Preview

Encryption

Good Essays
Open Document
Open Document
551 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Encryption
According to searchsecurity.techtarget.com, “Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.” In order to understand the data or the message that is being sent, the receiver must be able to decrypt the message. Decryption thus refers to the process of converting the message from cipher text into its original format or plaintext whereby the reader would be able to understand the message. Encryption is used to ensure the confidentiality of a message that is being sent is not compromised as in case of the message being intercepted, it ensure that only authorized individuals are able to understand the contents. As technology has been advancing, the complex nature of encrypting and decrypting messages have also been advancing. Individuals and experts now create even harder to crack algorithms and formulae for encrypting data. Despite this, there are quite often ways in which a captured message can be decrypted without the use of brute force.
The attack would be one that is based on cipher text only (www.londoninternational.ac.uk). This means that only the cipher text is acquired but has no knowledge of the meaning of the message in plaintext. One can try to critically and statistically analyze the cipher text, in order to try and derive the meaning of the encrypted text or look for combinations of common letters or character strings that would aid in the decrypting and understanding the captured message.
Another such method, as stated as my peers, is to use the fact that symmetric encryption only uses a single secret key when encrypting a message. Thus, before capturing the message, the secret key can be covertly acquired through methods such as befriending an individual who has knowledge of the key or snooping to find the key. Thus once the encrypted message is obtained, the key will already be acquired so as to decipher the message.
Another method of deciphering a captured message is

You May Also Find These Documents Helpful

  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Sending a message is much like a letter in that it is put inside another message that contains the source and destination addresses. If these are not correct the message cannot be sent. This process of putting one message format within another message format is called encapsulation. On the destination end, De-encapsulation will occur when the recipient will reverse the process by…

    • 538 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The three malicious attacks and threats that are identified from the previous investigation are called man in the middle (MITM), Denial of Service (DoS) and advanced persistent threats (APT). These three malicious attacks and threats not only expose the company to risk but can avoid the proper tools and training. An MITM is very dangerous to any company because data sent over a network, and the MITM threat can intercept this data. This information is then sent to the receiving individual after the MITM has reviewed or changed the data from the sender. In order to avoid the risk, you can receive help with decryption. Data in plain text is easily sniffed out or stolen; data sent over a network that encrypted is only readable by the sender and receiver if the proper decryption tools are present. Both parties will avoid the risk altogether with encryption.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Of the many tasks of a soldier, of all ranks and positions, one of the most important is…

    • 767 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Identification is the first of four steps of the security process. Any user that expects to gain access to a system is referred to as a supplicant, and the tool that every user who gains entry to the system is referred to as an Identifier. The identifier can have many different methods for identifying the supplicant. The…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Message understood – if the message has been communicated clearly and the other person has concentrated and there are no barriers to communication, the other person understands the message. They show they have understood by giving feedback.…

    • 973 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The encryption is a mathematically derived combination of your passcode and a unique set of secret numbers baked into your device.…

    • 753 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    data protection

    • 2038 Words
    • 9 Pages

    policy these are termed ‘users’), are fully aware of and abide by their duties and…

    • 2038 Words
    • 9 Pages
    Powerful Essays