encryption

15
Encryption and Case study on Data Protection BY: Dheeraj Srinath

Upload: dheeraj-srinath

Post on 19-Dec-2015

213 views

Category:

Documents


0 download

DESCRIPTION

basics of encryption

TRANSCRIPT

Encryptionand

Case study on Data Protection

BY:Dheeraj Srinath

Encryption

What is encryption?

• A process that converts original information, also called plain text into a difficult-to-interpret form called cipher text.

• Done by using an encryption algorithm, a formula used to turn plain text into cipher text.

• Two types: Asymmetric and Symmetric

History• Classic cryptography

o Used to create mysteryo Used first by Julies creaser

• Medieval cryptography• Period till 1800 AD.• Arabs were the first to document cryptographic techniques

• 1800 to World War IIo Widely used in World War I

• World War IIo Mechanical machineso Enigma

• Modern cryptographyo Use of computer algorithms

Encryption Process

Hash Function• Hash functions are primarily used to

generate fixed-length output data that acts as a shortened reference to the original data

• Input : Message of any length• Output: fixed length string called message digest• Used to verify the authenticity of data.• Most widely used are MD5, SHA1.

Algorithms• Private key/ Synchronous

o DESo AES

• Public Key/ Asynchronouso RSA

• Hashingo MD5o SHA1

Advantages• Privacy and protection.• Identity Theft Prevention• Unauthorised Access Protection• Compliance with Data Protection Acts• Prevention from hackers• Helps move data to the cloud• Prevent service providers from accessing

your data

Disadvantages• Key management.• Loss of key could lead to permanent loss

of data• Time consuming• Complex• Software's are not always trustworthy

Data ProtectionCase Study

Threats to Data• Loss or damage due to a system CRASH• Data getting corrupted as a result of faulty disks,

disk drives, or power failures• Loss by accidental deletion or overwriting• Attack by VIRUS.• HACKED into by unauthorised users and deleted

or altered• Destroyed by natural disasters, acts of terrorism,

or war• Deleted or altered by employees wishing to make

money or take revenge on their employer.

Protection plan

• Multiple Copies of Data• Keep one copy of data on the cloud• Make sure the copies are encrypted• Keep encryption key separately • Use firewall and antivirus• Keep all sensitive on a stand alone PC• Keep a copy on a stand-alone system• Maintain a hash table of files

Conclusion• Encryption is not only required

but it is the only way out for protecting the data.