{"id":25801,"date":"2014-09-04T02:44:09","date_gmt":"2014-09-04T06:44:09","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25801"},"modified":"2014-09-04T02:44:09","modified_gmt":"2014-09-04T06:44:09","slug":"microsoft-technet-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/microsoft-technet-encryption.php","title":{"rendered":"Microsoft TechNet: Encryption"},"content":{"rendered":"<p><p>    Traditionally, ciphers have used information contained in    secret decoding keys to code and decode messages. The process    of coding plaintext to create ciphertext is called encryption    and the process of decoding ciphertext to produce the plaintext    is called decryption. Modern systems of electronic cryptography    use digital keys (bit strings) and mathematical    algorithms ( encryption algorithms ) to encrypt and    decrypt information.  <\/p>\n<p>    There are two types of encryption: symmetric key encryption and    public (asymmetric) key encryption. Symmetric key and public    key encryption are used, often in conjunction, to provide a    variety of security functions for network and information    security.  <\/p>\n<p>    Encryption algorithms that use the same key for encrypting and    for decrypting information are called symmetric-key algorithms.    The symmetric key is also called a secret key because it is    kept as a shared secret between the sender and receiver of    information. Otherwise, the confidentiality of the encrypted    information is compromised. Figure14.1 shows basic    symmetric key encryption and decryption.  <\/p>\n<p>    Figure14.1 Encryption and Decryption with a    Symmetric Key  <\/p>\n<p>    Symmetric key encryption is much faster than public key    encryption, often by 100 to 1,000 times. Because public key    encryption places a much heavier computational load on computer    processors than symmetric key encryption, symmetric key    technology is generally used to provide secrecy for the bulk    encryption and decryption of information.  <\/p>\n<p>    Symmetric keys are commonly used by security protocols as    session keys for confidential online communications.    For example, the Transport Layer Security (TLS) and Internet    Protocol security (IPSec) protocols use symmetric session keys    with standard encryption algorithms to encrypt and decrypt    confidential communications between parties. Different session    keys are used for each confidential communication session and    session keys are sometimes renewed at specified intervals.  <\/p>\n<p>    Symmetric keys also are commonly used by technologies that    provide bulk encryption of persistent data, such as e-mail    messages and document files. For example, Secure\/Multipurpose    Internet Mail Extensions (S\/MIME) uses symmetric keys to    encrypt messages for confidential mail, and Encrypting File    System (EFS) uses symmetric keys to encrypt files for    confidentiality.  <\/p>\n<p>    Cryptography-based security technologies use a variety of    symmetric key encryption algorithms to provide confidentiality.    For more information about the specific encryption algorithms    that are used by security technologies, see the applicable    documentation for each technology. For more information about    how the various symmetric key algorithms differ, see the    cryptography literature that is referenced under \"Additional    Resources\" at the end of this chapter.  <\/p>\n<p>    Encryption algorithms that use different keys for encrypting    and decrypting information are most often called public-key    algorithms but are sometimes also called asymmetric key    algorithms . Public key encryption requires the use of    both a private key (a key that is known only to its owner) and    a public key (a key that is available to and known to other    entities on the network). A user's public key, for example, can    be published in the directory so that it is accessible to other    people in the organization. The two keys are different but    complementary in function. Information that is encrypted with    the public key can be decrypted only with the corresponding    private key of the set. Figure14.2 shows basic encryption    and decryption with asymmetric keys.  <\/p>\n<p>    Figure14.2 Encryption and Decryption with    Asymmetric Keys  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc962028.aspx\" title=\"Microsoft TechNet: Encryption\">Microsoft TechNet: Encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Traditionally, ciphers have used information contained in secret decoding keys to code and decode messages. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25801","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25801"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25801"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25801\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}