Encryption software

Encryption software is software that uses cryptography to prevent unauthorized access to digital information.[1][2] Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.[3]

Classification

There are many software products which provide encryption. Software encryption uses a cipher to obscure the content into ciphertext. One way to classify this type of software is the type of cipher used. Ciphers can be divided into two categories: public key ciphers (also known as asymmetric ciphers), and symmetric key ciphers.[4] Encryption software can be based on either public key or symmetric key encryption.

Another way to classify software encryption is to categorize its purpose. Using this approach, software encryption may be classified into software which encrypts "data in transit" and software which encrypts "data at rest". Data in transit generally uses public key ciphers, and data at rest generally uses symmetric key ciphers.

Symmetric key ciphers can be further divided into stream ciphers and block ciphers. Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information. The key is used to establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. For example, AES processes 16-byte blocks, while its predecessor DES encrypted blocks of eight bytes.

There is also a well-known case where PKI is used for data in transit of data at rest.

Data in transit

Data in transit is data that is being sent over a computer network. When the data is between two endpoints, any confidential information may be vulnerable. The payload (confidential information) can be encrypted to secure its confidentiality, as well as its integrity and validity.[5]

Often, the data in transit is between two entities that do not know each other - such as in the case of visiting a website. As establishing a relationship and securely sharing an encryption key to secure the information that will be exchanged, a set of roles, policies, and procedures to accomplish this has been developed; it is known as the public key infrastructure, or PKI. Once PKI has established a secure connection, a symmetric key can be shared between endpoints. A symmetric key is preferred over the private and public keys as a symmetric cipher is much more efficient (uses fewer CPU cycles) than an asymmetric cipher.[6][7] There are several methods for encrypting data in transit, such as IPsec, SCP, SFTP, SSH, OpenPGP and HTTPS.

Data at rest

Data at rest refers to data that has been saved to persistent storage. Data at rest is generally encrypted by a symmetric key.

Encryption may be applied at different layers in the storage stack. For example, encryption can be configured at the disk layer, on a subset of a disk called a partition, on a volume, which is a combination of disks or partitions, at the layer of a file system, or within user space applications such as database or other applications that run on the host operating system.

With full disk encryption, the entire disk is encrypted (except for the bits necessary to boot or access the disk when not using an unencrypted boot/preboot partition).[8] As disks can be partitioned into multiple partitions, partition encryption can be used to encrypt individual disk partitions.[9] Volumes, created by combining two or more partitions, can be encrypted using volume encryption.[10] File systems, also composed of one or more partitions, can be encrypted using filesystem-level encryption. Directories are referred to as encrypted when the files within the directory are encrypted.[11][12] File encryption encrypts a single file. Database encryption acts on the data to be stored, accepting unencrypted information and writing that information to persistent storage only after it has encrypted the data. Device-level encryption, a somewhat vague term that includes encryption-capable tape drives, can be used to offload the encryption tasks from the CPU.

Transit of data at rest

When there is a need to securely transmit data at rest, without the ability to create a secure connection, user space tools have been developed that support this need. These tools rely upon the receiver publishing their public key, and the sender being able to obtain that public key. The sender is then able to create a symmetric key to encrypt the information, and then use the receiver's public key to securely protect the transmission of the information and the symmetric key. This allows secure transmission of information from one party to another. [citation needed]

Performance

The performance of encryption software is measured relative to the speed of the CPU. Thus, cycles per byte (sometimes abbreviated cpb), a unit indicating the number of clock cycles a microprocessor will need per byte of data processed, is the usual unit of measurement.[13] Cycles per byte serve as a partial indicator of real-world performance in cryptographic functions.[14] Applications may offer their own encryption called native encryption, including databases applications such as Microsoft SQL, Oracle, and MongoDB, and commonly rely on direct usage of CPU cycles for performance. This often impacts the desirability of encryption in businesses seeking greater security and ease of satisfying compliance by impacting the speed and scale of how data within organizations through to their partners.[15]

See also

References

  1. ^ Thakur, Dinesh. "Cryptography - What is Cryptography?".
  2. ^ "What is encryption? - Definition from WhatIs.com". SearchSecurity. Retrieved 25 April 2017.
  3. ^ "Why We Encrypt - Schneier on Security".
  4. ^ Chandra, Sourabh; Paira, Smita; Alam, Sk Safikul; Sanyal, Goutam (Nov 2014). "A comparative survey of Symmetric and Asymmetric Key Cryptography". IEEE: 83–93. doi:10.1109/ICECCE.2014.7086640. ISBN 978-1-4799-5748-4. S2CID 377667.
  5. ^ "Guide to Cryptography - OWASP".
  6. ^ Villanueva, John Carl. "Symmetric vs Asymmetric Encryption".
  7. ^ "Symmetric vs. Asymmetric Encryption - CipherCloud". 4 October 2013. Archived from the original on 15 August 2018. Retrieved 27 March 2017.
  8. ^ "How Whole Disk Encrypytion Works" (PDF). Archived from the original (PDF) on 2017-03-23. Retrieved 2017-03-27.
  9. ^ "How to encrypt a single partition in Linux - TechRepublic".
  10. ^ https://www.jetico.com/web_help/bcve3_enterprise/html/01_introduction/02_what_is_ve.htm Volume Encryption
  11. ^ "How IT Works: Encrypting File System".
  12. ^ "PDS Software Solutions LLC". Archived from the original on 2018-07-19. Retrieved 2017-03-27.
  13. ^ "Processor allocation".
  14. ^ "Engineering comparison of SHA-3 candidates". Archived from the original on 2019-10-13. Retrieved 2019-09-24.
  15. ^ "Businesses fail to apply encryption technology effectively". ComputerWeekly.com. Retrieved 2020-04-23.

Read other articles:

Lambang Komune Marles-en-Brie. Marles-en-BrieNegaraPrancisArondisemenProvinsKantonRozay-en-BrieAntarkomuneCommunauté de communes du Val BréonPemerintahan • Wali kota (2008-2014) Monique Allain • Populasi11,294Kode INSEE/pos77277 / 2 Population sans doubles comptes: penghitungan tunggal penduduk di komune lain (e.g. mahasiswa dan personil militer). Marles-en-Brie merupakan sebuah komune di departemen Seine-et-Marne di region Île-de-France di utara-tengah Prancis...

 

Ambassador of Peru to the Republic of PanamaGreat Seal of PeruIncumbentVacantMinistry of Foreign AffairsMarbella 53, Panama CityAppointerThe President of PeruInaugural holderVíctor R. Cárdenas[1][2]FormationSeptember 1904WebsiteEmbassy of Peru in Panama The Extraordinary and Plenipotentiary Ambassador of Peru to the Republic of Panama is the official representative of the Republic of Peru to the Republic of Panama. Both countries established relations on December 18, 1903, a...

 

H.L.A. HartLahirHerbert Lionel Adolphus Hart18 Juli 1907Harrogate, Britania RayaMeninggal19 Desember 1992(1992-12-19) (umur 85)Oxford, Britania RayaAlmamaterNew College, OxfordSuami/istriJenifer Williams (1941-92, kematiannya)EraFilsafat abad ke-20KawasanFilsuf baratAliranAnalitikMinat utamaYurisprudensi, positivisme hukum, filsafat linguistik, filsafat politik, liberalisme, utilitarianisme Dipengaruhi Jeremy Bentham, John Austin, J. L. Austin, Ludwig Wittgenstein, Hans Kelsen, Max ...

Борис II Борис II 3-й Цар Болгарії 969 — 977 Попередник: Петро I Спадкоємець: Роман   Народження: 931(0931)Константинополь Смерть: 977(0977) Рід: Krum's dynastyd Батько: Петро I Мати: Цариця Ірина  Медіафайли у Вікісховищі Борис II (931–977) — цар Болгарії з 969 до 977 року, з 971 року перебува...

 

Stasiun Malang Kotalama PD17 Stasiun Malang Kotalama pada tahun 2022LokasiJalan Kolonel SugionoCiptomulyo, Sukun, Malang, Jawa TimurIndonesiaKetinggian+429 mOperatorKereta Api IndonesiaDaerah Operasi VIII Surabaya KAI CommuterKAI LogistikLetak dari pangkal km 51+370 lintas Bangil-Blitar-Kertosono km 1+000 lintas Malang Jagalan–Malang Kotalama–Gondanglegi–Dampit[1] Jumlah peron3 (satu peron sisi yang rendah,satu peron pulau yang tinggi dan satu peron pulau yang rendah)Jumlah jalu...

 

1763 conflict by Native Americans against the British in Canada Pontiac's RebellionPart of the American Indian WarsIn a famous council on April 27, 1763, Pontiac urged listeners to rise up against the British (19th century engraving by Alfred Bobbett)DateApril 27, 1763 – July 25, 1766(3 years, 2 months and 4 weeks)LocationGreat Lakes region of North AmericaResult Military stalemate; Native Americans concede British sovereignty but compel British policy changesTerritorialchang...

Onitis alexis Klasifikasi ilmiah Kerajaan: Animalia Filum: Arthropoda Kelas: Insecta Ordo: Coleoptera Famili: Scarabaeidae Genus: Onitis Spesies: Onitis alexis Onitis alexis adalah spesies kumbang yang berasal dari genus Onitis dan famili Scarabaeidae. Kumbang ini juga merupakan bagian dari ordo Coleoptera, kelas Insecta, filum Arthropoda, dan kingdom Animalia. Kumbang ini memiliki antena yang terdiri dari plat yang disebut lamela. Referensi Bisby F.A., Roskov Y.R., Orrell T.M., Nicolson D., ...

 

The Pirate Queen2006 Chicago Logo for The Pirate QueenMusicClaude-Michel SchönbergLyricsAlain Boublil (French lyrics) Richard Maltby Jr. (English lyric adaptations) John Dempsey (English lyric adaptations) BookAlain Boublil (French book) Claude-Michel Schönberg (French book) Richard Maltby Jr. (English book adaptations) BasisGrania: She-King of the Irish Seas by Morgan LlywelynProductions2006 Chicago 2007 Broadway 2009 Japan 2020 London The Pirate Queen is a musical with music by Claude-Mic...

 

Season of television series The VoiceSeason 2Promotional posterHosted byCarson DalyChristina Milian (social media)CoachesAdam LevineCeeLo GreenChristina AguileraBlake SheltonNo. of contestants48 artistsWinnerJermaine PaulWinning coachBlake SheltonRunner-upJuliet Simms ReleaseOriginal networkNBCOriginal releaseFebruary 5 (2012-02-05) –May 8, 2012 (2012-05-08)Season chronology← PreviousSeason 1Next →Season 3 The second season of the American reality talent show Th...

Indian mountaineer (born 2000) Malavath PurnaPoorna (second from left) (third from right) with PM Narendra Modi in 2014Personal informationBorn10 June 2000 (2000-06-10) (age 23)Pakala, Andhra Pradesh (now Telangana), IndiaEducationMinnesota State University, Mankato, USA Telangana Social Welfare Residential School TSWREIS Himalayan Mountaineering Institute, DarjeelingClimbing careerKnown forMount EverestMajor ascentsMount Everest in 2014Mount Kilimanjaro in 2016Mount Elbrus in 2017 ...

 

2011 film by Steve McQueen For other uses, see Shame (disambiguation). ShameTheatrical release posterDirected bySteve McQueenWritten bySteve McQueenAbi MorganProduced byIain CanningEmile ShermanStarring Michael Fassbender Carey Mulligan CinematographySean BobbittEdited byJoe WalkerMusic byHarry EscottProductioncompaniesFilm4UK Film CouncilAlliance FilmsLipsync ProductionsHanWay FilmsSee-Saw FilmsDistributed byMomentum PicturesRelease dates 4 September 2011 (2011-09-04) (Ven...

 

Mountain massif in Catalonia, Spain Cardó MassifSerra de Cardó mountain range seen from the south near BenifalletHighest pointElevation942 m (3,091 ft)Coordinates40°54′02″N 0°35′36″E / 40.90056°N 0.59333°E / 40.90056; 0.59333DimensionsArea340 km2 (130 sq mi)GeographyCardó MassifCatalonia, SpainShow map of Province of TarragonaCardó MassifCardó Massif (Catalonia)Show map of Catalonia LocationBaix Ebre, Catalonia,SpainParent...

This article is part of a series on thePolitics ofColombia Government Constitution of Colombia Law Taxation Policy Executive President Gustavo Petro (PH) Vice President Francia Márquez (PH) Cabinet of Colombia (Petro) Legislature Congress of Colombia Senate President of Senate Iván Name (AV) Chamber of Representatives President of the Chamber Andrés Calle (L) Judiciary Constitutional Court President of the Constitutional Court Cristina Pardo Supreme Court of Juistice President of the Supre...

 

A PETA activist dressed as a chicken confronts the manager of the Times Square McDonald's over the company's animal welfare standards. The American restaurant chain McDonald's has been criticised for numerous aspects of its business, including the health effects of its products, its treatment of employees, the environmental impact of its operations, and other business practices. Food In the late 1980s, Phil Sokolof, a millionaire businessman who had suffered a heart attack at the age of 43, t...

 

Overview of education in Houston This article is intended to give an overview of the education in Houston. Healthcare and scientific research Texas Medical Center Main article: Texas Medical Center See also: List of hospitals in Texas Houston is the seat of the internationally renowned Texas Medical Center, which contains the world's largest concentration of research and healthcare institutions.[1] All 47 member institutions of the Texas Medical Center are non-profit organizations. Th...

License with minimal restrictions A permissive software license, sometimes also called BSD-like or BSD-style license,[1] is a free-software license which instead of copyleft protections, carries only minimal restrictions on how the software can be used, modified, and redistributed, usually including a warranty disclaimer. Examples include the GNU All-permissive License, MIT License, BSD licenses, Apple Public Source License and Apache license. As of 2016,[update] the most popu...

 

Argentine government agency Argentine MintCasa de Moneda ArgentinaCasa de Moneda building in Buenos AiresAgency overviewFormed1875; 148 years ago (1875)TypeMintJurisdictionArgentinaHeadquartersAv. Antártida Argentina 2085,[1] Buenos AiresMinister responsibleMinistry of EconomyAgency executiveAngel Mario Elettore, President [2]Parent agencyMinistry of EconomyWebsitecasademoneda.com.ar The Casa de Moneda de la República Argentina is the Argentine mint, contro...

 

1964 book by Robert F. Kennedy The topic of this article may not meet Wikipedia's notability guideline for books. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted.Find sources: The Pursuit of Justice – news · newspapers · books...

Kaipuhan na ma-wikify ining artikulo tangarig maabot an estandarte kan Wikipedia.Tabangi tabì sa pagpakarhay kaining artikulo na igwang importanteng mga panlaog na takod. (Mayo 2008) An Isla kan Singapur, o Pulau Ujong, iyo an main constituent island kan soberanong islang nasyon asin syudad-estado kan Republika kan Singapur. Iyan namomogtak sa pinakakaibabang puro kan Malay Peninsula, sa pag-ultanan kan Straits of Malacca asin an South China Sea. An Itiot kan Singapur namomogtak sa habagatan...

 

Jesús Balmori Información personalNacimiento 10 de enero de 1886 Manila, FilipinasFallecimiento 23 de mayo de 1948 (62 años)Ciudad de México (México) Nacionalidad FilipinasFilipinasEducaciónEducado en Colegio de San Juan de LetránUniversidad de Santo Tomás Información profesionalOcupación EscritorAños activo siglo XXSeudónimo Batikuling y Julio Brial Lengua literaria CastellanoFirma [editar datos en Wikidata] Jesús Balmori y González Mondragón (Manila, 10 de ener...

 

Strategi Solo vs Squad di Free Fire: Cara Menang Mudah!