Anda di halaman 1dari 15

Encryption

and
Case study on Data Protection

BY:
Dheeraj Srinath

Encryption

What is encryption?
A process that converts original
information, also called plain text into a
difficult-to-interpret form called cipher
text.
Done by using an encryption algorithm, a
formula used to turn plain text into cipher
text.
Two types: Asymmetric and Symmetric

History
Classic cryptography
o Used to create mystery
o Used first by Julies creaser

Medieval cryptography

Period till 1800 AD.


Arabs were the first to document cryptographic techniques

1800 to World War II


o Widely used in World War I

World War II
o Mechanical machines
o Enigma

Modern cryptography
o Use of computer algorithms

Encryption Process

Hash Function
Hash functions are primarily used to
generatefixed-length output datathat acts as
a shortened reference to the original data
Input : Message of any length
Output: fixed length string called message digest
Used to verify the authenticity of data.
Most widely used are MD5, SHA1.

Algorithms
Private key/ Synchronous
o DES
o AES

Public Key/ Asynchronous


o RSA

Hashing
o MD5
o SHA1

Advantages

Privacy and protection.


Identity Theft Prevention
Unauthorised Access Protection
Compliance with DataProtection Acts
Prevention from hackers
Helps move data to the cloud
Prevent service providers from accessing
your data

Disadvantages
Key management.
Loss of key could lead to permanent loss
of data
Time consuming
Complex
Software's are not always trustworthy

Data Protection
Case Study

Threats to Data
Loss or damage due to a systemCRASH
Data getting corrupted as a result of faulty disks,
disk drives, or power failures
Loss by accidental deletion or overwriting
Attack by VIRUS.
HACKEDinto by unauthorised users and deleted
or altered
Destroyed by natural disasters, acts of terrorism,
or war
Deleted or altered by employees wishing to make
money or take revenge on their employer.

Protection plan

Multiple Copies of Data


Keep one copy of data on the cloud
Make sure the copies are encrypted
Keep encryption key separately
Use firewall and antivirus
Keep all sensitive on a stand alone PC
Keep a copy on a stand-alone system
Maintain a hash table of files

Conclusion
Encryption is not only required
but it is the only way out for
protecting the data.