Please enable JavaScript.
Coggle requires JavaScript to display documents.
Group 3, How encryption can protect data from being altered? - Coggle…
Group 3
-
-
• In most cases, it's a reversal of the encryption process because decryption requires a secret key or password, it decodes the encrypted information so that only an authorized user can
decrypt the data.
• This process converts the original representation of the information, known as plaintext,
into an alternative form known as ciphertext.
-
• The process of analyzing information systems to comprehend hidden characteristics of the
systems is known as cryptanalysis.
• Even if the cryptographic secret is unknown, cryptanalysis is used to break into
cryptographic security systems and get access to the contents of encrypted messages.
• In a ciphertext-only attack, the attacker has only access to one or more encrypted messages and has no knowledge of the plaintext data, the encryption algorithm, or any information about the cryptographic key.
-
a. Encryption
-The technique of converting a clear-text communication (Plaintext) into a data stream that appears to be a meaningless and random series of bits is known as encryption
b. Cipher Text
-To generate ciphertext, a cypher is an algorithm that is applied to plain text. It's the unreadable result of a cryptographic algorithm.
-The result of the encryption procedure is ciphertext. The plaintext is encrypted and presented as seemingly random strings of characters, rendering it unusable. The encryption algorithm that changes plaintext is referred to as a cypher, thus the word ciphertext.
-
How encryption works?
-If a computer, hard drive, or database is hacked, encryption makes the data unreadable.
-The longer the key, the greater the protection, which requires higher processing power to handle the encrypting and decrypting processes.
ENCRYPTION TECHNOLOGY
Encryption is a technique for encrypting data so that only authorized parties may decipher it. It is the process of transforming human-readable plaintext to incomprehensible text, also known as ciphertext, in technical terms. Encryption, to put it another way, takes legible data and makes it appear random. Encryption necessitates the employment of a cryptographic key, which is a set of mathematical values agreed upon by both the sender and receiver of an encrypted message.
An encryption scheme usually employs a pseudo-random encryption key generated by an algorithm for technical reasons. Although it is possible to decrypt the communication without the key, a well-designed encryption method necessitates significant computational resources and abilities. With the key provided by the originator to recipients, but not to unauthorised users, an authorised recipient can quickly decode the communication.
-
-