StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Data Encryption and Authentication Methods - Term Paper Example

Cite this document
Summary
Internet has today become the easiest and most convenient form of communication between individuals, corporates and even governments. With growth in volumes of data, come security problems. Programming and coding have become very common and easy to access, leading to an increase in internet crime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Data Encryption and Authentication Methods
Read Text Preview

Extract of sample "Data Encryption and Authentication Methods"

Download file to see previous pages

The recipient's identity is usually established online through digital signatures or certificates. Under this encryption, the user has to manually select the files and folders to be encrypted and run special command/ menu item to encrypt and decrypt the selected objects through certain software. Thus, the user must always remember to encrypt the relevant data before logging off. This gives scope for human errors, where the user might forget to encrypt the data before leaving the system. However, manual encryption is technically more reliable and simple than other forms of encryption.[Cryprite.com] In this form of encryption, encryption is compulsorily done permanently on the disc during every read and write task.

The encrypted data is stored in the transparently encrypted volumes. In this type of encryption, encrypted data can only be transferred from computer to computer through diskettes. For the purpose of low level encryption, transparent encryption is the safest way to secure one's data. However, in this type of encryption, there are problems in implementation as it doesn't generally fit into multi-user networks. This kind of encryption involves encrypting the data before and after certain read /write functions are completed or certain confidential files are accessed.

When a file is copied or moved, it is ciphered in a secret folder and when it is opened through a standard application, it is deciphered. Again, when the application is to be shut down, the files are enciphered. Thus, at Start up, the encrypted files/folders are deciphered from specified folders/files and enciphered again during shutdown. A disadvantage is that when the data to be encrypted is too large, it may lead to loss of data and reduction in efficiency of the computer.1Protection and authentication of data can be also be achieved at three levels : Email and file-encryption The use of passwords while accessing e-mails provides the first level of security.

These mails could be encrypted and sent over a secure network by the sender and again decoded and read by the receiver. However, with the use of internet expanding to unlimited proportions, files can be intercepted and sensitive information can be accessed by hackers. It is also possible to hack or send phishing mails through e-mails.Data encryption during transmission using VPNs Transmission encryption technologies include DES (Data Encryption Standard) or AES (Advanced Encryption Standard) .

This is a relatively safer way of transmitting information over the internet. A virtual private network cannot be easily accessed by intruders or hackers and information is encrypted using standard procedures like DES or AES.Password encryption on public interfacesAn example of asymmetrical key provision; this type of encryption involves the use of a plug point that has to manage keys, decide the algorithm to use for encryption and protect the master key or secret.Classification based on keys : Cryptography is the process of disguising data as cipher text before sending it over a network.

This disguised data is encrypted by applying an algorithm to a

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Encryption and Authentication Methods Term Paper”, n.d.)
Data Encryption and Authentication Methods Term Paper. Retrieved from https://studentshare.org/miscellaneous/1504824-data-encryption-and-authentication-methods
(Data Encryption and Authentication Methods Term Paper)
Data Encryption and Authentication Methods Term Paper. https://studentshare.org/miscellaneous/1504824-data-encryption-and-authentication-methods.
“Data Encryption and Authentication Methods Term Paper”, n.d. https://studentshare.org/miscellaneous/1504824-data-encryption-and-authentication-methods.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Encryption and Authentication Methods

Asymmetric or Symmetric Key Encryption

As compared to the symmetric encryption method in asymmetric encryption two keys are used: one for encryption and another for decryption.... This encryption technique provides higher security as it makes use of two keys: one for encryption and another for decryption.... Some of the well-known examples of symmetric key encryption comprise TripleDES (data encryption Standard) and AES (Advanced Encryption Standard) (Stretch, 2010; Ezeobika, 2010)....
2 Pages (500 words) Case Study

Encryption of Data at Rest and in Transit - OpenSSL and Disk Utility

hen it comes to securing data at rest, there are two basic processes that can be used, encryption and authentication.... The paper "encryption of Data at Rest and in Transit - OpenSSL and Disk Utility " states that encryption software and applications such as OpenSSL and Disk Utility encrypt data with complex keys in much smaller time making sure that deciphering texts is much more difficult for an unauthorized user.... Even with the use of sophisticated encryption software does not prevent hackers from obtaining information from their victims....
9 Pages (2250 words) Essay

Security of Big Data

The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN technology in Big Data.... The paper "Securing of Big data" explores firms must be aware that certificate authority servers are vulnerable to data loss....  … Big data is defined as “the ability for an organization to take multiple pieces of information the exponential growth and availability of data, both structured and unstructured....
8 Pages (2000 words) Case Study

The Suitable Applications for Iris Based Key Generation Method

The system particularly combines with the use of cryptography keys with the distinctive biometric traits of iris to develop authentication algorithms that can be used to provide individuals with access permission to an information system or data.... For example, the public key infrastructure (PKI) method of generation may use the iris biometric features to enhance the security of Private Key and protect the user authentication systems against potential intruders....
6 Pages (1500 words) Assignment

Final project

RSA particularly works by simple mathematical relationships both in key generation, encryption and decryption.... In public key cryptography, encryption and description permit two conveying gatherings to mask data they send to one another.... authentication permits the beneficiary of data to focus its cause that is, to affirm the senders personality.... An authentication gives for the most part perceived evidence of a mans character....
4 Pages (1000 words) Research Paper

Authenticating iOS Devices to Join the Active Directory Domain

This paper is about an authenticating iOS devices to join the Active Directory Domain.... nbsp;The technology offers invaluable tools with which we can establish network systems that deliver services to its users with unparalleled convenience and security.... hellip; However, some users would be having intentions of accessing personal files of other users, corrupting public files or denying users access to printers forcing us to think carefully about network integrity....
10 Pages (2500 words) Literature review

Network Security: Kerberos

It uses a secret key cryptography to provide strong tool of authentication and strong IntroductionKerberos is a network-authenticated protocol that was developed by Massachusetts institute of technology as a solution to network solution problems.... It uses a secret key cryptography to provide strong tool of authentication and strong cryptography over the network to help the client secure the information systems and applications across the entire organisation....
8 Pages (2000 words) Essay

Cryptographic Protocols: Kerberos and IPSec

When an individual makes a security decision, he/she might wonder whether to use Kerberos or IPSec for encryption and authentication.... SP protocol will provide confidentiality to data by encrypting it, at same time this protocol will provide integrity and authentication, but the protocol will not sign the entire packet; only data (Snader,2006).... IPSec will allow for authentication of the sender and receiver and will provide methods in which the communication for both parties is secured; IPSec support is a mandatory part of IPv6....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us