Huwebes, Agosto 11, 2011

encryption

advantages of encryption


  • Data security is a more paramount concern than ever before as more and more data is transmitted between two points. Sensitive or confidential information is at serious risk without proper encryption. In both analog and digital systems, a public key encryption system is designed to allow users to transmit information to one another securely, and it has a number of advantages over a stand-alone secret key system.

Locked Messages

  • One of the biggest advantages of a public key system is simply that the users never need to transmit or reveal their private keys to anyone. A public key is used to encrypt the message, locking the information inside. Anyone can use the public key to encrypt a message. Decrypting the message, however, is another matter, and requires the specific decryption key of the intended recipient. This means that any number of people can send a message, but only the intended recipient can open it.

Private Key Retention

  • In a solely secret key system, the secret key that unlocks the message must be transmitted with the message itself. This means that during transit, the secret key is vulnerable to interception. In some cases, this system even requires trust in an outside party, such as a postal worker or other transmission medium, to convey the message and the key. A public key system allows both parties to retain their private key and reduce or even eliminate any risk of discovery.

Personal Responsibility

  • Another advantage of a public key system is that the holders of each private key are responsible for protecting it. In digital secret key systems, such as the Kerberos secret-key authentication system, a central database keeps copies of all the users' secret keys. An attack can compromise this database and allow widespread access to outside parties. The compromise of a single private key in a public key system doesn't endanger others in the system. There is also no way to claim an already authenticated message has been compromised because the shared secret key has been hijacked.

Multi-User Support

  • Many secret key systems are still in place, and in the right environment, more practical than a public key system. However, in systems with large numbers of users or open, public access, a public key system is more effective in handling the workload so many users produce.

Other Security Features

  • Public keys aren't selected by their users or very memorable. This means that deducing someone's public key is considerably more difficult. Also, the digital certificates that hold the public key are designed to be replaced after a designated period of time. This changing key ensures that individuals trying to break into the system are less likely to gain access.

disadvantages of encryption



- If you forget your passphrase and/or keyfile then there is almost no chance of recovering your data.

- Some forms of encryption only offer nominal protection and can be broken easily with the right program e.g an older ZIP archive or Word Document.

- Some encryption programs are too complicated for the everyday user and they may end up using them incorrectly. This could lead to securing data which they did not wish to encrypt or failing to encode data which they did wish to protect.

- The very existence of encryption programs or encrypted files will attract suspicion as to what it is you are trying to protect whereas a non-encrypted system would not attract the same level of interest.

- With reference to the above point, in certain countries such as the UK, Police can use legislation to compel you to reveal passwords to encrypted data. You could face jail time if you failed to comply.

- Certain types of encryption software are banned in some countries. For example, US versions of the program PGP cannot be exported outside the country.

- As Encryption protects your personal data e.g bank details, love letters etc. it also protects drug dealers who make deals from having their messages intercepted, terrorists planning attacks and paedophiles peddling child pornography.

Walang komento:

Mag-post ng isang Komento