SF101 Encryption - ITPro
Encryption is a fundamental security mechanism for protecting the confidentiality of data. By applying encryption, data is transformed from plaintext into an unreadable format like ciphertext that can only be accessed with the proper encryption key.
This is a simple encryption example:
Encryption Example
Encryption Example Elaboration
The general idea is really simple.
- Plain Text is original and readable data, like a
.txtfile or a.docxas an example. - The Encryption Algorithm converts plain text into an unreadable format.
- A Cipher Key is used by an encryption algorithm to lock the data.
This same process can be applied in reverse for Decryption.
This cipher key must be kept secure, because if it's lost, you can't decrypt your data. Encryption is necessary for multiple states of data, at rest (think on a hard drive), in transit (over the internet), and in use (in an active program).
And here is a simple overview of a decryption sequence:
Symmetric Vs Asymmetric Encryption
There are two main types of encryption:
Symmetric Encryption
Symmetric Encryption
Symmetric Encryption Definition
- [i] Symmetric Encryption) - (definition:: Encryption that uses a single, shared key for both encryption and decryption) - (subject:: Cybersecurity
Symmetric Encryption Example
This would be the example shown where the same key is shared between the communicating parties. Examples are Advanced Encryption Standard (AES), the Data Encryption Standard (DES), and Blowfish Cipher.
In comparison to Asymmetric Encryption, symmetric encryption is usually faster, but it can be difficult to share the key with both parties securely.
Asymmetric Encryption
Asymmetric Encryption
Asymmetric Encryption Definition
- [i] Asymmetric Encryption) - (definition:: Encryption that uses two mathematically related keys, a public key for encryption and a private key for decryption) - (subject:: Cybersecurity
Asymmetric Encryption Example
Asymmetric encryption allows users to encrypt data without needing to share a secret key, so it solves the key-sharing problem of Symmetric Encryption at the cost of higher computational cost. Examples include Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC).
Encryption Implementation
Encryption can be implemented at various levels:
- Full Disk Encryption: Encrypting the entire storage device, like a harddrive or SSD
- File/Folder Encryption: Encrypting individual files or folders, like in Windows' Encrypted File System (EFS)
- Network Encryption: Encrypting communications between devices like with SSL/TLS or IPsec.
- Hardware Encryption: Using a specialized encryption hardware, like a dedicated processor or cryptographic module for improved performance.
Which encryption level is necessary depends on the specific security requirements and performance needs of the organization and situation.