Data Encryption and Authentication Methods - Term Paper Example

Comments (0) Cite this document
Internet has today become the easiest and most convenient form of communication between individuals, corporates and even governments. With growth in volumes of data, come security problems. Programming and coding have become very common and easy to access, leading to an increase in internet crime…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Data Encryption and Authentication Methods
Read TextPreview

Extract of sample "Data Encryption and Authentication Methods"

Download file to see previous pages The recipient's identity is usually established online through digital signatures or certificates.
Under this encryption, the user has to manually select the files and folders to be encrypted and run special command/ menu item to encrypt and decrypt the selected objects through certain software. Thus, the user must always remember to encrypt the relevant data before logging off. This gives scope for human errors, where the user might forget to encrypt the data before leaving the system. However, manual encryption is technically more reliable and simple than other forms of encryption.[]
In this form of encryption, encryption is compulsorily done permanently on the disc during every read and write task. The encrypted data is stored in the transparently encrypted volumes. In this type of encryption, encrypted data can only be transferred from computer to computer through diskettes. For the purpose of low level encryption, transparent encryption is the safest way to secure one's data. However, in this type of encryption, there are problems in implementation as it doesn't generally fit into multi-user networks.
This kind of encryption involves encrypting the data before and after certain read /write functions are completed or certain confidential files are accessed. When a file is copied or moved, it is ciphered in a secret folder and when it is opened through a standard application, it is deciphered. Again, when the application is to be shut down, the files are enciphered. Thus, at Start up, the encrypted files/folders are deciphered from specified folders/files and enciphered again during shutdown. A disadvantage is that when the data to be encrypted is too large, it may lead to loss of data and reduction in efficiency of the computer.

Protection and authentication of data can be also be achieved at three levels :

Email and file-encryption
The use of passwords while accessing e-mails provides the first level of security. These mails could be encrypted and sent over a secure network by the sender and again decoded and read by the receiver. However, with the use of internet expanding to unlimited proportions, files can be intercepted and sensitive information can be accessed by hackers. It is also possible to hack or send phishing mails through e-mails.
Data encryption during transmission using VPNs
Transmission encryption technologies include DES (Data Encryption Standard) or AES (Advanced Encryption Standard) .This is a relatively safer way of transmitting information over the internet. A virtual private network cannot be easily accessed by intruders or hackers and information is encrypted using standard procedures like DES or AES.
Password encryption on public interfaces
An example of asymmetrical key provision; this type of encryption involves the use of a plug point that has to manage keys, decide the algorithm to use for encryption and protect the master key or secret.

Classification based on keys :
Cryptography is the process of disguising data as cipher text before sending it over a network.
This disguised data is encrypted by applying an algorithm to a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Data Encryption and Authentication Methods Term Paper”, n.d.)
Data Encryption and Authentication Methods Term Paper. Retrieved from
(Data Encryption and Authentication Methods Term Paper)
Data Encryption and Authentication Methods Term Paper.
“Data Encryption and Authentication Methods Term Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Data Encryption and Authentication Methods

Data collection methods

...?RUNNING HEAD: DATA COLLECTION METHODS AND ANALYSIS. Data Collection Methods and Analysis Nursing Part one Describe the data collection methodology. What instruments were used? The authors prescribed and used a three group repeated measure design. The study was done on groups of consenting patients receiving home care from a non profit hospice. The care givers chosen were subjected to experimental training in the COPE (acronym creativity, optimism, planning, and expert information) intervention, on symptoms management. Instruments used were the numeric rating scale. NRS was used to measure the intensity of pain with zero representing no pain gradually...
5 Pages(1250 words)Assignment

Authentication Methods and Techniques

...the person himself can possess a particular object of identification. Examples include smart cards, security tokens (hardware/software) (Birss, 1997), digital certificates, etc. These authentication techniques are generally securer than the password method, etc. and can also be used in conjunction to the authentication by knowledge techniques. a. Hardware Tokens A hardware device generates a new access key periodically (e.g. every minute) based on a unique 128-bit encryption seed. Benefits: Hardware tokens are easy to use authentication mean that is securer than passwords and PINs and provide secure credential access (login and transactional...
10 Pages(2500 words)Research Paper

Data Analysis & Research Methods

...?Question A (a) ?X = 68 ?Y= 313 ?XY =631 ?X2 =152 ?Y2=3785 Null hypothesis: there is enough evidence to show that support for the new waste policy was related to the volume of waste produced prior to the policy’s introduction. Correlation(r) = [N?XY - (?X) (?Y) / v ([N?X2 (?X) 2] [N?Y2 - (?Y) 2])] r = [35*631-68*313/v ([35*152*4624] [35*3785-97,969)] r = 801/v3456 801/1805421.6 r = 0.0004 r2=0. 0000002 r2~ 0 The correlation of coefficient, which is denoted by ‘r’, is 0.0004. Ordinarily, this measurement ranges from -1.0 to +1.0 and the “closer r is to +1 or -1; the more closely the two variables are related” (Conover, 1980, p. 263). Apparently, ‘r’ is very close to zero, which means that the two variables have no relationship... A (a) ?X = 68 ...
15 Pages(3750 words)Essay


...the encrypted session key __ using Tait's private key KT {{ks}KT}KT = ONENINETWO Question 3 Complete the following unfinished sections in the main body and appendix of the report printed in the appendix to this companion, and referred to in the 'Background for Questions 2 and 3'. Include in your answer the parts shown below. Title Communication Technology Design for Confidentiality and Quality Monitoring of CV Service Section 2 A simplified explanation of encryptionEncryption is the conversion of data into a form called ciphertext. Ciphertext is not understandable unless it is decrypted History tells us that even during...
6 Pages(1500 words)Essay

Data Collection Methods

...DATA COLLECTION METHODS For any research effective data collections methods are essential to study and solve the research question. Below are the common data collection methodologies. FOCUS GROUP Focus group discussion is an informal group discussion technique. In a focus group people are brought together to discuss an issue. In-group discussion the researcher collects data by group interaction on a topic determined by the researcher. The group discussion lasts for two hours or less and is run by a moderator to maintain the groups focus (Hamel, 2001s). Focus group Advantages and Dis-advantages According to Morgan (1996) focus group...
4 Pages(1000 words)Essay

Security through authentication and Encryption

...Network Security Security through Authentication and Encryption _______________ Grade: _______________ ________________ Dated: 2008-12-12 Abstract Security enhancement strategies do not only allow access to solely employees, who are responsible for maintaining and operating systems, but to manage their systems or online businesses in a way that limits online access so as to prevent any possible threats and attacks. This includes first and foremost the notion that data or any correspondence between the business and the customer to be kept confidential. In order to maintain confidentiality, the need for authentication and encryption arises. Though this is not all that guarantees security on the organization’s network, but still... and...
8 Pages(2000 words)Essay

Data Encryption

...Data Encryption By Software Brief of the program and what it claims to do Specific business needs being addressed by program and value delivered by it Your reasons why you decided to check it out (first impression) Your overall evaluation of it, to the degree that you can judge; is it something youd use?  Why? (Please comment also on the effectiveness of the demo itself) PGP Whole Disk Encryption PGP completes Disk Encryption from Symantec Corporation that offers organizations with complete,...
2 Pages(500 words)Essay

Encryption of data in transit and data at rest

...Encryption of Data at rest and in Transit Encryption of Data at rest and in Transit Introduction The last two decades have seen a great deal of increase in the amount of information that has been uploaded online. The type of information that is present on the Internet ranges from private to professional. Furthermore access to these pieces of information has become more and more easy. To protect such information over the Internet and on a computer it is vital to adhere to the basics of computer security and implement the necessary security features that completely secure data present online. Encryption is one such method that is implemented to various security systems across the globe. Encryption in the field of computer security... ...
9 Pages(2250 words)Research Paper

Data Collection Methods Comparison

...Data Collection Methods Comparison Researchers have to select the most effective research approaches for their studies. In the event that researchers want to focus on qualitative research, they often have to choose between case studies, phenomenology, ethnography and narrative histories. Consequently, it is necessary to establish the different challenges and issues encountered when using the approaches. The Challenges Involved In the Three Qualitative Methods Phenomenological studies Phenomenology refers to the process of studying an idea or concept that contains a shared meaning for a small group of people. The method involves the lived experiences of a specific phenomenon (Aspers, 2009). For instance, a researcher can evaluate... the...
6 Pages(1500 words)Research Paper

Methods of Data Collection

...Methods of Data Collection Data Collection is so critical in any form of research study. Data collection that is not accurate can affect the study results and probably might lead to poor results. Methods of data collection for impact evaluation normally vary along a continuum. It is seen that there are quantitative methods at one end of the continuum while at the other continuum end are Qualitative methods for data collection. There are several methods of data collection but the ones used in the initiative have been explored. In survey research (Quantitative research), it is observed that interviews are more structured as compared to Qualitative research. In a structured interview, there are set of questions that are asked... by the...
3 Pages(750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Data Encryption and Authentication Methods for FREE!

Contact Us