Sunday, July 15, 2007

The Secrets of Laptop Encryption

To maximize the effectiveness of encryption in providing effective
security assurance solutions, organizations must deploy it as part of a
defense-in-depth security stance. Like any technology, encryption is
plagued with pitfalls, mistakes, and traps that could easily provide an
organization with a false sense of confidence in its security, while
still allowing attackers to easily compromise the organization’s
data. The common pitfalls, mistakes, and traps that an organization
implementing encryption must avoid are:



• Algorithm Management



• Key Length



• Key Recovery



• Scope of Protection



THE CHALLENGES OF ALGORITHM MANAGEMENT



The general mathematics behind an encryption algorithm is fairly
straightforward. At first glance, writing algorithms seems to be very
easy to do. In reality, writing secure algorithms is extremely
difficult. The details of how the algorithm is assembled play an
important role in its effectiveness.



Differential crypt analysis was first discovered in the mid-1990s as a
method for cracking symmetric Key algorithms very quickly. Early on,
the difference between algorithms that could be broken and algorithms
that were secure was how the data was broken up prior to encryption.
Something as simple as how the data is put into blocks determined
whether an algorithm was secure. The Secrets of Laptop Encryption Linked by LT Hacker


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

No comments: