Académique Documents
Professionnel Documents
Culture Documents
What is it?
&
Why does it matter?
(N-KRPSHN)
The process of converting data to an unrecognizable form
Protect sensitive information
Accessible only to authorized parties
A solution to the invasion of privacy
Does not prevent interception
Denies message content to interceptor
HISTORY OF CRYPTOGRAPHY
Cryptography: the uses of codes/ciphers to protect secrets
Existed for as long as civilizations had a need for secure communications
Earliest known use found in non-standard hieroglyphs (Egypt ~1900 BCE)
Political competitions, religious revolutions, wars, etc are drivers
U-571 capturing the Enigma cipher machine
TYPES OF ENCRYPTION
Symmetric key encryption
PERSONAL COMPUTERS
Windows Os
Office provides easy file encryption
with passwords
Encrypting File System (EFS) allows
encryption of existing files/folders
BitLocker Drive Encryption all data
on Windows OS volume
Mac Os
Price: Free
Encrypt files on-the-fly
Supports AES, TwoFish, & Serpent encryption ciphers
Supports creation of hidden, encrypted volumes within volumes
Simple, but plain interface and lack advance features
(Inception)
Price: Gratis
Open-source implementation of Pretty Good Privacy (PGP)
Command line version or dozens of graphic interfaces
Encrypt everything from emails to files/folders to entire volumes
Modular tool sets support multiple encryption types and ciphers
7-Zip
MOBILE COMPUTING
Android
iOS
Settings > Encryption: encrypt all data through built-in encryption tool
FINAL WORDS
Encryption is the unseen workhorse beneath the fabric of our electronic
society
Security, commerce, and personal privacy
Protect information even with unauthorized access
Target, JPMorgan Chase, Home Depot, eBay, UPS, even the White House in 2014