Encryption: PKI
John Edwards
For many people, the word "encryption" invokes images of spies, clandestine operations and World War II code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes.
Encryption is the foundation for two major security systems:
1) Symmetric system with one secret key
Also known as "secret-key" encryption. Generally speedier yet less secure than PKI, symmetric encryption uses the
same key to both encrypt and decrypt messages. Symmetric technology works best when key distribution is
restricted to a limited number of trusted individuals. Since symmetric encryption can be fairly easy to break, it's
primarily used for safeguarding relatively unimportant information or material that only has to be protected for a short
period of time.
For many people, the word "encryption" invokes images of spies, clandestine operations and World War II code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes.
Encryption is the foundation for two major security systems:
1) Symmetric system with one secret key
Also known as "secret-key" encryption. Generally speedier yet less secure than PKI, symmetric encryption uses the
same key to both encrypt and decrypt messages. Symmetric technology works best when key distribution is
restricted to a limited number of trusted individuals. Since symmetric encryption can be fairly easy to break, it's
primarily used for safeguarding relatively unimportant information or material that only has to be protected for a short
period of time.
2) PKI (Public Key Infrastructure)
PKI cryptography is based on a pair of cryptographic keys: One is private and known only to the user, while the other
is public and known to the opposite party in any exchange.
PKI technology provides privacy and confidentiality, access control, proof of document transmission, and document
archiving and retrieval support.
PKI cryptography is based on a pair of cryptographic keys: One is private and known only to the user, while the other
is public and known to the opposite party in any exchange.
PKI technology provides privacy and confidentiality, access control, proof of document transmission, and document
archiving and retrieval support.
Encryption's Limitations
Like any technology, encryption software isn't perfect. Even the best products consume both processor speed and
storage space. Users can also lose or forget passwords, thereby potentially locking systems forever.??
Like any technology, encryption software isn't perfect. Even the best products consume both processor speed and
storage space. Users can also lose or forget passwords, thereby potentially locking systems forever.??