Jump to content

User:Urouthu/sandbox

From Wikipedia, the free encyclopedia

DIFFERENT ENCRYPT IONS

[edit]

Encryption technique is for encrypt the data, which is protect, our data from unknown users. Globalization makes people to do their work better and faster as well as more impressive. [1].In the same way, organization facing many in order to prevent fraudulent issues. So firms and nations talking about security , because it is hope of millions people. If any content or files come out before destinations, there will be a place in huge problems.

Full Disk Encryption

[edit]

This security will enable full secure transparent , it provide p rebooting level security. We will use 256 bit encryption techniques while securing the data. It is simple and fast security , it will automatically encrypt as well as decry pt at the time of rebooting. It will focus on temporary files , local desks ,and removable disks as well as deleted files. The advantage with boo-table scan is to search for hidden files, if it is attacked by the any virus , it will spottily deleted the harmful content. [2] If laptop stolen or got serious threaten from network security, then encryption techniques will be secure login information , for example if any one stole Laptop, encryption technique will help us to protect login information. Especially corporate files, imported data will be saved from fraudulent people.

Removable Media Encryption:

[edit]

It solves the unique problems, every organization maintain for their daily organization. It contain personal data, or personal property . That we called as removable data storage. [3] It was available in small to large scale data bases. We will install on device application, that will run straight from the USB device, once it installed, device has been protected by the encrypted documents on any Desktop/Laptop

Email Encryption::

[edit]

It's too difficult to imagine without revolutionized business communication that Email has. For better small worlds , it's the time to keep touch with every one for reduce communication between regions and live in better world Most Benefits And had no risks It was purely non risky, it is world we exchanging lot of information even with small chip that we used for storing private. It's look like small thing but caring lot information in a single entity.

File Encryption:

[edit]

File encryption is easier when we do it in local disks. Just do through right click for encrypting and the same way do the decryption. It's not a big deal , but if send through mail attachment or outlook or any mail exchanges, encryption will start problems. So before sending files, you need to attach with algorithm that protect your files and descriptor using the methods.

Encryption beyond the domestic or home networks:

[edit]

Now competitors and globalization makes people usage of network all over the places. It means they exchanging more confidential emails that includes banking or personal mails, small scale industries , everything goes temporary unsecured data. So this we need strong data belt that enable all protecting levels through networking sites. [4] We all know, people had different offered networks like COX, Belt, Jerkier like that. They will concentrate on just networking speed, 24/7 trouble shooting only. Not in protecting our data, so this time , have to take care of data. So just enable all the essential protecting services.

Encryption:

[edit]

Encryption is the exchanging process of text, it was no longer to read. Small example for the text sihT si ehT laitnedifnoc dna tnatropmi Above data is small example for Encryption that makes data secure and confidential. This is an small encryption technique, just exchanging word format an reverse order. [5] Of course it is easier to find out, but if you find good algorithm along with that format , it makes our algorithm stronger. Bob and Alice the fictitious character candidate found encryption methods. Public and Private are two encryption methods and their limitations.

Public Key:

[edit]

Public key is the object that will be available to everyone via public, and it is approachable directory . In other hand , public key is for view-able to every one without confidential. If you want to find the private key , need a public key. The key pairs are mathematically related encrypted public key might be /only decrypted by its representing private key, to enable private key, you need public key.

Private Key:

[edit]

Private key is a standard key that encrypted with a standard form. Sender and Receiver have to share the encrypted key, as well as used for decryption the messages. Sharing the keys before encrypt the data, so here is to safe transferring keys. Both parties use copy of messages to transferring the encrypted keys. If receiver get the keys, transfer signals to sender, If confirmed positive both the parties satisfy with the encrypted keys.

Limitations of Encryption:

[edit]

Any Encryption message cannot read without key, but it is easier for new generation computer. New generation computers are fast enough for crypt analysis. [6]

They need every possible key until data would be plain text.Key is important, longer key/ slower key, for crypt analysisit also makes encryption/decryption safe and secure. 'safe' key length changes all time, 


Important

[edit]
  1. Content Type
  2. Data Size
  3. Key Type
  4. Digital Signatures
  5. PL/SQ L
  6. Encryption / Decryption Standards







References

[edit]
  1. ^ Rouse, Margaret. "Encryption". TechTarget. Retrieved 5 August 2013.
  2. ^ Limited, F. (Oct 17, 2012). Patent Issued for Stream Encryption Method and Encryption System. Journal of Engineering, 290.
  3. ^ http://www.wisegeek.com/what-are-the-different-encryption-techniques.htm
  4. ^ http://datashieldcorp.com/2013/06/04/3-different-data-encryption-methods/
  5. ^ Torata, J. (1996). Encryption Methods. Network World 13.6(Feb 5), 41.
  6. ^ Ouellette, T. (2010). Encryption. Data encryption;Computer Security;Electronic Commerce;Electronic Mail Systems, 75.