You are on page 1of 3

Encryption is described as the way of turning normal data into what is known as cipher text.

The
resulting cipher text is attained by using a cipher, which is the algorithm used to transform a
regular text to a format that is un-readable by human or computer through an encryption
program’s cipher. Encryption programs allow businesses to protect their company’s.

Encryption Coding: Refers to management and lifecycle of keys. This includes generating, using,
storing, archiving, and deleting of encryption keys.

1. API: In this method, data is encrypted manually, by hand. The best hands-on example of
API is databases such as Oracle, SQL. Specifically, queries within a column are modified
within the software by hand, using an algorithm, or cipher (eg: 1 is A, 2 is B, etc etc).
Codes are changed frequently.

2. Plug-in method: individual columns are encrypted requiring encryption coding to be


changed less frequently.

3. Transparent data encryption: The most popular method. Encryption of the whole
database. Usually, native to database apps.

Data encryption can happen on a number of levels from columns to groups of files. The more
parts there are the longer it will take to encrypt.

 Cell-Level: each cell has a password.


 Column-Level: columns are encrypted all together. Could take longer.
 Tablespace-Level :allows encryption across tables. Very little impact on performance.
 File-Level: scrambling entire document. You can move files into report, or spreadsheet
apps and they will still keep their scrambled protection.

What are symmetric and asymmetric encryption?

Describe relationship between ciphertext(resulting encryption) and decryption keys. Encryption


algorithms can use the following.

 Symmetric: In this case, data is encrypted when it is saved to the database and decrypted
when it needs to be viewed. Both Sharing parties require decryption key, and the key is
the same. Most popular. Key can be leaked by a person, leading to leaked data.
Symmetric encryption types are AES, RC4, DES.
 Asymmetric: More secure than Symmetric. Need a private and public key. Public key lets
anyone to encrypt data for anyone, but then needs a private key to be read.). Types are
RSA, DSA, and PKCS.

How to businesses know which method to use? (which is most secure)


 AES: Advanced Encryption Standard, symmetric algorithm, and is very secure. Encrypts
data in block lengths which are 128, 192, or 256 bits. That’s how many 0’s and 1’s there
are in the key.

 RSA: Rivest-Shamir-Adleman is an asymmetric. This method is typically used for


sharing data over an insecure network, which can include database encryption. The key
size is between 1024 and 2048 bits.
 3DES: Triple Data Encryption is another block cipher. uses 56-bit keys to encrypt data
three times, finishing in a 168-bit key. Becoming obsolete.
 Twofish: Twofish is a symmetric block cipher, keys range from 128 bits to 256 bits.
Javamex. (n.d.). cipher encryption keys. Retrieved January 25, 2020, from
https://www.researchgate.net/figure/Performance-of-symmetric-encryption-algorithms-Javamex-
nd_fig4_325208273

You might also like