{"id":32163,"date":"2017-06-16T01:41:29","date_gmt":"2017-06-16T05:41:29","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/what-is-data-encryption-digital-guardian.php"},"modified":"2017-06-16T01:41:29","modified_gmt":"2017-06-16T05:41:29","slug":"what-is-data-encryption-digital-guardian","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/what-is-data-encryption-digital-guardian.php","title":{"rendered":"What Is Data Encryption? | Digital Guardian"},"content":{"rendered":"<p><p>Nate    Lord    Last Updated: Friday January 27, 2017    <\/p>\n<\/p>\n<p>    Data encryption defined in Data Protection 101, our series on    the fundamentals of data security.  <\/p>\n<p>    A Definition of    Data Encryption  <\/p>\n<p>    Data encryption translates    data into another form, or code, so that only people with    access to a secret key (formally called a decryption key) or    password can read it. Encrypted data    iscommonlyreferred to as    ciphertext, while unencrypted data is called plaintext.    Currently, encryption is one of the most popular and effective    data security methods used by organizations. Two main types of    data encryption exist - asymmetric encryption, also known as    public-key encryption, and symmetric encryption.  <\/p>\n<p>    The Primary Function of Data Encryption  <\/p>\n<p>    The purpose of data encryption is to protect digital data    confidentiality as it is stored on computer systems and    transmitted using the internet or other computer networks. The    outdated data encryption standard (DES) has been replaced by    modern encryption algorithms that play a critical role in the    security of IT systems and communications.  <\/p>\n<p>    These algorithms provide confidentiality and drive key security    initiatives including authentication, integrity, and    non-repudiation. Authentication allows for the verification of    a messages origin, and integrity provides proof that a    messages contents have not changed since it was sent.    Additionally, non-repudiation ensures that a message sender    cannot deny sending the message.  <\/p>\n<p>    The Process of Data Encryption  <\/p>\n<p>    Data, or plaintext, is encrypted with an encryption algorithm    and an encryption key. The process results in ciphertext, which    only can be viewed in its original form if it is decrypted with    the correct key.  <\/p>\n<p>    Symmetric-key ciphers use the same secret key for encrypting    and decrypting a message or file. While symmetric-key    encryption is much faster than asymmetric encryption, the    sender must exchange the encryption key with the recipient    before he can decrypt it. As companies find themselves needing    to securely distribute and manage huge quantities of keys, most    data encryption services have adapted and use an asymmetric    algorithm to exchange the secret key after using a symmetric    algorithm to encrypt data.  <\/p>\n<p>    On the other hand, asymmetric cryptography, sometimes referred    to as public-key cryptography, uses two different keys, one    public and one private. The public key, as it is named, may be    shared with everyone, but the private key must be protected.    The Rivest-Sharmir-Adleman (RSA) algorithm is a cryptosystem    for public-key encryption that is widely used to secure    sensitive data, especially when it is sent over an insecure    network like the internet. The RSA algorithms popularity comes    from the fact that both the public and private keys can encrypt    a message to assure the confidentiality, integrity,    authenticity, and non-repudiability of electronic    communications and data through the use of digital signatures.  <\/p>\n<p>    Challenges to Contemporary Encryption  <\/p>\n<p>    The most basic method of attack on encryption today is brute    force, or trying random keys until the right one is found. Of    course, the length of the key determines the possible number of    keys and affects the plausibility of this type of attack. It is    important to keep in mind that encryption strength is directly    proportional to key size, but as the key size increases so do    the number of resources required to perform the computation.  <\/p>\n<p>    Alternative methods of breaking a cipher include side-channel    attacks and cryptanalysis. Side-channel attacks go after the    implementation of the cipher, rather than the actual cipher    itself. These attacks tend to succeed if there is an error in    system design or execution. Likewise, cryptanalysis means    finding a weakness in the cipher and exploiting it.    Cryptanalysis is more likely to occur when there is a flaw in    the cipher itself.  <\/p>\n<p>    Data Encryption Solutions  <\/p>\n<p>    Data protection solutions for data encryption can provide    encryption of devices, email, and data itself. In many cases,    these encryption functionalities are also met with control    capabilities for devices, email, and data. Companies and    organizations face the challenge of protecting data and    preventing data loss as employees use external devices,    removable media, and web applications more often as a part of    their daily business procedures. Sensitive data may no longer    be under the companys control and protection as employees copy    data to removable devices or upload it to the cloud. As a    result, the best data loss prevention solutions prevent data    theft and the introduction of malware from removable and    external devices as well as web and cloud applications. In    order to do so, they must also ensure that devices and    applications are used properly and that data is secured by    auto-encryption even after it leaves the organization.  <\/p>\n<p>    As we mentioned, email control and encryption is another    critical component of a data loss prevention solution. Secure,    encrypted email is the only answer for regulatory compliance, a    remote workforce, BYOD, and project outsourcing. Premier data    loss prevention solutions allow your employees to continue to    work and collaborate through email while the software and tools    proactively tag, classify, and encrypt sensitive data in emails    and attachments. The best data loss prevention solutions    automatically warn, block, and encrypt sensitive information    based on message content and context, such as user, data class,    and recipient.  <\/p>\n<p>    While data encryption may seem like a daunting, complicated    process, data loss prevention software handles it reliably    every day. Data encryption does not have to be something your    organization tries to solve on its own. Choose a top data loss    prevention software that offers data encryption with device,    email, and application control and rest assured that your data    is safe.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/digitalguardian.com\/blog\/what-data-encryption\" title=\"What Is Data Encryption? | Digital Guardian\">What Is Data Encryption? | Digital Guardian<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Nate Lord Last Updated: Friday January 27, 2017 Data encryption defined in Data Protection 101, our series on the fundamentals of data security. A Definition of Data Encryption Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32163","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32163"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32163"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32163\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}