StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Data Encryption and Authentication Methods - Term Paper Example

Comments (0) Cite this document
Summary
Internet has today become the easiest and most convenient form of communication between individuals, corporates and even governments. With growth in volumes of data, come security problems. Programming and coding have become very common and easy to access, leading to an increase in internet crime…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Data Encryption and Authentication Methods
Read TextPreview

Extract of sample "Data Encryption and Authentication Methods"

Download file to see previous pages The recipient's identity is usually established online through digital signatures or certificates.
Under this encryption, the user has to manually select the files and folders to be encrypted and run special command/ menu item to encrypt and decrypt the selected objects through certain software. Thus, the user must always remember to encrypt the relevant data before logging off. This gives scope for human errors, where the user might forget to encrypt the data before leaving the system. However, manual encryption is technically more reliable and simple than other forms of encryption.[Cryprite.com]
In this form of encryption, encryption is compulsorily done permanently on the disc during every read and write task. The encrypted data is stored in the transparently encrypted volumes. In this type of encryption, encrypted data can only be transferred from computer to computer through diskettes. For the purpose of low level encryption, transparent encryption is the safest way to secure one's data. However, in this type of encryption, there are problems in implementation as it doesn't generally fit into multi-user networks.
This kind of encryption involves encrypting the data before and after certain read /write functions are completed or certain confidential files are accessed. When a file is copied or moved, it is ciphered in a secret folder and when it is opened through a standard application, it is deciphered. Again, when the application is to be shut down, the files are enciphered. Thus, at Start up, the encrypted files/folders are deciphered from specified folders/files and enciphered again during shutdown. A disadvantage is that when the data to be encrypted is too large, it may lead to loss of data and reduction in efficiency of the computer.
1
Protection and authentication of data can be also be achieved at three levels :

Email and file-encryption
The use of passwords while accessing e-mails provides the first level of security. These mails could be encrypted and sent over a secure network by the sender and again decoded and read by the receiver. However, with the use of internet expanding to unlimited proportions, files can be intercepted and sensitive information can be accessed by hackers. It is also possible to hack or send phishing mails through e-mails.
Data encryption during transmission using VPNs
Transmission encryption technologies include DES (Data Encryption Standard) or AES (Advanced Encryption Standard) .This is a relatively safer way of transmitting information over the internet. A virtual private network cannot be easily accessed by intruders or hackers and information is encrypted using standard procedures like DES or AES.
Password encryption on public interfaces
An example of asymmetrical key provision; this type of encryption involves the use of a plug point that has to manage keys, decide the algorithm to use for encryption and protect the master key or secret.
Classification based on keys :
Cryptography is the process of disguising data as cipher text before sending it over a network.
This disguised data is encrypted by applying an algorithm to a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Encryption and Authentication Methods Term Paper”, n.d.)
Data Encryption and Authentication Methods Term Paper. Retrieved from https://studentshare.org/miscellaneous/1504824-data-encryption-and-authentication-methods
(Data Encryption and Authentication Methods Term Paper)
Data Encryption and Authentication Methods Term Paper. https://studentshare.org/miscellaneous/1504824-data-encryption-and-authentication-methods.
“Data Encryption and Authentication Methods Term Paper”, n.d. https://studentshare.org/miscellaneous/1504824-data-encryption-and-authentication-methods.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Data Encryption and Authentication Methods

Managing Data of A+Retailing TLD

This is also true for the median values of the industries. The median values of turnover for Micro, Small, Medium and large industries are £420,839, £608,300, £1,275,295and £1,587,901respectively. This indicates that as the more number of employees work for the industries the median values of the turnover also increases.
However, the range values of turnover display an important pattern for the industries. The range values of turnover for Micro, Small, Medium and large industries are £849,571, £675,711, £432,838 and £1,462,188 respectively. This indicates that the ranges of turnover are very high for Micro industries as compared to Small and Medium industries. Again, the range o...
8 Pages(2000 words)Assignment

Critique of Statistical Methods for the Social Sciences Research by Agresti and Finlay

It was expected that the discussion would be about the costs associated with shrunken class size.  That it is impractical to decrease the number of students to 30 since it will not improve their academic proficiency, but would only increase costs.  Or if it does boost academic performance, it is too little to match the costs associated with that kind of class set-up. Simply stated, the cost of reducing class size to 30 is greater than the expected benefit. However, the proposal mainly dwelt on the ineffectiveness of reducing the class size, with no or minimal discussion on costs. The introduction creates a first impression on a written piece. That is why, short as it may be, the introduction should still brief and prepar...
6 Pages(1500 words)Assignment

Biology Data-based Questions

Potassium or K and Calcium or Ca has shown greater Mean Residence Time in rainforest chaparral when compared to temperate forests whereas Phosphorus or P demonstrates maximum variance in Mean Residence Time.

In general, plant productivity and Mean Residence Time are such that one increases whilst the other decreases. In subarctic regions, there is low plant productivity and greater Mean Residence Time.

In tropical forests, the mean residence time of nutrients is influenced by higher temperatures than in subarctic forests. Therefore, there is a vast difference in the MRT of nutrients pertaining to the tropical rainforest and the subarctic forest.

Nuclear fission weapons tests in 1961 released radioa...
10 Pages(2500 words)Assignment

Cultural History Versus Political History: The Varying Methods of the Two Fathers of History

Even though they have these similarities and have both been bestowed with the same title, these two historians drastically differed in their approaches.

Herodotus had another title bestowed upon him; he was also called the “Father of Lies.” Much of what is known of him has been gathered from his own writings as few other sources are available from his actual life. It should also be noted that the veracity of this information is in question as Herodotus was known to invent much in his own work, and it was sometimes the practice in Ancient Greece to attribute events from the life of one person to another; for instance, it has been questioned if the accounts of Herodotus’ exile are only due to the fact th...
10 Pages(2500 words)Essay

Effective Methods of Teaching Anatomy

Herein, comparisons will be made to highlight the differences in using anatomical models for study versus self-directed (usually textbook) learning. As well, the use of tutors as an advantage in the medical classroom will be discussed.

Some students are hands-on learners. For them, three-dimensional (3D) anatomical models are effective. “Exploratory tools enable users to investigate structures in ways not possible in the real world” (Implementing, para. 3). These 3D models can represent just about any part of the human body. Models are available of small structures, like the head, or of the entire human skeleton. Models of the entire human body can also be purchased. Some of them even have removable parts so...
6 Pages(1500 words)Report

Research Methods in Linguistics

 The writer of content tries to preserve his/her culture and also wants his/her culture to get attached to his/her recent living due to which, he/she makes use of the bilingual aspect to write a narrative.

Because of this writing, the English reader faces some problem in decoding the meaning but he/she realizes the presence of another culture by means of this writing. Many writers provide a glossary at the end so that the readers face no problem in decoding the words given in another language such as Soueif has done but many take it for granted that readers know the other language as well.

The article contains a detailed evaluation of the novel by Soueif which can be categorized as the strength of the re...
6 Pages(1500 words)Assignment

Analysis of the Methods of 3 Research Papers about Child Abuse

Research ethics was maintained as the identity of the individuals participating was kept secret. As far as the validity of the study was concerned, the researchers attempted to use content validity in order to get an accurate response. The content validity focused on measuring off the ethnicities and gender percentages within the area and attempting to get a random sample of individuals via the phone. Their approach to random calling allowed for a significant random sample in the study. There were a few issues, however, with this type of approach. Those answering the phone sometimes were not always the desired individual, and not all of the desired people were surveyed. Different replacements did have to be used, and the attempt w...
6 Pages(1500 words)Literature review

Evaluation of Performance of a Bank Using Published Accounting Data

The performance of a bank is evaluated because of various reasons. The banks evaluate their performance to find out the outcomes of previous decisions of management. The bank regulators evaluate the performance of the banks to identify the banks, which are facing severe problems. Evaluation using the published data is also needed by shareholders to make decisions such as whether to buy or sell a share of banks. Furthermore, investment analysts advise their prospective investors regarding the selection of banks for making investments after performance evaluations of banks.

There are different ways, which have been used to evaluate the performance of the banks. When the performance is analysed through available published...
7 Pages(1750 words)Case Study

Using Computers to Teach Mathematics is Better than Traditional Methods

...Using computers to teach Mathematics is better than traditional methods Computer technology has changed the face of education, and is a useful tool in the teaching of other subjects as well with Mathematics being no exception. Various calculating devices have long been used in Mathematics, but the computer offers an even greater potential. Some teachers are reluctant to use computers, for example on the grounds that it is an expensive option and not every child has access to one at home, but its prevalence nowadays means that students should be given the opportunity to use computers in their Mathematics lessons. They have the advantage of being able to make complex calculations much quicker, demonstrate graphical visualisations, instilling...
7 Pages(1750 words)Case Study

Alternative Methods of Accounting

... decisions to gain advantage from depreciation irregularities. Straight line depreciation is a simple and practical method whose purpose has never been to manipulate data. Depreciation also does not affect the cash flow of the firm. There are business projects such as strategic investments which cannot be properly evaluated using outdated financial metrics. A strategic investment is a project that produces insufficient earnings to cover the cost of capital in the early years, but will produce higher income in future fiscal years. The use of EVA is much better at accessing the value of these types of projects. A movement to switch from net income to economic income could have negative consequences. Investors currently believe a lot...
8 Pages(2000 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Data Encryption and Authentication Methods for FREE!

Contact Us