Professional Documents
Culture Documents
The
resulting cipher text is attained by using a cipher, which is the algorithm used to transform a
regular text to a format that is un-readable by human or computer through an encryption
program’s cipher. Encryption programs allow businesses to protect their company’s.
Encryption Coding: Refers to management and lifecycle of keys. This includes generating, using,
storing, archiving, and deleting of encryption keys.
1. API: In this method, data is encrypted manually, by hand. The best hands-on example of
API is databases such as Oracle, SQL. Specifically, queries within a column are modified
within the software by hand, using an algorithm, or cipher (eg: 1 is A, 2 is B, etc etc).
Codes are changed frequently.
3. Transparent data encryption: The most popular method. Encryption of the whole
database. Usually, native to database apps.
Data encryption can happen on a number of levels from columns to groups of files. The more
parts there are the longer it will take to encrypt.
Symmetric: In this case, data is encrypted when it is saved to the database and decrypted
when it needs to be viewed. Both Sharing parties require decryption key, and the key is
the same. Most popular. Key can be leaked by a person, leading to leaked data.
Symmetric encryption types are AES, RC4, DES.
Asymmetric: More secure than Symmetric. Need a private and public key. Public key lets
anyone to encrypt data for anyone, but then needs a private key to be read.). Types are
RSA, DSA, and PKCS.