0% found this document useful (0 votes)
18 views6 pages

ITE 322 - Reviewer

Uploaded by

Neljane Laurente
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

ITE 322 - Reviewer

Uploaded by

Neljane Laurente
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Defining Plain Text

Encrypted communication transforms plain text using ciphers or encryption


methods. Plain text refers to any readable information presented in a format
that is accessible and usable without the need for a decryption key or
specific decryption tools, encompassing even binary files.

Every communication, document, or file intended to be encrypted or


previously encrypted would be categorized as plain text. A cryptographic
system takes plain text as input and generates ciphertext as output. Within
cryptography, algorithms facilitate the conversion of ciphertext back into
plain text and vice versa. The terms “encryption” and “decryption” denote
these respective processes. This mechanism ensures that data can only be
comprehended by its intended recipient.

Defining Ciphertext
The result of employing encryption methods, often referred to as cyphers, is
called ciphertext. When data cannot be understood by individuals or devices
lacking the appropriate cypher, it is considered encrypted. To interpret the
data, the cypher is necessary. Algorithms transform plaintext into ciphertext,
and vice versa, to convert ciphertext back into plaintext. These processes
are known as encryption and decryption.

Ciphertext, represents a cryptographic approach in which an algorithm


utilizes substitutions instead of original plaintext elements. Substitution
ciphers replace individual letters, letter pairs, letter triplets, or various
combinations of these while preserving the initial sequence. Single-letter
substitutions are utilized in simple substitution cyphers, while polygraphed
cyphers involve larger letter groupings.

In simpler terms, letters are substituted for other letters. In the past,
recording corresponding characters to decipher a message was feasible.

Difference Between Plain Text And Cipher Text

Category Plain Text Cipher Text

Original readable data in its Encrypted form of data, not


Definition
natural form. easily readable.

Accessibilit It can be understood and used Requires decryption to be


y without decryption. understood.

Represent Represents the actual content of Represents an encrypted version


ation the message. of the message

Prone to unauthorized access and Offers greater security against


Security
disclosure. breaches.

Input to encryption; output from Output of encryption; input for


Conversion
decryption. decryption.
Easily read and understood by Secure transmission and storage
Purpose
humans. of data.

Encryption and decryption applications in everyday


life
Encryption and decryption play pivotal roles in everyday applications,
ensuring data confidentiality, integrity, and security in our digital
interactions. Here are some examples of how they are used in everyday life:

1. Secure Messaging Apps


o End-to-end Encryption

Messaging apps like WhatsApp, Signal, and Telegram use end-to-


end encryption to secure conversations. When you send a
message, it’s encrypted and only decrypted on the recipient’s
device, preventing anyone, including the service provider, from
intercepting and reading your messages.

2. Online Banking
o Secure Communication

When you access your bank’s website or mobile app, encryption


ensures that your login credentials, personal information, and
financial transactions are transmitted securely over the Internet.
This protects you from eavesdropping and data theft.

o Two-Factor Authentication (2FA)

Many online banking services use encryption to secure the


delivery of one-time codes for 2FA. This ensures only you can
access your account, even if someone has your password.

3. E-commerce
o Payment Security

When making online purchases, encryption (usually SSL/TLS)


secures the connection between your browser and the e-
commerce website. This safeguards your credit card information
and personal details during the transaction.

o Digital Wallets

Mobile payment apps like Apple Pay and Google Pay use
encryption to protect your payment card data when making in-
store or online purchases.

4. Email Encryption
o Secure Email Services

Some email services, like ProtonMail, offer end-to-end encryption


for email communication. This means that the content of your
emails is encrypted and can only be read by the intended
recipient.

Importance of the strength of the cipher


The strength of the cipher is a critical factor in ensuring the security of
encrypted data. It refers to its ability to resist attacks and maintain the
confidentiality and integrity of encrypted information.

It’s important to note that the strength of a cipher is not solely determined
by the algorithm itself but also by the length and randomness of encryption
keys and the implementation of the encryption process. Even a strong cipher
can be compromised if keys are poorly managed, or there are vulnerabilities
in the encryption software.

In summary, the strength of the cipher is a foundational element of data


security. Organizations and individuals must prioritize using strong, well-
vetted encryption algorithms to protect sensitive information and maintain
trust in an increasingly interconnected and data-driven world.

Data Encryption
Encryption is the method by which information is converted into secret code that hides
the information's true meaning. The science of encrypting and decrypting information is
called cryptography.

Encryption has long been used to protect sensitive information. Historically, it was used
by militaries and governments. In modern times, encryption is used to protect data both
at rest and in motion. At-rest data is the type stored on computers and storage devices.
In-motion data refers to data in transit between devices and over networks.

Importance of Encryption

Encryption plays a vital role in securing different types of IT assets and personally
identifiable information (PII). To this end, encryption serves four essential functions:

 Confidentiality - Encodes the data to prevent it from being understood if it is


intercepted.
 Authentication - Verifies the origin of the data that has been encrypted.
 Integrity - Validates that the data has not been altered since it was encrypted.
 Non-Repudiation - Prevents senders from denying they sent the encrypted data.

Two Types of Encryptions

When setting up a system for encrypting data, a security team must determine which
encryption algorithm to use to encode the data. Before doing that, however, the team
should first decide on the type of algorithm. The two most common types are symmetric
and asymmetric:

Symmetric ciphers - Also referred to as secret key cyphers, these algorithms use a
single key for both encrypting and decrypting data. The key is sometimes referred to as
a shared secret because the sender or computing system doing the encryption must
share the secret key with all entities authorized to decrypt the message. Symmetric key
encryption is usually much faster than asymmetric encryption. The most widely used
symmetric key cipher is the Advanced Encryption Standard (AES), which was designed
to protect government-classified information.
Asymmetric ciphers - Also known as public key encryption, these types of algorithms
use two different but logically linked keys for encrypting and decrypting data.
Asymmetric cryptography often uses prime numbers to create keys since it is
computationally difficult to factor large prime numbers and reverse-engineer the
encryption. The Rivest-Shamir-Adleman (RSA) encryption algorithm is currently the
most widely used public key algorithm. With RSA, the public or the private key can be
used to encrypt a message; whichever key is not used for encryption becomes the
decryption key.

Today, many cryptographic processes use a symmetric algorithm to encrypt data and
an asymmetric algorithm to securely exchange the secret key.

Advantages

Confidentiality - Encryption ensures that only authorized parties can access the
encrypted data. It helps protect sensitive information such as personal data, financial
records, and trade secrets from unauthorized access.

Authentication - Encryption can be combined with authentication mechanisms to


verify the identity of parties involved in communication. This ensures that data is
exchanged securely between trusted entities.

Secure Communication - Encryption is essential for secure communication over


networks such as the internet. It prevents eavesdropping and man-in-the-middle attacks
by ensuring that only authorized parties can decrypt and access the transmitted data.

Disadvantages

Complexity - Implementing encryption requires expertise and careful configuration to


ensure its effectiveness. It can add complexity to systems and processes, potentially
leading to errors or vulnerabilities if not implemented correctly.

Key Management - Proper key management is crucial for effective encryption.


Managing encryption keys securely, including key generation, storage, distribution, and
rotation, can be challenging and prone to human error.

Data Recovery - Strong encryption can make data recovery difficult or impossible if
encryption keys are lost or inaccessible. This can pose challenges in scenarios such as
recovering data from backups or recovering encrypted files without the decryption key.

Software’s used for Encryption

AxCrypt Premium - Best for Easy Public Key Cryptography

Folder Lock - Best for Encryption Enthusiasts

Advanced Encryption Package - Best for Variety of Encryption Features

NordLocker - Best for Ease of Use

CryptoForge - Best for Encrypting Text

EncryptionSafe - Best for Encrypting Local Files

Encrypto - Best for Free Encrypted File Sharing

Steganos Safe - Best for Steganography

Cypherix Cryptainer Personal - Best for Sharing Encrypted Files

Cypherix Secure IT - Best for Simple Encryption


Data Decryption
Decryption is the process of converting encrypted or ciphertext data back into its
original, readable form, known as plaintext. It is the reverse of the encryption process,
and the ability to decrypt data is dependent on possessing the appropriate decryption
key.

Key Based Operation

Secret Key (Symmetric Decryption) - In symmetric encryption, the same key used for
encryption is also used for decryption. The secure exchange and management of this
secret key are crucial for the security of the communication.

Public and Private Keys (Asymmetric Decryption) - In asymmetric encryption, a different


key pair is used for decryption. The private key, known only to the recipient, is used to
decrypt data that was encrypted with the corresponding public key.

Reversing The encryption Process

Symmetric Decryption - The symmetric decryption algorithm takes the ciphertext and
the shared secret key, applying the inverse mathematical operations performed during
encryption to transform the ciphertext back into plaintext.

Asymmetric Decryption - The recipient uses their private key to decrypt the ciphertext
that was encrypted with their corresponding public key. The asymmetric decryption
process is computationally more intensive than symmetric decryption.

Ensuring Data Confidentiality

The primary goal of decryption is to ensure the confidentiality of sensitive information.


Even if unauthorized individuals gain access to the encrypted data, they should not be
able to understand or interpret it without the appropriate decryption key.

Application in secure communication

In secure communication, encryption is often used to protect the confidentiality of data


during transmission. The recipient uses their decryption key to recover the original
message upon receipt.

Uses Cases
Data Access - Decryption is used to access and retrieve information that has been
securely stored or transmitted in encrypted form.

Authentication - In some cryptographic systems, decryption is used to verify the


authenticity of a message or the identity of the sender.

Key management

The security of decryption relies on the secure management and distribution of keys. If
an unauthorized entity gains access to the decryption key, they may be able to reverse
the encryption process and access sensitive information.

Cryptographic Algorithms

Different cryptographic algorithms are employed for encryption and its corresponding
decryption. The choice of algorithms depends on factors such as security requirements,
performance considerations, and the specific use case.

You might also like