryption

...WPA2 Wireless Encryption Security By Charles Miller TS8004: WPA2 Wireless encryption Abstract The purpose of this research paper is to explore technologies best suited for wireless security technologies. The paper in itself will include research into WP2 Technology and how it fits in making best security measures for an organization. When an organization implements wireless technology, the aspect of keeping communications secured from sources that could use this information being transferred wireless to gain financial information, market advantage and personal gain is a concern for security involvement and risk. This literary review explores a security involved in WPA2 wireless encryption technology. Table of Contents Abstract.......................................................................................................................................... 2 Table of Contents........................................................................................................................... 3 Introduction....................................................................................................................................4 Background.................................................................................................................................... 5 Problem Definition......................................................................................................................... 5 Vulnerabilities..............

Words: 974 - Pages: 4

Free Essay

Encryption

...Encryption changes plain text into unreadable text using an algorithm. It’s a process of hiding information so that outside sources cannot see or manipulate it. The most secure web encryption is 128-bit. It uses a longer sequence of bits to increase strength of encryption by offering an additional 88 bits of key length. This encryption uses a public key during the encryption process and a different private key for the decryption process. Most all providers now use 128 bit encryption which means there are 339 trillion different combinations to crack the code. (FAFSA) This ensures security of the data you send over the internet through secure sites. 128-bit encryption is so secure that trying to crack it simply isn't feasible. 128-bit encryption is 309,485,009,821,345,068,724,781,056 times stronger than 40-bit encryption. (FAFSA) It would take significantly longer than the age of the universe to crack a 128-bit key. Current cracking technology puts 128 bit encryption in the very hard to crack realm, but is not unbreakable. It just makes the duration longer and resource consumption more intense. In that case, those trying to crack have to consider if the unknown asset is worth the effort. State secrets may well be worth the effort 128 bit encryption is not bad encryption, but nor is it the best, the encryption standard for the government is 256 bit. If one wants to improve security, he or she could consider increasing to a 256 or 512 bit encryption. Also the use of...

Words: 631 - Pages: 3

Premium Essay

A Hybrid Approach of System Security for Small Ans Medium Enterprises: Combining Different Cryptographic Techniques

...Proceedings of the 2013 Federated Conference on Computer Science and Information Systems pp. 659–662 A Hybrid Approach of System Security for Small and Medium Enterprises: combining different Cryptography techniques Georgiana Mateescu Polytechnic University of Bucharest, Splaiul Independenței 313, Bucharest, Romania, Email: georgiana.mateescu@gmail.com Marius Vladescu Polytechnic University of Bucharest, Splaiul Independenței 313, Bucharest, Romania, Email: vladescumariusnicolae@yahoo.com Abstract—Information protection is one of the most important issues in every domain, especially when we are talking about enterprises. Information safety can be translated into three key terms: integrity, availability and data protection. There is a great number of means used in order to achieve the three objectives simultaneously. The most popular is cryptography because it offers a lot of techniques which nowadays are impossible to fail. In this paper we want to prove their efficiency by comparing the different types of crypto algorithms and by presenting their weaknesses and strengths. In order to maximize the benefits of the crypto techniques, we propose a hybrid approach that combines three crypto algorithms. I. INTRODUCTION W HEN we are talking about information security we refer to it as the mean we use to protect our information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. The main concepts that...

Words: 2835 - Pages: 12

Free Essay

Encryption a Means of Security

...Seminar Presentation On Application of encrypting techniques In Database Security By Uweh SKelvin ABSTRACT Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This research work discuses the application of various encryption techniques in database security, and how encryption is used at different levels to provide the security. 1. INTRODUCTION Information or data is a valuable asset in any organization. Almost all organization, whether social, governmental, educational etc., have now automated their information systems and other operational functions. They have maintained the databases that contain the crucial information. So database security is a serious concern. To go further, we shall first discuss what actually the database security is? Protecting the confidential/sensitive data stored in a repository is actually the database security. It deals with making database secure from any form of illegal access or threat at any level. Database security demands permitting or prohibiting user actions...

Words: 4175 - Pages: 17