15.3 - Cryptography Implementations

 15.3 - Cryptography implementations 

 

Key Terms: 

    • Pretty Good Privacy (PGP) - A popular encryption program that can be used to encrypt texts, emails, files, folders, and disks. 
    • GNU Privacy Guard – An encryption tool used to protect laptops, desktops, USB drives, optical media, and smartphones. 
    • BitLocker – A Windows utility that provides full volume encryption. 
    • Windows Encrypting File System (EFS) - A proprietary encryption function of Windows operating systems. 
    • Secure Sockets Layer (SSL) - An application layer protocol developed for managing security of message transmission over the internet. 
    • Transport layer security (TLS) - A protocol used to establish a secure connection between a client and a server. 
    • OpenSSL – An open-source cryptography toolkit implementing SSL and TLS network protocols and related cryptographic standards. 
    • Keyczar – An open-source cryptographic toolkit designed to make it easier and safer for developers to use cryptography in applications. 

 

Disk Encryption 

Disk encryption is the process of encrypting a whole disk so that all data stored on it is secure. Disk encryption is good for confidentiality and can protect data even when the OS isn’t inactive. Some tools include VeraCrypt, Symantec Drive Encryption, EFS, and BitLocker. 

 

Email Encryption 

Emails can hold a lot of confidential information about a person or company. For this reason, they must be made secure. By using digital signatures, emails can be made confidential and nonreproducible. Some tools include SSL, TLS, OpenSSL, and Keyczar. 

 

GPG 

GPG uses both public and private key encryption. First, GPG generates random numbers that it uses to generate the symmetric key. These random numbers are generated through actions on the computer such as moving the mouse or typing. This key is then used to encrypt the message sent from one computer to another. The symmetric key is encrypted using the receiver's public key and sent along with the encrypted message. This ensures that only the receiver can decrypt the message. PGP is an open-source version of GPG and encrypts data in the same way as GPG. 

Comments

Popular posts from this blog

OSA Summer 2023 Mock - Task 1, Assignment 1

OSA Assignment 1 - Task 1 GUIDE

Useful Core A Acronyms