StudentShare solutions
Triangle menu

Data Encryption and Authentication Methods - Term Paper Example

Not dowloaded yet

Extract of sample
Data Encryption and Authentication Methods

The recipient's identity is usually established online through digital signatures or certificates.
Under this encryption, the user has to manually select the files and folders to be encrypted and run special command/ menu item to encrypt and decrypt the selected objects through certain software. Thus, the user must always remember to encrypt the relevant data before logging off. This gives scope for human errors, where the user might forget to encrypt the data before leaving the system. However, manual encryption is technically more reliable and simple than other forms of encryption.[Cryprite.com]
In this form of encryption, encryption is compulsorily done permanently on the disc during every read and write task. The encrypted data is stored in the transparently encrypted volumes. In this type of encryption, encrypted data can only be transferred from computer to computer through diskettes. For the purpose of low level encryption, transparent encryption is the safest way to secure one's data. However, in this type of encryption, there are problems in implementation as it doesn't generally fit into multi-user networks.
This kind of encryption involves encrypting the data before and after certain read /write functions are completed or certain confidential files are accessed. When a file is copied or moved, it is ciphered in a secret folder and when it is opened through a standard application, it is deciphered. Again, when the application is to be shut down, the files are enciphered. Thus, at Start up, the encrypted files/folders are deciphered from specified folders/files and enciphered again during shutdown. A disadvantage is that when the data to be encrypted is too large, it may lead to loss of data and reduction in efficiency of the computer.
1

Protection and authentication of data can be also be achieved at three levels :

Email and file-encryption
The use of passwords while accessing e-mails provides the first level of security. These mails could be encrypted and sent over a secure network by the sender and again decoded and read by the receiver. However, with the use of internet expanding to unlimited proportions, files can be intercepted and sensitive information can be accessed by hackers. It is also possible to hack or send phishing mails through e-mails.
Data encryption during transmission using VPNs
Transmission encryption technologies include DES (Data Encryption Standard) or AES (Advanced Encryption Standard) .This is a relatively safer way of transmitting information over the internet. A virtual private network cannot be easily accessed by intruders or hackers and information is encrypted using standard procedures like DES or AES.
Password encryption on public interfaces
An example of asymmetrical key provision; this type of encryption involves the use of a plug point that has to manage keys, decide the algorithm to use for encryption and protect the master key or secret.

Classification based on keys :
Cryptography is the process of disguising data as cipher text before sending it over a network.
This disguised data is encrypted by applying an algorithm to a ...Show more

Summary

Internet has today become the easiest and most convenient form of communication between individuals, corporates and even governments. With growth in volumes of data, come security problems. Programming and coding have become very common and easy to access, leading to an increase in internet crime…
Author : vgraham
Data Encryption and Authentication Methods essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the term paper on your topic
"Data Encryption and Authentication Methods"
with a personal 20% discount.
Grab the best paper

Related Essays

Network Security Risk Assessment
Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information.
9 pages (2250 words) Term Paper
Service Desk Shift Supervisor's Guide
According to Pringle and O’Keefe (2003), “Task-oriented writing makes up the bulk of technical documentation—installation manuals, getting started manuals, and user guides, for example”. The main objective of technical writing is to help the consumer use a product—in this case, a software application.
25 pages (6250 words) Term Paper
Named data networking
Indeed, current networks have many innovations that have transformed how data are shared between various computers connected to the internet. Despite these, the same network is characterized by many challenges that have hindered the transfer of data between different endpoints.
5 pages (1250 words) Term Paper
Virtual Private Network
....3 1.1 Screenshots ………………………………………………………………………………6 1.2 Advantages/ Disadvantages ………………………………………………………………7 2.0 Cisco VPN Client……………………………………………………………………………………..7 2.1 Screenshots………………………………………………………………………………..9 2.2 Advantages/ Disadvantages……………………………………………………………..10 3.0 LogMeIn Hamachi……………………………………………………………………………….
8 pages (2000 words) Term Paper
The National Security Agency and Cryptography
government (Dulaney 344). Moreover, Cryptographic Interoperability Strategy (CIS) was first developed in the United States to enhance sharing of information both within and beyond U.S. Cryptography is the main business carried out by the National Security Agency in the United States, and it has the largest number of employed mathematicians in the World.
8 pages (2000 words) Term Paper
Biometrics
There are various kinds of biometrics one of the most common being facial recognition. In facial recognition, the spatial geometry of the facial biometrics is recorded. There are various ways of facial recognition but the common feature for all of them is the fact that they all rely on measurement of the distinguishable facial features (Woodward et al.
5 pages (1250 words) Term Paper
Big data
In fact, these data and information are believed to be the most important asset for business organizations for the reason that they make use of these data to drive useful patterns on the basis of which they take effective decisions. In addition, because of latest tools and technologies such as the Internet this world has turned into the information based age.
12 pages (3000 words) Term Paper
Hackers Tools and Techniques: PayPal
Spoof mails, extracting data through public chat rooms and phishing are the main techniques that hackers use. Hackers also attempt to extract data through PayPal’s partners, as in the
7 pages (1750 words) Term Paper
An Evaluation of the Recent IEEE 802.11ac Wireless Protocol
It will also be viewed on its differences with the older protocol 802.11n on how it can influence security. Its function on security will be tested by the proposed algorithm tests. The tests that will be used for
17 pages (4250 words) Term Paper
Improvement methods
Many companies are focusing on lean manufacturing, and mass customization strategies to satisfy customer needs cost effectively and in turn maximize their returns. The concern of most producers is to understand how different work improvement methods affect work
5 pages (1250 words) Term Paper
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation