data encryption

Also found in: Dictionary, Thesaurus, Medical, Wikipedia.

data encryption,

the process of scrambling stored or transmitted information so that it is unintelligible until it is unscrambled by the intended recipient. Historically, data encryption has been used primarily to protect diplomatic and military secrets from foreign governments. It is also now used increasingly by the financial industry to protect money transfers, by merchants to protect credit-card information in electronic commerce, and by corporations to secure sensitive communications of proprietary information.

All modern cryptographycryptography
[Gr.,=hidden writing], science of secret writing. There are many devices by which a message can be concealed from the casual reader, e.g., invisible writing, but the term cryptography strictly applies to translating messages into cipher or code.
..... Click the link for more information.
 is based on the use of algorithms to scramble (encrypt) the original message, called plaintext, into unintelligible babble, called ciphertext. The operation of the algorithm requires the use of a key. Until 1976 the algorithms were symmetric, that is, the key used to encrypt the plaintext was the same as the key used to decrypt the ciphertext. In 1977 the asymmetric or public key algorithm was introduced by the American mathematicians W. Diffie and M. E. Hellman. This algorithm requires two keys, an unguarded public key used to encrypt the plaintext and a guarded private key used for decryption of the ciphertext; the two keys are mathematically related but cannot be deduced from one another. The advantages of asymmetric algorithms are that compromising one of the keys is not sufficient for breaking the cipher and fewer unique keys must be generated.

In 1977 the Data Encryption Standard (DES), a symmetric algorithm, was adopted in the United States as a federal standard. DES and the International Data Encryption Algorithm (IDEA) are the two most commonly used symmetric techniques. The most common asymmetric technique is the RSA algorithm, named after Ronald Rivest, Adi Shami, and Len Adleman, who invented it while at the Massachusetts Institute of Technology in 1977. Other commonly used encryption algorithms include Pretty Good Privacy (PGP), Secure Sockets Layer (SSL), and Secure Hypertext Transfer Protocol (S-HTTP). The National Institute of Standards and TechnologyNational Institute of Standards and Technology,
governmental agency within the U.S. Dept. of Commerce with the mission of "working with industry to develop and apply technology, measurements, and standards" in the national interest. It was established by act of Congress on Mar.
..... Click the link for more information.
 (NIST) is working with industry and the cryptographic community to develop the Advanced Encryption Standard (AES), a mutually acceptable algorithm that will protect sensitive government information and will be used by industry on a voluntary basis.

Data encryption is regarded by the U.S. government as a national-security issue because it can interfere with intelligence gathering—therefore, it is subject to export controls, which in turn make it difficult for U.S. companies to function competitively in the international marketplace. To resolve this dilemma, the federal government in 1993 proposed key escrow encryption, an approach, embodied in an electronic device called a "Clipper chip," that makes broadly available a purportedly unbreakable encryption technique (although the code was broken by researchers in 1995) with keys to unlock the information held in escrow for national security and law-enforcement purposes by the federal government. This approach, however, has been unacceptable to civil libertarians and to the international community. In 1994 the Clipper algorithm (called Skipjack) was specified in the Escrow Encryption Standard (EES), a voluntary federal standard for encryption of voice, facsimile (fax), and data communications over ordinary telephone lines. A subsequent compromise escrow scheme intended to create a standard for data encryption that balanced the needs of national security, law enforcement, and personal freedom was rejected in 1995; a compromise proposed in 1999 was also controversial.

References in periodicals archive ?
And, the Lieberman president notes, it's also important to understand that, where cloud data storage is involved, businesses need to take a centralised management approach to data encryption, in order to give IT staff maximum control, with minimal impact on operations and productivity.
Data encryption, for example, does not prevent employees from e-mailing sensitive data to outside parties, or protect data if a user signs onto a laptop and then walks away.
AES is a symmetric (Secret or Private Key) 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen.
After experiencing large data breaches, Time Warner and CitiFinancial have each pledged to adopt data encryption technology, and Bank of America has opted to eliminate backup tapes where possible and transition to computer-to-computer data transfer.
The release adds Gazzang's Transparent Data Encryption for PostgreSQL to existing support for MySQL databases, and is now available for download here.
For instance, BestCrypt provides data encryption (https://www.
Porticor consolidated with Microsoft's Transparent Data Encryption protects data via strong encryption, and also safeguards it from 'root' access by administrators.
PC migration, file transfer, synchronisation and remote access solutions provider Laplink Software Inc announced on Monday the release of PC Lock data encryption software with cloud management and high security encryption.
Advanced Encryption Standard is a symmetric (Secret or Private Key) 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen.
System-embedded security controls that can enhance the privacy and confidentiality of information processed across Internet architectures include data encryption, digital signatures, secure sockets layer (SSL), and cryptographic protocols such as hypertext transfer protocol over SSL (HTTPS).
The AES replaces the Data Encryption Standard (DES) which NIST adopted as a FIPS in 1977 for federal agency use in the protection of sensitive, unclassified information.
Products incorporating a highly regarded cryptographic scheme known as the Data Encryption Standard should be easier to export, the panel suggested.

Full browser ?