Friday 2 December 2016

Data Encryption

  • Data encryption translates data into another form or code, so that only people with access to a secret key (formally called a decryption key) or password can read it.


  • Normal text is called plain text after encryption the text is referred as cipher text (means a secret code).
  • The cipher text only can read after decrypted using a decryption key.
  • Currently encryption is one of the most popular and effective data security methods used by organisations.


Types

Symmetric key
  • In symmetric key schemes the encryption and decryption keys are the same.
  • The sender must exchange the encryption key with the recipient before he can decrypt it.
  • Symmetric key encryption is faster than public key encryption.
  • Like in companies they are securely distribute and manage huge quantities of keys.


Public key
  • Public key encryption uses two different keys, one public and one private.
  • The public key shared with everyone, but the private key must be protected.
  • Only the receiving party has access to the decryption key that enables messages to be read.
  • It is used to secure sensitive data, especially when it is sent over an insecure network like the internet.


Advantages

  • Complete data protection.
  • Unauthorized access protection.
  • Move data securely.
  • Identity theft prevention.
  • Security across multiple devices.

Disadvantages

  • Forgetting passwords.
  • Developing a false sense of security.
  • Raising suspicious.

Uses

  • Encryption has long been used by military and governments to facilitate secret communication.
  • It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007.
  • Encryption is also used to protect data in transit, for example sending data via internet, mobile telephone, wireless microphones, Bluetooth devices etc.

No comments: