A04-005-encryption.md

"Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it."

Edward Snowden - Computer security consultant , famous whistleblower

What is Encryption

With encryption, you can scramble data so that only authorized people can read the information. Encryption is the process of converting readable text to incomprehensible text. In other words, encryption takes readable data and turns it so that it appears to be random. To be able to encrypt files you need to use a cryptographic key, it's a set of mathematical values that both the sender and recipient of a message agree on. Secure encryption will use keys complex enough that a third party is unlikely able to decrypt or break the encryption by brute force.

There are two main types of encryption: symmetric encryption and asymmetric encryption.

Differences Between Encryptions

In symmetric encryption, there is only one key and everyone who uses the same encryption also uses the same secret key to decipher the encrypted text. In asymmetric encryption, there are two keys: one for encryption and a second one for decryption

Tässä kohtaa Flashcards Grid -komponentti, jonka tekstit alla

Symmetric encryption In symmetric encryption, there is only one key and everyone who uses the same encryption also uses the same secret key to decipher the encrypted text.

Asymmetric encryption In asymmetric encryption, there are two keys: one for encryption, a public key that everyone can use. A second key is for decryption, a private key that is given only to people who you want to be able to decrypt your text of files.

Why is Encryption Necessary?

Tähän kohtaan tulee Tabs-komponentti, jonka tiedot alla

Privacy Encryption prevents attackers or ad networks from intercepting and reading your sensitive data.

Security Encryption helps prevent data breaches. For example, if a corporate device is stolen and its hard drive is encrypted, the data on that device is most likely secure. Encrypted communications enable a secure connection between communicating parties to exchange data without leaking it.

Data Integrity Encryption helps to prevent malicious behavior such as cyber-attacks. When data is transmitted to other participants, encryption ensures that what the recipient receives has not been manipulated at all.

Encryption Algorithm

It is the method used to transform data into encrypted text, that's not readable without decryption. An algorithm will use the encryption key in order to alter the data to readable text.

Commonly Used Encryption Algorithms

Tähän tulee Table-komponentti, jonka tiedot alla

Symmetric

  • AES
  • 3-DES
  • SNOW Asymmetric
  • RSA
  • Elliptic curve cryptography

'In cryptography, a brute-force attack consists of an attacker submitting many passwords with the hope of eventually guessing a correct password'

Brute-force Attack in Encryption

Brute-force attacks are really fast with a modern computer, this is the reason why encryption has to be really strong and complex nowadays. Most of the modern encryption methods are resistant to brute-force attacks. Encryption may become vulnerable to brute-force in the future as computers become more and more powerful.

Youtube-video: https://www.youtube.com/watch?v=q7zYnGjvpwc

Knowledge Check

Sort the algorithms into the correct encryption. Tähän tulee Sorting-komponentti

Tähän tulee Fill in the Blanks -tehtäväkomponentti

Tähän tulee Multiple Responses -tehtäväkomponentti

Tähän tulee Fill in the Blanks -tehtäväkomponentti