Document Sample
ENCRYPTION Powered By Docstoc

   Encryption is the process of transforming
     information (referred to as plaintext)
 using an algorithm (called cipher) to make it
      unreadable to anyone except those
    possessing special knowledge, usually
referred to as a key. The result of the process
  is encrypted information (in cryptography,
                 referred to as
  In many contexts, the word encryption also
  implicitly refers to the reverse process,
  decryption (e.g. “software for encryption”
  can typically also perform decryption), to
  make the encrypted information readable
  again (i.e. to make it unencrypted).
•    Encryption has long been used by
  militaries and governments to facilitate
  secret communication.

• Encryption is now commonly used in
  protecting information within many kinds of
  civilian systems. For example, in 2007 the
  U.S. government reported that 71% of
  companies surveyed utilized encryption for
  some of their data in transit.[1] Encryption
  can be used to protect data "at rest", such
  as files on computers and storage devices.
• Encryption is also used to protect data in
  transit, for example data being transferred
  via networks (e.g. the Internet, e-
  commerce), mobile telephones, wireless
  microphones, wireless intercom systems,
  Bluetooth devices and bank automatic
  teller machines.
• Many times when data is exchanged
  electronically the privacy of the data is a
• The use of encryption restricts unintended
  recipients from viewing the data, which are
  deemed confidential and potentially
  dangerous if made known to irresponsible
• Today, encryption is the procedure of
  transforming plaintext, data that can be
  read by anyone, to ciphertext, data that
  can only be read by someone with a
  secret decryption key.
• A message before being changed in any
  way is called plaintext. Plaintext messages
  are converted to ciphertext via some
  encryption method. A particular such
  method is called a cryptosystem.
• Error in Encryption leads to Compromises
• When message-handling operator makes
  error in encrypting data. Compromises
  may occur during requested re-
  transmission in these cases:
• This message can be encrypted using a
  different key. In any case, it is possible for
  interceptors to compare the two ciphertext
  and work out the encryption.
• Sometimes, two different messages
  encrypted with the same key may also be
• When a request for re-transmission
  results in transmission of plaintext, instead
  of a repeat of the ciphertext.
• One of the most common uses of
  encryption is encrypting emails. Sending
  sensitive messages, documents and files
  over the Internet is like sending a postcard
  as all emails are transmitted in an
  unsecured form. It doesn't depend on if
  you send emails via public and private
  networks. Your message is totally open to
  interception by anyone along the way - so
  anybody - your ISP, your boss, etc. can
  read your emails.
• Even if you connect to your server and
  send your emails via SSL, it only means
  that your emails can't be seen while
  transmitting between you and your server.
  When your email reaches your server, it
  can be seen by your email service
  provider. Then your server usually sends
  your email to the recipient in an unsecured
  way and your email an also be easily seen
  by anyone.

Shared By: