This essay Encryption has a total of 705 words and 4 pages.
The electronic age has brought forth many technological advances. With these
advances came the need for security and tighter control on how we send
information electronically over the Internet or through a network. Date
encryption is, in its simplest terms, the translation of data into a secret
code. In order to read an encrypted file, the receiver of the file must obtain a
secret key that will enable him to decrypt the file. A deeper look into
cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide
a better understanding of date encryption. Cryptographic Methods There are two
standard methods of cryptography, asymmetric encryption and symmetric
encryption. Data that is in its original form (unscrambled) is called plaintext.
Once the data is scrambled and in its encrypted form it is called ciphertext.
The ciphertext, which should be unintelligible to anyone not holding the
encryption key, is what is stored in the database or transmitted down the
communication line. Asymmetric encryption (also know as public key encryption)
uses two separate keys, a public key and a private key. The private key is
available only to the individual receiving the encrypted message. The public key
is available to anyone who wishes to send data or communicate to the holder of
the private key. Asymmetric encryption is considered very safe but is
susceptible to private key theft or breaking of the private key (this is
virtually impossible and would constitute trying billions of possible key
combinations) (4). Types of public key algorithms include Riverst-Shamir-Adelman
(RSA), Diffie-Hellman, Digital Signature Standard (DSS), EIGamal, and LUC (5).
Symmetric encryption uses only one key (a secret key) to encrypt and decrypt the
message. No public exchange of the key is required. This method is vulnerable if
the key is stolen or if the ciphertext is broken (4). Types of symmetric
algorithms include DES, Blowfish, International Data Encryption Algorithm
(IDEA), RC4, SAFER, and Enigma (5). Cryptanalysis Cryptanalysis is the art of
breaking cryptography. Methods of cryptanalysis include: „h Ciphertext-only
attack ¡V the attacker works from ciphertext only. The attacker does not know
anything about the message and is merely guessing about the plaintext (6). „h
Know-plaintext attack ¡V the attacker know the plaintext. Knowing this
information, the attacker can attempt to decrypt the ciphertext (6). „h Chosen
plaintext attack ¡V the attacker can have a message encrypted with the unknown
key. The attacker must then determine the key used for encryption (6). „h
Man-in-the-middle attack ¡V the attacker intercepts the key that is being
exchanged between parties (6). Data Encryption Standard (DES) In 1977 the
National Institute of Standards and Technology (NIST) and IBM developed the Data
Encryption Standard, or DES, to provide a means by which data could be
scrambled, sent electronically to a destination, and then unscrambled by the
receiver. DES was developed to protect data in the federal computer systems
against passive and active attacks (3). Every five years the NIST reviews the
DES and determines whether the cryptographic algorithm should be revised, is
acceptable, or completely withdrawn. DES uses a very complex algorithm, or key,
that has been deemed unbreakable by the U.S. government. There are
72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that
can be used. It applies a 56-bit key to each 64-bit block of data. This process
involves 16 rounds of operations that mix the data and key together using
operations of permutation and substitution. The end result is a completely
scrambled data and key so that every bit of the ciphertext depends on every bit
of the data plus every bit of the key (a 56-bit quantity for DES) (2).
Conclusion Sending secure electronic information is vital for businesses today.
Although the electronic age has made it easier for companies to send and receive
information, it has also increased the need for security. Data encryption in
itself will not assure any business of sending secure information, but
understanding it will surely benefit the company. Businesses who understand
cryptography, cryptanalysis, and Data Encryption Standard are on their way to
understanding data encryption.
1. Bay Networks, Inc. (1997). Configuring Software Encryption. www.baynetworks.com
2. Biasci, L. (1999). Cryptology. www.whatis.com.
3. Frazier, R.E., (1999). Data Encryption Techniques. www.softstrategies.com.
4. Litterio, F., (1999). Cryptology: The Study of Encryption. www.world.std.com.
6. SSH Communications Security, (1999). Introduction to Cryptography.
Topics Related to Encryption
Cryptography, Symmetric-key algorithm, Encryption, Cryptanalysis, Cipher, Chosen-plaintext attack, RSA, Data Encryption Standard, Public-key cryptography, Key, Index of cryptography articles, Probabilistic encryption
Essays Related to Encryption
Control Of InternetControl Of Internet During the past decade, our society has become based solely on the ability to move large amounts of information across great distances in a very short amount of time and at very low costs. The evolution of the computer era and our growing need for ultra-fast communications has caused a global network of interconnected computers to develop, commonly referred to as the Internet or the world wide web. The Internet has influenced practically everyone’s life in some way whether it
Encryption Encryption The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and the Da
Internet Regulation Internet Regulation The Internet is a method of communication and a source of information that is becoming more popular among those who are interested in, and have the time to surf the information superhighway. The problem with this much information being accessible to this many people is that some of it is deemed inappropriate for minors. The government wants censorship, but a segment of the population does not. Legislative regulation of the Internet would be an appropriate function of the gov
Pretty Good Privacy Pretty Good Privacy PGP stands for Pretty Good Privacy. It is an encryption program. What encryption does is hide information from people who do not know the secret word to reveal the information. Louis J. Freeh, the Director of the Federal Bureau of Investigation, says the honest have nothing to hide, and only criminals would use encryption. The honest, goes the implication, have no need of encryption. Let us think about that, for just a minute. The honest have no need of encryption: they
Government And Internet Government And Internet During the past decade, our society has become based solely on the ability to move large amounts of information across large distances quickly. Computerization has influenced everyone\'s life. The natural evolution of computers and this need for ultra-fast communications has caused a global network of interconnected computers to develop. This global net allows a person to send E-mail across the world in mere fractions of a second, and enables even the common person to ac