What do you called the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge?

What is encryption?

Encryption is the process of transforming information (referred to as plaintext) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a "key". The result of the process is encrypting information. In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. "software for encryption" can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

What is a key?

A key is a piece of information (or parameter) that controls the operation of the encryption process. In encryption, a key specifies the particular transformation of plaintext into encrypted text.

Most encryption solutions offer the option to create an 'emergency disk' that contains this key, which enables professionals to decrypt the data. In turn, this key contains the 'cypher', which dictates how the data encryption occurs.

What is a cypher?

A cypher is an algorithm for performing encryption and decryption — a series of steps to follow as a procedure. There are many different ways in which plaintext can be encrypted, but essentially there are two main processes used: symmetric key algorithms and asymmetric key algorithms

Algorithms

Symmetric key algorithms

This uses the same key to encrypt and decrypt the plaintext into cyphertext.

Asymmetric key algorithms

This uses different keys to encrypt and decrypt the plaintext into cyphertext.

Levels of encryption

In addition to different cyphers and key structures, there are also different levels of encryption; depending on the security requirements of the user.

There are two main types of encryption

File-Level Encryption

This type of encryption only encrypts user files or directories and not any system files.  In this case, the operating system is unsecure, so data is vulnerable from users without authorization.

Sector-Level Encryption

This type of encryption encrypts all user files, directories and system files.  In this case, the operating system is secure, so data is safe from users without authorization.

Full disk encryption for the boot disk has the issue that you have to decrypt the blocks where the operating system is before you boot the OS (i.e. before you load Windows, for example) meaning that the key has to be available before there is a user interface to ask for a password. This also means that an attacker may be able to use the same mechanism to recover the key, rendering the encryption software useless.

Problems with sector-level encryption

Possible solutions include:

  • Using a dongle to store the key, assuming that the user will not allow to steal the dongle with the laptop/desktop
  • Using a boot-time driver that can ask for a password from the user
  • Using a network interchange to recover the key, for instance as part of a boot environment that does not need to access the hard disk

Is recovery from data encryption possible?

As with any other job, if the drive/tape etc., does not have too much severe damage, then a recovery may be possible. However, if there has been some kind of corruption whereby the data has not been encrypted correctly, then you might have to say good-bye to the data. This is because applying the decryption cypher will not translate the encrypted information correctly.

Remember – encryption brings its own set of risks!

As you can see, encryption is not a simple subject to tackle. There are many different ways data can be encrypted (and decrypted), but the most important thing to remember is that engineers cannot decrypt a drive unless they have the encryption credentials. This is either the username/password for the encryption or the emergency disk.

Furthermore, if the data experiences corruption in the process of encryption, there is no way of recovering this information, as the decryption process will not correctly translate the corrupted data. It is best to first consider carefully whether the data needs to be encrypted and what the level of encryption you require for it is.

5 Pages Posted: 29 May 2020

Fryad Rashid

Clemson University - School of Computing; Komar University

Date Written: May 1, 2020

Abstract

In cryptography, encryption is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. This research is intended to introduce a new approach for encryption is the design and implement Kurdish and English languages cipher system. It uses Kurdish letters and their diacritics for encrypting English messages and vice versa. A pseudo random generator is used to generate integer numbers to represent each character in Kurdish language. The same numbers are used again after sorting them to represent the English characters. The conclusions that are extracted indicate the efficiency of KAELCS system according to security and time performance.

Keywords: Encryption, Decryption, Pseudo Random Generator, Kurdish Characters, RSA Algorithm, Sorting Algorithm

Suggested Citation: Suggested Citation

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Feedback to SSRN

If you need immediate assistance, call 877-SSRNHelp (877 777 6435) in the United States, or +1 212 448 2500 outside of the United States, 8:30AM to 6:00PM U.S. Eastern, Monday - Friday.

Is the process of transforming data into algorithm to make the original information unreadable?

Definition(s): The cryptographic transformation of data to produce ciphertext. Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data's original meaning to prevent it from being known or used.

What is the process of using an algorithm to transform unreadable information back into a readable format?

Decryption is the process of converting unreadable ciphertext to readable information. An encryption key is a randomized string of bits used to encrypt and decrypt data. Each key is unique, and longer keys are harder to break.

What is the process of making data unreadable?

Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.

What is an algorithm for transforming an intelligible message into one that is unintelligible?

cipher: An algorithm for transforming and intelligible message into one that is unintelligible by transposition and/or substitution methods. Encryption: The process of converting plaintext to ciphertext using a cipher and a key.