Data Encryption Essay, Research Paper
The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide a better understanding of date encryption.
Cryptographic Methods
There are two standard methods of cryptography, asymmetric encryption and symmetric encryption. Data that is in its original form (unscrambled) is called plaintext. Once the data is scrambled and in its encrypted form it is called ciphertext. The ciphertext, which should be unintelligible to anyone not holding the encryption key, is what is stored in the database or transmitted down the communication line.
Asymmetric encryption (also know as public key encryption) uses two separate keys, a public key and a private key. The private key is available only to the individual receiving the encrypted message. The public key is available to anyone who wishes to send data or communicate to the holder of the private key. Asymmetric encryption is considered very safe but is susceptible to private key theft or breaking of the private key (this is virtually impossible and would constitute trying billions of possible key combinations) (4). Types of public key algorithms include Riverst-Shamir-Adelman (RSA), Diffie-Hellman, Digital Signature Standard (DSS), EIGamal, and LUC (5).
Symmetric encryption uses only one key (a secret key) to encrypt and decrypt the message. No public exchange of the key is required. This method is vulnerable if the key is stolen or if the ciphertext is broken (4). Types of symmetric algorithms include DES, Blowfish, International Data Encryption Algorithm (IDEA), RC4, SAFER, and Enigma (5).
Cryptanalysis
Cryptanalysis is the art of breaking cryptography. Methods of cryptanalysis include:
?h Ciphertext-only attack ?V the attacker works from ciphertext only. The attacker does not know anything about the message and is merely guessing about the plaintext (6).
?h Know-plaintext attack ?V the attacker know the plaintext. Knowing this information, the attacker can attempt to decrypt the ciphertext (6).
?h Chosen plaintext attack ?V the attacker can have a message encrypted with the unknown key. The attacker must then determine the key used for encryption (6).
?h Man-in-the-middle attack ?V the attacker intercepts the key that is being exchanged between parties (6).
Data Encryption Standard (DES)
In 1977 the National Institute of Standards and Technology (NIST) and IBM developed the Data Encryption Standard, or DES, to provide a means by which data could be scrambled, sent electronically to a destination, and then unscrambled by the receiver. DES was developed to protect data in the federal computer systems against passive and active attacks (3). Every five years the NIST reviews the DES and determines whether the cryptographic algorithm should be revised, is acceptable, or completely withdrawn.
DES uses a very complex algorithm, or key, that has been deemed unbreakable by the U.S. government. There are 72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that can be used. It applies a 56-bit key to each 64-bit block of data. This process involves 16 rounds of operations that mix the data and key together using operations of permutation and substitution. The end result is a completely scrambled data and key so that every bit of the ciphertext depends on every bit of the data plus every bit of the key (a 56-bit quantity for DES) (2).
Conclusion
Sending secure electronic information is vital for businesses today. Although the electronic age has made it easier for companies to send and receive information, it has also increased the need for security. Data encryption in itself will not assure any business of sending secure information, but understanding it will surely benefit the company. Businesses who understand cryptography, cryptanalysis, and Data Encryption Standard are on their way to understanding data encryption.
1. Bay Networks, Inc. (1997). Configuring Software Encryption. www.baynetworks
2. Biasci, L. (1999). Cryptology. www.whatis.
3. Frazier, R.E., (1999). Data Encryption Techniques. www.softstrategies.
4. Litterio, F., (1999). Cryptology: The Study of Encryption. www.world.std.
5. SSH Communications Security, (1999). Cryptographic Algorithms. www.ipsec.
6. SSH Communications Security, (1999). Introduction to Cryptography. www.ipsec.
Другие работы по теме:
Mass Volume And Density Lab Essay Research
Paper Mass, Volume, and Density LabThe purpose of this lab was is to find the mass and volume of an object. Then to find the density of the object using the measurements of the mass and volume.
Vdg Essay Research Paper Raintree
Vdg Essay, Research Paper Raintree’s website is dedicated to providing information and education on the important plants of the Amazon Rainforest, therefore this section is the most extensive. The Plant Database section is continuously under construction as we continue to add more rainforest plants which are under research.
Batch Essay Research Paper Discuss your stately
Batch Essay, Research Paper Discuss your stately for testing this algorithm, making sure that you include any problems that you think you may encounter. Also give examples of test data and expected results of your test data.
Criptography Essay Research Paper We are living
Criptography Essay, Research Paper We are living in the age of Digital Revolution, which is swiftly starting to affect every aspect of our life. WebTV is replacing regular TV’s, radio stations are moving into broadcasting life-on-line. All business related operations are rapidly moving to the World Wide Web.
Electronic Mail Essay Research Paper Electronic MailInstant
Electronic Mail Essay, Research Paper Electronic Mail Instant messages, the communication journey from past to present. During wars like World War I, World War II, the Vietnam War, the Gulf War, and the war in Kosovo, delivering information to the public has been different each time. During World War I, newspapers and long distance telephone calls were the only ways of delivering information to the public.
John Vincent Atanasoff Essay Research Paper John
John Vincent Atanasoff Essay, Research Paper John Vincent Atanasoff inventor of the electronic computer In any scienctific field, there needs to be a person with the vision to define the future. John Vincent Atanasoff was a genius with such a vision. He developed the first electronic digital computer that has dramatically changed our lives.
ECommerce And Customers Essay Research Paper MEMOTO
E-Commerce And Customers Essay, Research Paper MEMO FROM: DATE: SUBJECT: E-Commerce and customers According to International Data Corporation more than ten million people are purchasing goods and services online in the United States alone. E-commerce allows people to exchange goods and services immediately with no barriers of time or distance.
Information Security Essay Research Paper Emerging Opportunities
Information Security Essay, Research Paper Emerging Opportunities and The Internet – Information Security by Margaret Headley “Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.
Encryption Export Regulations Essay Research Paper Recent
Encryption Export Regulations Essay, Research Paper Recent Crypto News and Documents BXA Issues Revised Encryption Export Regulations. On October 18, the U.S. Department of Commerce Bureau of Export Administration (BXA) announced further revisions to the export regulations on encryption products.
Encryption Essay Research Paper Title encryptionfriend or
Encryption Essay, Research Paper Title: encryption,friend or foe for the peopleCategory: ScienceDescription:Body of paper:In the good old days a pad lock was the best thing to have to keep unwanted persons from invading your privacy. Now that we have entered the digital age, it has been more and more difficult to keep our belongings to ourselves.
Data Encryption How Secure Are We Essay
, Research Paper Brad Plank 10/4/01 Senior Research Synopsis Encryption and Cryptography Have you ever wanted to send a message to someone while distorting it in some fashion so the only person who can UN-distort it is the person you send it to? This way, if a third party intercept this message, all they see is a bunch of gibberish.
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
Encryption Who Holds The Keys Essay Research
Paper Encryption: Who Holds the Keys? In an opinion that prophetically predated the computer age, Supreme Court Justice Louis Brandeis warned, “Ways may some day be developed by which the government, without removing papers from secret drawers, can reproduce them in court” (Bamford 3).
Computerized World Essay Research Paper A Computerized
Computerized World Essay, Research Paper A Computerized World Since the first computer was made in the late fifties, the technology has developed extremely. Computers which took the place of a living-room then, are now being made in credit card-formats. More and more areas are being taken over by the computer.
Database Design Essay Research Paper Before you
Database Design Essay, Research Paper Before you use Microsoft Access to actually build the tables, forms, and other objects that will make up your database, it is important to take time to design your database. A good database design is the keystone to creating a database that foes what you want it to do effectively, accurately, and efficiently.
Crime And Resources Essay Research Paper Crime
Crime And Resources Essay, Research Paper Crime in the United States (CIUS), published annually by the FBI, is a compilation of the Uniform Crime Reports (UCR) provided by over 16,000 policing jurisdictions. It represents one of the two primary sources of data about crime in the United States, the National Crime Victimization Survey (NCVS) being the other.
Telecommunication Systems Essay Research Paper Joseph Maria
Telecommunication Systems Essay, Research Paper Joseph Maria 530 BIS Telecommunication Systems Coursework 2 1) If the noise pulse signal cross the decision level of the detector then an error will occur in the bit value. If the noise is Gaussian there is equal probability for the noise voltage to increase the sample value and to decrease the sample value.
Modernization Of Computers Essay Research Paper Since
Modernization Of Computers Essay, Research Paper Since the first computer was made in the late fifties, the technology has developed extremely. Computers which took the place of a living-room then, are now being made in creditcard-formats. More and more areas are being taken overby the computer.As computers are capable of handling large amounts of data in a very shorttime, they are well suited for wordprocessing.
Privacy And The Web Essay Research Paper
As the twenty first century dawns, advances in technology endanger our privacy in ways never before imagined. Each time you use the ATM, visit the doctor, use a credit card, chat on the Internet, or make a phone call, you are leaving electronic fingerprints for all who want to peer into your private life. Nearly every quantifiable aspect of a person?s life finds it way into a data bank somewhere.
Data Mining Essay Research Paper In today
Data Mining Essay, Research Paper In today s business world, information about the customer is a necessity for a businesses trying to maximize its profits. A new, and important, tool in gaining this knowledge is Data Mining. Data Mining is a set of automated procedures used to find previously unknown patterns and relationships in data.
Mathematical Codes Essay Research Paper Mathematical CodesMathematical
Mathematical Codes Essay, Research Paper Mathematical Codes Mathematical codes are used by millions everyday for a variety reasons, but all intending to keep something private. The coding theory has actual applications in consumer electronics and with other areas of mathematics. Encryption, which involves enciphering and encoding, is used to protect data against organized crime, government and multinational institutions.
Eletronic Banking Essay Research Paper Corey Melke5299
Eletronic Banking Essay, Research Paper Corey Melke 5/2/99 BUS 256 Mr. Hunkins ELECTRONIC BANKING The Electronic Banking Association (EBA) is a non-profit organization established to do one simple thing-help more people get started with electronic banking. Here’s why. Who taught you how to write paper checks? Probably your parent’s right? Well, who’s going to teach you how to write electronic checks? Probably NOT your parents.
Nothing Essay Research Paper An ecommerce solution
Nothing Essay, Research Paper An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-established businesses have been selling on-line for years. For example, Dell Computers Corp., has been selling computers directly to end-users for years.
Computer Security Issues Essay Research Paper Computer
Computer Security Issues Essay, Research Paper Computer Security Issues Facing Alsager Ltd. In upgrading the Alsager Ltd IT facilities, despite numerous advantages that the new systems brings one has to be made aware of the possible threats posing.
Blah Essay Research Paper For my senior
Blah Essay, Research Paper For my senior thesis, I will be conducting further research on my project, and the idea from which my project came. This research will include different experimental approaches and setups, the outcomes of these new schematics, and the way in which the project was originally approached.
Ecommerce Essay Research Paper ECommerce Electronic Commerce
Ecommerce Essay, Research Paper E-Commerce Electronic Commerce is defined by Webster’s Dictionary as using computer networks to conduct business, including buying and selling online, electronic funds transfer, business communications, and using computers to access business information resources.
Internet Marketing Essay Research Paper Internet Marketing
Internet Marketing Essay, Research Paper Internet Marketing and Associated Topics Computers and the Internet are becoming faster and capable of new and exciting things every day. Through this evolution, businesses have begun to reach out to consumers in new, unprecedented ways. With the amazing growth of users of the Internet, and the enormous growth that is expected to continue, businesses are aware that there is tremendous potential to provide and promote products and services in previously inconceivable ways.
Disaster Recovery Essay Research Paper Windows on
Disaster Recovery Essay, Research Paper Windows on Management – Disaster Recovery in the New Information Age This window talks about some of the benefits of a recovery system for businesses with round the clock electronic commerce. If a disaster happens and these companies don’t have a recovery system, it can cause massive delays and that can lead to loss of business and profits.
Computer Privacy Essay Research Paper Computer Privacy
Computer Privacy Essay, Research Paper Computer Privacy Issues An issue of concern at is Computer privacy. Computer privacy techniques have been developed to protect single computers and network-linked computer systems from accidental or intentional harm. The main reason for protecting these computers is to keep them from physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized individuals.
ECommerce Essay Research Paper ECOMMERCEApril 10 2000
E-Commerce Essay, Research Paper E-COMMERCE April 10 2000 E-Commerce Electronic commerce has its ups and downs for consumers. On one hand, online shopping holds the potential for more convenience and broader selections. On the other, it has bred confusion over the legitimacy of electronic records.