04-03-2013, 11:44 AM
A SEMINAR REPORT ON DATA ENCRYPTION
ENCRYPTION.pptx (Size: 129.62 KB / Downloads: 39)
NEED OF DATA ENCRYPTION
Because of the globalization, now days most of the financial transactions and personal information is transferred on the internet. Because of this process data encryption is become a necessary part for effective computer security system. We sent all sensitive information via internet and because of this we need to secure our data and which in turn we need data encryption. By using a computer it become a difficult task to secure our personal information. Whenever you are sending your sensitive information on the net, it can be easily viewable for anyone who wants to see that information.When we are sending the data on the net it goes first to our near local network. The people who are living in the same area are uses the same network. Then data will goes to the internet service provider (ISP) who in turn can see the data which we are sending on net. Then our data reaches through different way to the ISP of receivers and finally it received by the party where we desired. Many people can see our data in this process. Now you can guess that why data encryption system is needed.
ENCRYPTION
Information is often stored and transmitted in a file.
Encryption algorithm transforms the plain text into cipher text.
A plain text file uses a common encoding format such as ASCII or UNICODE to represent the character of file.
Encryption is a translation of a file into a format that hides the content from EVE ;secret code;ciphertext.
Data Encryption types, and how it works…
In the world of data encryption, you have several types of options available these days. Encryption could be defined as a process that takes information and uses a mathematic algorithm to transcribe data into a different form. It then requires a special “key” to read the encrypted data and translate it back to a useable form. The two most common types of data encryption are:
Software Based Encryption
This type of encryption will typically consist of a standard storage device (Hard Drive, Flash Drive, Digital Media Card, etc.) and a software program to facilitate the encryptions. For example, the standard Disk GO Secure drive comes with a program called CryptArchiver. This software allows the user to create an encrypted “Vault” on the drive, with all files stored in the Vault area to be encrypted in either 256-bit AES or 448-bit Blowfish algorithms. The drawback to this type is encryption is that your system hardware (CPU, RAM) is responsible for all the encryption tasks done during a file transfer. This is compounded by the fact that USB itself relies on your system hardware (CPU, RAM, and hard drive speeds) to maintain reliable speeds. Because of this, you trade security for performance. Data transfers made using this encryption method can cause dramatically reduced speeds for file transfers. For example, let’s say a flash drive can be copied to at an average minimum of 4MB/s. If you added software encryption to the mix, your transfer speeds could drop to as low as 1MB/s for certain types of files.
Hardware Based Encryption
The only significant difference with Hardware Based Encryption is that all data intensive encryption tasks are done onboard the storage device, rather than relying on system resources to do the work. With this method of encryption, file transfer speeds will remain more stable during the encryption process. Also, most hardware encrypted drives are built with more robust materials and are typically highly resistant to physical damage and are likely to be water resistant. The drawback to this type of encryption is higher costs to manufacture, which means higher costs for consumers. Hardware based encryption of flash drives can sometimes be 2-3 times as expensive as software based options.
DES/3DES
The Data Encryption Standard (DES) was developed and endorsed by the U.S. government in 1977 as an official standard and forms the basis not only for the Automatic Teller Machines (ATM) PIN authentication but a variant is also utilized in UNIX password encryption. DES is a block cipher with 64-bit block size that uses 56-bit keys. Due to recent advances in computer technology, some experts no longer consider DES secure against all attacks; since then Triple-DES (3DES) has emerged as a stronger method. Using standard DES encryption, Triple-DES encrypts data three times and uses a different key for at least one of the three passes giving it a cumulative key size of 112-168 bits.
Uses of Encryption & Decryption :
Privacy & Secruty : E-mail message,Wireless network
Confidentiality ersonal records,Transaction records .
Authentication : Digital signatures,Login.
Intellectual Property : Copy protection