Encryption
Unit: 9
Lesson: 1
keys. lots of keys.
you have the two big boys of encryption.
Encryption Algorithm
A function that converts a human-readable plaintext into a ciphertext. The ciphertext can only be decrypted using a key linked to the initial encryption process.
Cryptographic Hash Algorithm
A function that converts a variable-length string into a fixed-length hash. This is used to confirm file integrity, for secure password storage, and other things.
Interception
In order to keep data safe, you need to think about all the ways the data can be stolen.
- Data at rest (stored in some persistent storage media like an HDD)
- Data in transit (data being transmitted over a network)
- Data in use (data being stored in Random-Access-Memory to work with)
Different cryptographic solutions are used to protect the data in it's various states. Data in transit is most commonly protected with TLS encryption, while data at rest can be protected with self-encrypting drives, file system encryption (e.g. Windows-BitLocker),or database encryption.
#Netplus