Data Encryption

Topics: Cryptography, Encryption, Cipher Pages: 2 (757 words) Published: July 30, 2009
The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide a better understanding of data encryption. Cryptographic Methods There are two standard methods of cryptography, asymmetric encryption and symmetric encryption. Data that is in its original form (unscrambled) is called plaintext. Once the data is scrambled and in its encrypted form it is called cipher text. The cipher text, which should be unintelligible to anyone not holding the encryption key, is what is stored in the database or transmitted down the communication line. Asymmetric encryption (also know as public key encryption) uses two separate keys, a public key and a private key. The private key is available only to the individual receiving the encrypted message. The public key is available to anyone who wishes to send data or communicate to the holder of the private key. Asymmetric encryption is considered very safe but is susceptible to private key theft or breaking of the private key (this is virtually impossible and would constitute trying billions of possible key combinations) (4). Types of public key algorithms include Riverst-Shamir-Adelman (RSA), Diffie-Hellman, Digital Signature Standard (DSS), EIGamal, and LUC (5). Symmetric encryption uses only one key (a secret key) to encrypt and decrypt the message. No public exchange of the key is required. This method is vulnerable if the key is stolen or if the ciphertext is broken (4). Types of symmetric algorithms include DES, Blowfish, International Data Encryption Algorithm...

Bibliography: 1. Bay Networks, Inc. (1997). Configuring Software Encryption. 2. Biasci, L. (1999). Cryptology. 3. Frazier, R.E., (1999). Data Encryption Techniques. 4. Litterio, F., (1999). Cryptology: The Study of Encryption. 5. SSH Communications Security, (1999). Cryptographic Algorithms. 6. SSH Communications Security, (1999). Introduction to Cryptography.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Data Encryption Standard Essay
  • Itm 431 Module 2 Is Using an Encryption System Like Pgp a Good Idea for Individuals and Organizations? and Why? Essay
  • Data Encryption with Ecc Essay
  • International Data Encryption Algorithm Essay
  • Symmetric Encryption Is Outdated : a Common Myth Essay
  • Asymmetric and Symmetric Encryption Essay
  • Enhanced Data Encryption Algorithm for Next Generation Networks Essay
  • Essay about Role of Multiple Encryption in Secure Electronic Transaction

Become a StudyMode Member

Sign Up - It's Free