Tuesday, May 7, 2019

Encryption of data in transit and data at rest Research Paper

encryption of entropy in transit and entropy at rest - Research Paper Exampleencryption in the field of computer security is a process that allows substance abusers to encode their data using a certain underlying or a certain algorithm. Through the use of encryption a user is able to enhance the security of his or her data. Even though encryption of data does not inevitably restrict the access of data it however does ensure that a hacker is not able to hand over encrypted data and hence use it for personal benefit. Encrypted schoolbook is usually referred to as cipher text whereas unencrypted text is referred to as plaintext. Encryption is usually do use of for two rudimentary data types, data in transit and data at rest. Data in transit usually refers to data that is on the move, whereas data at rest refers to stored static data that is used on a few numbers of machines.Encrypting data in transit is usually carried out through the use of private and public keys. Private keys argon usually made use of to encrypt the main data that is important to a particular nerve or to a particular user. The sender usually makes of an encryption key that besides the receiver is aware of. The receiver then makes use of the same key to decrypt the information that is provided by the sender (Salomaa, 1996). world key on the other hand, is used to facilitate the exchange of the private key. Public key is made use of to encrypt the private key. The sender of the data asks the receiver to provide him or her for an encryption key. The key is then used by the sender to encrypt the message. Once the message is encrypted, its decryption send word only be carried out by the receiver (Salomaa, 1996).When it comes to securing data at rest, there are two basic process that can be used, encryption and authentication. Encryption to data at rest can be applied at a small scale, such as to a sensitive file, or it can be applied at a large scale, for example to the complete contents of a blind (Scarfone et al., 2007). The type of encryption technique that is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.