Data Encryption

Data Encryption

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide a better understanding of date encryption. Cryptographic Methods There are two standard methods of cryptography, asymmetric encryption and symmetric encryption. Data that is in its original form (unscrambled) is called plaintext. Once the data is scrambled and in its encrypted form it is called ciphertext. The ciphertext, which should be unintelligible to anyone not holding the encryption key, is what is stored in the database or transmitted down the communication line. Asymmetric encryption (also know as public key encryption) uses two separate keys, a public key and a private key. The private key is available only to the individual receiving the encrypted message. The public key is available to anyone who wishes to

key, encryption, data, des, attacker, standard, ciphertext, public, private, information, cryptanalysis, ?v, ?h, plaintext, message, every, encrypted, cryptography, attack, understanding, symmetric, send, secret, scrambled, methods, know, include, file, electronic, decrypt, bit, asymmetric, algorithm, very, unscrambled, types

Leave a Reply

Your email address will not be published. Required fields are marked *