- Data encryption translates data into another form or code, so that only people with access to a secret key (formally called a decryption key) or password can read it.
- Normal text is called plain text after encryption the text is referred as cipher text (means a secret code).
- The cipher text only can read after decrypted using a decryption key.
- Currently encryption is one of the most popular and effective data security methods used by organisations.
Types
Symmetric key
- In symmetric key schemes the encryption and decryption keys are the same.
- The sender must exchange the encryption key with the recipient before he can decrypt it.
- Symmetric key encryption is faster than public key encryption.
- Like in companies they are securely distribute and manage huge quantities of keys.
Public key
- Public key encryption uses two different keys, one public and one private.
- The public key shared with everyone, but the private key must be protected.
- Only the receiving party has access to the decryption key that enables messages to be read.
- It is used to secure sensitive data, especially when it is sent over an insecure network like the internet.
Advantages
- Complete data protection.
- Unauthorized access protection.
- Move data securely.
- Identity theft prevention.
- Security across multiple devices.
Disadvantages
- Forgetting passwords.
- Developing a false sense of security.
- Raising suspicious.
Uses
- Encryption has long been used by military and governments to facilitate secret communication.
- It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007.
- Encryption is also used to protect data in transit, for example sending data via internet, mobile telephone, wireless microphones, Bluetooth devices etc.
No comments: