SF101 Encryption - ITPro

Encryption is a fundamental security mechanism for protecting the confidentiality of data. By applying encryption, data is transformed from plaintext into an unreadable format like ciphertext that can only be accessed with the proper encryption key.

This is a simple encryption example:

Encryption Example

Plain Text 
Encryption Algorithm
Encryption
Key
Cipher Key

Encryption Example Elaboration

The general idea is really simple.

  • Plain Text is original and readable data, like a .txt file or a .docx as an example.
  • The Encryption Algorithm converts plain text into an unreadable format.
  • A Cipher Key is used by an encryption algorithm to lock the data.

This same process can be applied in reverse for Decryption.

This cipher key must be kept secure, because if it's lost, you can't decrypt your data. Encryption is necessary for multiple states of data, at rest (think on a hard drive), in transit (over the internet), and in use (in an active program).

And here is a simple overview of a decryption sequence:

Decryption Example

Plain Text 
Encryption Algorithm
Decryption
Key
Cipher Key

Symmetric Vs Asymmetric Encryption

There are two main types of encryption:

Symmetric Encryption

Symmetric Encryption

Symmetric Encryption Definition
  • [i] Symmetric Encryption) - (definition:: Encryption that uses a single, shared key for both encryption and decryption) - (subject:: Cybersecurity

Symmetric Encryption Example

This would be the example shown where the same key is shared between the communicating parties. Examples are Advanced Encryption Standard (AES), the Data Encryption Standard (DES), and Blowfish Cipher.

In comparison to Asymmetric Encryption, symmetric encryption is usually faster, but it can be difficult to share the key with both parties securely.

Asymmetric Encryption

Asymmetric Encryption

Asymmetric Encryption Definition
  • [i] Asymmetric Encryption) - (definition:: Encryption that uses two mathematically related keys, a public key for encryption and a private key for decryption) - (subject:: Cybersecurity

Asymmetric Encryption Example

Asymmetric encryption allows users to encrypt data without needing to share a secret key, so it solves the key-sharing problem of Symmetric Encryption at the cost of higher computational cost. Examples include Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC).

Encryption Implementation

Encryption can be implemented at various levels:

  • Full Disk Encryption: Encrypting the entire storage device, like a harddrive or SSD
  • File/Folder Encryption: Encrypting individual files or folders, like in Windows' Encrypted File System (EFS)
  • Network Encryption: Encrypting communications between devices like with SSL/TLS or IPsec.
  • Hardware Encryption: Using a specialized encryption hardware, like a dedicated processor or cryptographic module for improved performance.

Which encryption level is necessary depends on the specific security requirements and performance needs of the organization and situation.