Encrypting stored data overview
Protect data on storage devices. SSD, hard drive, USB drive, cloud storage, etc. This is data at rest.
Full disk and partition/volume encryption. BitLocker, FileVault, etc.
File encryption. EFS (Encrypting File System), third party utilities can perform simillar functions.
Database encryption
Protecting stored data and the transmission of that data.
Transparent encryption
Encrypt all database information with a symmetric key.
Record level encryption
Encrypt individual columns, use separate symmetric keys for each column.
Transport encryption
Protect data traversing the network. You’re doing this right now.
Encrypting in the application. Browser can communicate using HTTPS.
VPN (virtual private network). Encrypts all data transmitted over the network, regardless of the application. Client based VPN using SSL/TLS. Site to site VPN using IPsec.
Encryption algorithm comparison (see vid),
Encrypting algorithms processes
Many ways to encrypt data. Proper formula must be used during encryption and decryption.
Both sides decide on the algorithm before encrypting the data. The details are often hidden from the end user..
There are advantages and disadvantages between algorithms. Security level, speed, complexity of implementation, etc.
Cryptographic keys
Very little that isn’t known about the cryptographic process. The algorithm is usually a known entity. Only thing you don’t know is the key.
The key determines the output. Encrypted data, Hash value, digital signature.
Keep your key private! It’s the only thing protecting your data.
Key lengths importance
Larger keys tend to be more secure. Prevent brute force attacks. Attackers can try every possible key combination.
Symmetric encryption. 128 bit or larger symmetric keys are common. These numbers get larger and larger as time goes on
Asymmetric encryption. Complex calculations of prime numbers. Larger keys then symmetric encryption. Common to see key lengths of 3,072 bits or larger.
Key stretching def and importance.
A weak key is a weak key and by itself is not very secure.
Make a weak key stronger by performing multiple processes. has a password. Has the Hash of the password. And continue. Key Stretching, Key Stretching.
Brute Force Attacks would require reversing each of those hashes. The attacks have to spend much more time, even though the key is small.