Data encryption technology

"AI" time has come, data security issues, it has been under siege. Network Security enemy, not the problem itself, information systems, but operational risk issues worse! Data Encryption technology is moving ahead in this torrent, continuous improvement, in this era of the Internet all the way to escort!

Data encryption is a very old technology, as early as 2000 years BC, the Egyptians began to use special hieroglyphics as information is encoded to protect their secret files; and 17 began century BC by the island of Crete Phaistos disc also known as the inventor of one of the most difficult to crack passwords. And the Internet because of its openness, information security is difficult to achieve everything. So how to protect the security of these data has become every company have to ponder the question to consider!

Data Encryption technology development so far can be divided into three stages.

Before 1949, early data encryption technology simple, complexity is not high, less secure, most of them are puzzles with artistic features. Therefore, this period is known as password classical password. With the outbreak of World War II and the advent of the industrial revolution, data encryption technology breakthrough development. Encrypted cryptographic algorithm or by a mechanical device, so that plaintext into ciphertext.

1949-- 1975, until the birth of the world's first computer today, the rapid development of computer technology, but also makes the encryption upgrade from the mechanical age to the electronic age. This makes encryption technology complex calculations possible, but also makes the encryption algorithm has been greatly improved in complexity and security.

Since 1976, the US cryptography experts Di bandits and Herman proposed the concept of public-key cryptography in 1976, is a major invention of modern cryptography, cryptography will also provide a new direction. Data encryption is the process of the plaintext by the encryption system, in accordance with the encryption algorithm to change the plaintext into ciphertext. Data encryption is divided into transmission data encryption and data storage encryption. Data transfer is mainly encryption stream data is encrypted during transmission, for example: a link encryption, plus node, end encryption three ways. And stores the encrypted encryption algorithm, there are many, the most commonly used algorithms are DES algorithm, RSA algorithm, PGP algorithm.

With the frequent incidents of information security, there is growing emphasis on innovation and technology innovation in the field of data security. The rapid development of science and technology not only brings a lot of convenience, but also makes instruments *** are endless. According to reports, 10-year-old Finnish boy, although no Ins own account, was able to delete all posts by user comments, he is the youngest of black people into Ins. Hard to imagine such an age child may actually have reached such a state. I recall 10 years old, humbled ah! The above phenomenon brings us a warning, it is now a growing tendency to *** instrumental, so to speak a completely do not understand computers, could just click a button in the toolbar, and you can not bring to a business immeasurable loss, more serious point is more likely to bring to the lives of everyone. This is not alarmist, data security is not just an internal problem of a company, or social stability and prosperity of the country's major problems!

Infrastructure traditional encryption technology, but also enterprises and network construction unit, firewall, *** detection, anti-virus, of course, these innovations have been far less than the current technology. The new encryption technologies have emerged, such as the host monitor, document transparent encryption technology, SDC sandbox concept of technology. Document encryption is used in the application layer transparent encryption technology known as hook transparent encryption technology. This technique originated in win98 era, and later with windows2000 and popular. The technique is both (and application layer API Hook) combination. Through the windows api, monitor applications to open and save files, when you open the file, first convert ciphertext and then let the program read into memory to ensure the program is read plain text, and when you save, turn memory the plaintext encryption and then written to disk. APIHOOK application layer encryption technology, is characterized by simple, the disadvantage is poor reliability, speed super slow, because the need for temporary files, it is easy to crack. And for some large drawing class files, but also easy to damage, not to mention for developers brought much impact on the progress of the project, not to mention. However, due to the direct file encryption intuitive feeling is very good for the market in terms of the original blank, this banner really gets a lot of business. The SDC sandbox concept is the basis of former evolved, each filter layers only thing they do best, it is particularly stable, fast, reliable performance, there is no problem.

Data encryption is the enterprise prosperity, social stability, national security necessary complement!

Guess you like

Origin blog.51cto.com/14437103/2418318