Encryption: Difference between revisions
(→Links) |
|||
Line 3: | Line 3: | ||
== What is Encryption? == | == What is Encryption? == | ||
Encryption, in the context of software, is process by which data in a computer can be encoded in such a way that no one can determine its original value, save for the original owner of the data and whoever he or she sees fit. In this manner, private or sensitive data can be protected without having to physically deny access to the medium that holds the data (e.g. a server). | |||
In general, encryption consists of three items: the original data, the encryption algorithm known as the cypher, and the "solution" to that algorithm called the key. The cypher uses instructions provided by the key to perform an operation on the data, giving it a new value that does not yield any useful information about the original state of the data. At first glance, the new data may appear to simply be gibberish or random noise. In this state, the data is said to be encrypted. To decrypt the data, one simply has to plug the key back into the cypher and run the operations in reverse. | |||
It is not impossible to perform the decryption without the key, but if the key is of sufficient complexity or length, even a brute-force approach may require an impractical amount of time. It is for this reason that most clients can be certain that their data will not be compromised. It is also for this reason that clients need to take care that their key is only provided to people that they want to share the data with. | |||
== Different Kinds of Encryption == | == Different Kinds of Encryption == |
Revision as of 20:47, 31 July 2008
Study Guide
What is Encryption?
Encryption, in the context of software, is process by which data in a computer can be encoded in such a way that no one can determine its original value, save for the original owner of the data and whoever he or she sees fit. In this manner, private or sensitive data can be protected without having to physically deny access to the medium that holds the data (e.g. a server).
In general, encryption consists of three items: the original data, the encryption algorithm known as the cypher, and the "solution" to that algorithm called the key. The cypher uses instructions provided by the key to perform an operation on the data, giving it a new value that does not yield any useful information about the original state of the data. At first glance, the new data may appear to simply be gibberish or random noise. In this state, the data is said to be encrypted. To decrypt the data, one simply has to plug the key back into the cypher and run the operations in reverse.
It is not impossible to perform the decryption without the key, but if the key is of sufficient complexity or length, even a brute-force approach may require an impractical amount of time. It is for this reason that most clients can be certain that their data will not be compromised. It is also for this reason that clients need to take care that their key is only provided to people that they want to share the data with.
Different Kinds of Encryption
Ethical Considerations
Links
These will be sorted later on.
- Ethical Considerations of Privacy and Cyber-Medical Information by Jonathan Klemens
- Ethical Considerations for Providing Professional Services Online by J.H. Yamamura and F.H. Grupe
- Federal government pushes full-disk encryption by Dennis Fisher
- Government buys encryption by Michael Mongold
- Federal encryption standardization by Douglas Schweitzer
- Your Encryption Key a Fifth Amendment Right?
- A Pretty Good Way to Foil the NSA by Ryan Singel
- Voice Encryption May Draw U.S. Scrutiny by John Markoff
- The University's Role in Advancing Data Encryption, Part 2 by Andrew Burger
- Unlocking encryption management by Matt Hines
- Wikipedia Entry on Encryption
- How Encryption Works by Jeff Tyson