Upozornenie: Prezeranie týchto stránok je určené len pre návštevníkov nad 18 rokov!
Zásady ochrany osobných údajov.
Používaním tohto webu súhlasíte s uchovávaním cookies, ktoré slúžia na poskytovanie služieb, nastavenie reklám a analýzu návštevnosti. OK, súhlasím









A | B | C | D | E | F | G | H | CH | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Cryptographic software
 

Encryption software is software that uses cryptography to prevent unauthorized access to digital information.[1][2] Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.[3]

Classification

There are many software products which provide encryption. Software encryption uses a cipher to obscure the content into ciphertext. One way to classify this type of software is the type of cipher used. Ciphers can be divided into two categories: public key ciphers (also known as asymmetric ciphers), and symmetric key ciphers.[4] Encryption software can be based on either public key or symmetric key encryption.

Another way to classify software encryption is to categorize its purpose. Using this approach, software encryption may be classified into software which encrypts "data in transit" and software which encrypts "data at rest". Data in transit generally uses public key ciphers, and data at rest generally uses symmetric key ciphers.

Symmetric key ciphers can be further divided into stream ciphers and block ciphers. Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information. The key is used to establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. For example, AES processes 16-byte blocks, while its predecessor DES encrypted blocks of eight bytes.

There is also a well-known case where PKI is used for data in transit of data at rest.

Data in transit

Data in transit is data that is being sent over a computer network. When the data is between two endpoints, any confidential information may be vulnerable. The payload (confidential information) can be encrypted to secure its confidentiality, as well as its integrity and validity.[5]

Often, the data in transit is between two entities that do not know each other - such as in the case of visiting a website. As establishing a relationship and securely sharing an encryption key to secure the information that will be exchanged, a set of roles, policies, and procedures to accomplish this has been developed; it is known as the public key infrastructure, or PKI. Once PKI has established a secure connection, a symmetric key can be shared between endpoints. A symmetric key is preferred over the private and public keys as a symmetric cipher is much more efficient (uses fewer CPU cycles) than an asymmetric cipher.[6][7] There are several methods for encrypting data in transit, such as IPsec, SCP, SFTP, SSH, OpenPGP and HTTPS.

Data at rest

Data at rest refers to data that has been saved to persistent storage. Data at rest is generally encrypted by a symmetric key.

Encryption may be applied at different layers in the storage stack. For example, encryption can be configured at the disk layer, on a subset of a disk called a partition, on a volume, which is a combination of disks or partitions, at the layer of a file system, or within user space applications such as database or other applications that run on the host operating system.

With full disk encryption, the entire disk is encrypted (except for the bits necessary to boot or access the disk when not using an unencrypted boot/preboot partition).[8] As disks can be partitioned into multiple partitions, partition encryption can be used to encrypt individual disk partitions.[9] Volumes, created by combining two or more partitions, can be encrypted using volume encryption.[10] File systems, also composed of one or more partitions, can be encrypted using filesystem-level encryption. Directories are referred to as encrypted when the files within the directory are encrypted.[11][12] File encryption encrypts a single file. Database encryption acts on the data to be stored, accepting unencrypted information and writing that information to persistent storage only after it has encrypted the data. Device-level encryption, a somewhat vague term that includes encryption-capable tape drives, can be used to offload the encryption tasks from the CPU.

Transit of data at rest

When there is a need to securely transmit data at rest, without the ability to create a secure connection, user space tools have been developed that support this need. These tools rely upon the receiver publishing their public key, and the sender being able to obtain that public key. The sender is then able to create a symmetric key to encrypt the information, and then use the receiver's public key to securely protect the transmission of the information and the symmetric key. This allows secure transmission of information from one party to another. [citation needed]

Performance

The performance of encryption software is measured relative to the speed of the CPU. Thus, cycles per byte (sometimes abbreviated cpb), a unit indicating the number of clock cycles a microprocessor will need per byte of data processed, is the usual unit of measurement.[13] Cycles per byte serve as a partial indicator of real-world performance in cryptographic functions.[14] Applications may offer their own encryption called native encryption, including databases applications such as Microsoft SQL, Oracle, and MongoDB, and commonly rely on direct usage of CPU cycles for performance. This often impacts the desirability of encryption in businesses seeking greater security and ease of satisfying compliance by impacting the speed and scale of how data within organizations through to their partners.[15]

See also

References

  1. ^ Thakur, Dinesh. "Cryptography - What is Cryptography?".
  2. ^ "What is encryption? - Definition from WhatIs.com". SearchSecurity. Retrieved 25 April 2017.
  3. ^ "Why We Encrypt - Schneier on Security".
  4. ^ Chandra, Sourabh; Paira, Smita; Alam, Sk Safikul; Sanyal, Goutam (Nov 2014). "A comparative survey of Symmetric and Asymmetric Key Cryptography". IEEE: 83–93. doi:10.1109/ICECCE.2014.7086640. ISBN 978-1-4799-5748-4. S2CID 377667.
  5. ^ "Guide to Cryptography - OWASP".
  6. ^ Villanueva, John Carl. "Symmetric vs Asymmetric Encryption".
  7. ^ "Symmetric vs. Asymmetric Encryption - CipherCloud". 4 October 2013. Archived from the original on 15 August 2018. Retrieved 27 March 2017.
  8. ^ "How Whole Disk Encrypytion Works" (PDF). Archived from the original (PDF) on 2017-03-23. Retrieved 2017-03-27.
  9. ^ "How to encrypt a single partition in Linux - TechRepublic".
  10. ^ https://www.jetico.com/web_help/bcve3_enterprise/html/01_introduction/02_what_is_ve.htm Volume Encryption
  11. ^ "How IT Works: Encrypting File System".
  12. ^ "PDS Software Solutions LLC". Archived from the original on 2018-07-19. Retrieved 2017-03-27.
  13. ^ "Processor allocation".
  14. ^ "Engineering comparison of SHA-3 candidates". Archived from the original on 2019-10-13. Retrieved 2019-09-24.
  15. ^ "Businesses fail to apply encryption technology effectively". ComputerWeekly.com. Retrieved 2020-04-23.
Zdroj:https://en.wikipedia.org?pojem=Cryptographic_software
>Text je dostupný pod licencí Creative Commons Uveďte autora – Zachovejte licenci, případně za dalších podmínek. Podrobnosti naleznete na stránce Podmínky užití.

čítajte viac o Cryptographic_software


čítajte viac na tomto odkaze: Cryptographic software



Hladanie1.

Software
Cryptography
Computers
Internet Archive
Cipher
Ciphertext
Public-key cryptography
Symmetric key algorithm
Data in transit
Data at rest
Computer network
Public key infrastructure
IPsec
Secure copy
SSH File Transfer Protocol
Secure Shell
OpenPGP
HTTPS
Persistent storage
Symmetric-key algorithm
Disk storage
Disk partitioning
Volume (computing)
File system
User space
Database encryption
Operating system
Volume encryption
Filesystem-level encryption
Wikipedia:Citation needed
Clock cycles
Microprocessor
Byte
Unit of measurement
Algorithmic efficiency
Cryptographic
Function (computer science)
Cryptographic protocol
Public-key cryptography
Symmetric-key algorithm
Transport Layer Security
Comparison of disk encryption software
Defense strategy (computing)
Ransomware
Doi (identifier)
ISBN (identifier)
Special:BookSources/978-1-4799-5748-4
S2CID (identifier)
Curlie
Template:Cryptographic software
Template talk:Cryptographic software
Special:EditPage/Template:Cryptographic software
Email client
Apple Mail
Autocrypt
Claws Mail
Enigmail
GNU Privacy Guard
Gpg4win
Kontact
Microsoft Outlook
Pretty Easy privacy
Pretty Good Privacy
Sylpheed
Mozilla Thunderbird
Secure communication
Off-the-Record Messaging
Adium
BitlBee
Centericq
ChatSecure
Climm
Jitsi
Kopete
Profanity (instant messaging client)
Secure Shell
Dropbear (software)
Lsh
OpenSSH
PuTTY
SecureCRT
WinSCP
WolfSSH
Transport Layer Security
BBM Enterprise
Bouncy Castle (cryptography)
OpenSSL#BoringSSL
Botan (programming library)
Cryptlib
GnuTLS
Java Secure Socket Extension
LibreSSL
MatrixSSL
Network Security Services
OpenSSL
Mbed TLS
BSAFE
Security Support Provider Interface
SSLeay
Stunnel
TeamNote
WolfSSL
Virtual private network
Check Point VPN-1
LogMeIn Hamachi
Openswan
OpenVPN
SoftEther VPN
StrongSwan
Tinc (protocol)
WireGuard
ZRTP
Jitsi
Linphone
Jami (software)
Zfone
Peer-to-peer
Bitmessage
Briar (software)
RetroShare
Tox (protocol)
Double Ratchet Algorithm
Matrix (protocol)
OMEMO
Cryptocat
ChatSecure
Wire Swiss
Session (software)
Signal Protocol
Facebook Messenger
Google Allo
Google Messages
Signal (messaging app)
TextSecure
WhatsApp
Disk encryption
Comparison of disk encryption software
BestCrypt
BitLocker
CrossCrypt
Cryptoloop
Dm-crypt
DriveSentry
E4M
ECryptfs
FileVault
FreeOTFE
GBDE
Geli (software)
Linux Unified Key Setup
PGPDisk
Private Disk
Scramdisk
Sentry 2020
TrueCrypt
TrueCrypt version history
VeraCrypt
Anonymity#Anonymity on the Internet
GNUnet#File sharing
I2P
Java Anon Proxy
Tor (network)
Vidalia (software)
RetroShare
Ricochet (software)
Wickr
File system
List of cryptographic file systems
EncFS
Encrypting File System
ECryptfs
Linux Unified Key Setup
Rubberhose (file system)
StegFS
Tahoe-LAFS
Security-focused operating system
Tails (operating system)
Qubes
Freenet
Tresorit
Wuala
NordLocker
CrypTool
Anti–computer forensics
USBKill
BusKill
Outline of cryptography
Timeline of cryptography
Hash function
Cryptographic hash function
List of hash functions
Homomorphic encryption
End-to-end encryption
S/MIME
Category:Cryptographic software
Category:Cryptographic software
Encryption software
Encryption software
Encryption software
Main Page
Wikipedia:Contents
Portal:Current events
Special:Random
Wikipedia:About
Wikipedia:Contact us
Special:FundraiserRedirector?utm source=donate&utm medium=sidebar&utm campaign=C13 en.wikipedia.org&uselang=en
Help:Contents
Help:Introduction
Wikipedia:Community portal
Special:RecentChanges
Wikipedia:File upload wizard
Main Page
Special:Search
Help:Introduction
Special:MyContributions
Special:MyTalk
برنامج التعمية
Software de cifrado
نرم‌افزار رمزگذاری
Logiciel de cryptographie
Perangkat lunak enkripsi
תוכנת הצפנה
Programu ya usimbaji fiche
暗号化ソフトウェア
Шифрующее программное обеспечение
Encryption software
Шифрувальне програмне забезпечення
Special:EntityPage/Q5375622#sitelinks-wikipedia
Encryption software
Talk:Encryption software
Encryption software
Encryption software
Special:WhatLinksHere/Encryption software
Special:RecentChangesLinked/Encryption software
Wikipedia:File Upload Wizard
Special:SpecialPages
Special:EntityPage/Q5375622
Category:Cryptographic software
Encryption software
Encryption software
Encryption software
Main Page
Wikipedia:Contents
Portal:Current events
Special:Random
Wikipedia:About
Wikipedia:Contact us
Special:FundraiserRedirector?utm source=donate&utm medium=sidebar&utm campaign=C13 en.wikipedia.org&uselang=en
Help:Contents
Help:Introduction
Wikipedia:Community portal
Special:RecentChanges
Wikipedia:File upload wizard
Main Page
Special:Search
Help:Introduction
Special:MyContributions
Special:MyTalk
برنامج التعمية
Software de cifrado
نرم‌افزار رمزگذاری
Logiciel de cryptographie
Perangkat lunak enkripsi
תוכנת הצפנה
Programu ya usimbaji fiche
暗号化ソフトウェア
Шифрующее программное обеспечение
Encryption software
Шифрувальне програмне забезпечення
Special:EntityPage/Q5375622#sitelinks-wikipedia
Encryption software
Talk:Encryption software
Encryption software
Encryption software
Special:WhatLinksHere/Encryption software
Special:RecentChangesLinked/Encryption software
Wikipedia:File Upload Wizard
Special:SpecialPages
Special:EntityPage/Q5375622
Category:Cryptographic software
Encryption software
Encryption software
Encryption software
Main Page
Wikipedia:Contents
Portal:Current events
Special:Random
Wikipedia:About
Wikipedia:Contact us
Special:FundraiserRedirector?utm source=donate&utm medium=sidebar&utm campaign=C13 en.wikipedia.org&uselang=en
Help:Contents
Help:Introduction
Wikipedia:Community portal
Special:RecentChanges
Wikipedia:File upload wizard
Main Page
Special:Search
Help:Introduction
Special:MyContributions
Special:MyTalk
برنامج التعمية
Software de cifrado
نرم‌افزار رمزگذاری
Logiciel de cryptographie
Perangkat lunak enkripsi
תוכנת הצפנה
Programu ya usimbaji fiche
暗号化ソフトウェア
Шифрующее программное обеспечение
Encryption software
Шифрувальне програмне забезпечення
Special:EntityPage/Q5375622#sitelinks-wikipedia
Encryption software
Talk:Encryption software
Encryption software
Encryption software
Special:WhatLinksHere/Encryption software
Special:RecentChangesLinked/Encryption software
Wikipedia:File Upload Wizard
Updating...x




Text je dostupný za podmienok Creative Commons Attribution/Share-Alike License 3.0 Unported; prípadne za ďalších podmienok.
Podrobnejšie informácie nájdete na stránke Podmienky použitia.