Encryption Essay

1221 words - 5 pages

1. Introduction: What is Encryption?Encryption has become a necessity in modern society due to the nature of the information we must interact with everyday. Furthermore, the encryption of computer data is becoming increasingly important since much sensitive information is stored on our hard drives and human based codes are simply too easy for a computer to solve [1]. All forms of encryption are based on cryptology which is "the science of analyzing and deciphering codes and ciphers and cryptograms" [2]. Cryptology and simple codes have been used as early as the Roman Empire. The earliest encryption methods include using substitution ciphers and transposition ciphers which can be done using pen and paper [3]. However, encryption discussed on this essay refers to techniques employed by computers to conceal data.The idea behind encryption is that information is converted so that it cannot be read by a third party who is not involved with you or the party you are dealing with. All parties who wish to view this information would need a "key" to decipher the data to its original state [4]. The entire scheme is called a cryptosystem and is usually a collection of algorithms. The original information which needs to be secured is called plaintext. The "key" known as a cipher@ is an algorithm used to perform the encryption as well as the reverse, decryption. Finally the encrypted form of the text is known as ciphertext [3]. Modern computers generally use two types of encryptions. Symmetric-key encryption and public-key encryption. In non-technical usage, the words cipher and code are used synonymously. However, the two are two different concepts. Codes work at the level of words and phrases and encodes# itself by arranging the actual word. On the other hand, ciphers work at a lower level: the level of individual letters, small groups of letters or individual bits. Today the dominant technique used in cryptography is ciphers since codes have many disadvantages\$[3].2. Symmetric-Key EncryptionSymmetric-algorithms are divided into stream ciphers and block ciphers. Stream ciphers take the information and encrypt them one bit at a time while block ciphers take a number of bits and encrypt them as a single unit [5]. Regardless of whether the encryption uses block ciphers or stream ciphers a symmetric-key encryption employs an identical key for both encryption and decryption [6]. How this works is that each computer will have a secret key that it uses to encrypt a packet of information before sending it over the network. Symmetric-key encryption requires both the receiving and sending computers to be identified so that the key can be installed in both. After the receiving computer receives the encrypted data, it uses the received key to decipher it to plaintext [7]. An example of a symmetric algorithm includes DES% and this form of cryptosystem is especially suited for transferring large data sets at a high rate [6]. The limitations of a symmetric-key encryption...

Find Another Essay On Encryption

Various Digital Image Encryption Techniques Essay

2661 words - 11 pages [1]. Image Encryption Using Affine Transform and XOR Operation (2011) In this paper, Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar and Partha Pratim Sarkar have imparted an approach, which employs 64 bits key in the encryption. First, the recommended technique operates the affine transformation to dispel the pixels by applying four sub keys of 8 bits. Thereafter, the algorithm cleaves the image into 2*2 pixel block

834 words - 4 pages Everyday information gets into the wrong hands. This can lead up to millions of dollars lost for a company and its reputation in this global environment. It only by knowing the different encryption methods you hope to protect your reputation and assets. I will discuss a possible solution to protect your information and explain the advantages and disadvantages of asymmetric or symmetric keys. Everyone is worried about data protection these days

Overview of Data Encryption and Legal Issues

2185 words - 9 pages Overview of Data Encryption and Legal Issues What is encryption and why do we need it? The concept of encrypting information has been popular for hundreds of years. Revolutionaries, scientists, political activists and lovers have utilized this technique to maintain privacy and confidentiality in their communications. As kids, we would take our secret messages and shift the letters of the alphabet by a specific number to create an

Selective Encryption Algorithm for Highly Confidential Real Time Video Applications

1126 words - 5 pages 1. Introduction Conventional cryptographic algorithms, which are generally aimed at encrypting like text data (known as Naïve approach) not well suited for video encryption. This is due to the fact that conventional cryptographic algorithms cannot process the large volume of video data in real-time. Selective encryption of the H.264/AVC bitstream puts decoder to fully decode the encrypted video with degradation in video quality. This perceptual

Selective Encryption Algorithm for Highly Confidential Real Time Video Applications

1442 words - 6 pages 1. Introduction Conventional cryptographic algorithms, which are generally aimed at encrypting like text data (known as Naïve approach) not well suited for video encryption. This is due to the fact that conventional cryptographic algorithms cannot process the large volume of video data in real-time. Selective encryption of the H.264/AVC bitstream puts decoder to fully decode the encrypted video with degradation in video quality. This perceptual

A REVIEW on VARIOUS DIGITAL IMAGE ENCRYPTION TECHNIQUES

1487 words - 6 pages , then it is necessary to provide sublime protection. Mainly, an image needs protection against tampering and breaching confidentiality by illegal parties. The primary purpose of keeping the image secured is to maintain the confidentiality, integrity and the authenticity [16]. Therefore, the various techniques are available to secure an image and one technique is encryption. The encryption is a process that transforms an image into a

Ensuring Data Security Using Homomorphic Encryption in Cloud Computing

1302 words - 5 pages Homomorphic Encryption allows access to highly scalable, inexpensive, on-demand computing resources that can execute the code and store the data that are provided to them. This aspect, known as data outsourced computation is very attractive, as it alleviates most of the burden on IT services from the consumer. Nevertheless, the adoption of data outsourced computation by business has a major obstacle, since the data owner does not want to

Using Data Encryption for Security in Cloud Computing

2098 words - 8 pages will analyze cloud computing and the issues it faces from a security standpoint. The main focus for this paper will be on how data encryption can help safeguard information being stored in the cloud. Data encryption is a key component in security for cloud computing and is often used when secure information is being transmitted. Keywords: cloud, security, data encryption Using Data Encryption for Security in Cloud Computing Today

Joint Selective Encryption of CAVLC and Signs of Motion vectors for H.264/AVC

2209 words - 9 pages Currently, researchers are orienting their effort to selective encryption in order to protect video sequences against attacks during their transmission over a public channel. The reasons for this trend are of great importance. The encryption module is inserted into the video compression chain to reduce the computation time, ensure the security and reduce the video data amount. This paper presents a chaos based encryption method inserted in the H

Access Control and Data Updation with AT-PRE: Attribute Time Based Proxy Re-Encryption

700 words - 3 pages requires higher level of trust in CSP. Therefore many approaches have been proposed for storing the encrypted data in the cloud and to provide efficient access control [4, 5, 6, 7]. 1) Symmetric key Encryption: The work in reference [8] adopts traditional symmetric key cryptographic system to encrypt data. Before outsourcing, the data owner will first classify data with similar access control lists (ACLs) into a file-group, and then encrypt each file

Computer Security, Defines encryption and explain how it is used to protect transmission of information

886 words - 4 pages 1Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption

Similar Essays

Data Encryption Essay

1032 words - 4 pages Missing Chart Encryption Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked

Ethics Of Encryption Essay

2198 words - 9 pages Ethics of Encryption Effects of Encryption on the Constitution of the United States of America In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to

Protecting Data Through Encryption Essay

1149 words - 5 pages today to hide the real meaning of messages. There have been many advances since the time of the Egyptians but the purpose is still the same which is to keep information from unauthorized individuals. With more personal data being stored on information systems that are accessible through the World Wide Web the desire for hackers to decode encrypted data has increased. Since there is additional interest in decoding encryption the

Encryption: Privacy Versus National Security Essay

2531 words - 10 pages       Abstract: The use of encryption by individuals is growing at a tremendous rate, and since 1991 cryptography issues have engulfed both the U.S. government as well as the computing industry. One of the most controversial of these issues is whether encryption should be made supremely secure to the highest-level current technology will allow, or whether a "master key" should be locked away somewhere, only to be used when absolutely justified