{"id":7541,"date":"2016-07-20T10:10:24","date_gmt":"2016-07-20T10:10:24","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=7541"},"modified":"2018-05-09T09:38:22","modified_gmt":"2018-05-09T09:38:22","slug":"data-encryption-a-powerful-and-an-approachable-technology","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/","title":{"rendered":"Data Encryption : A Powerful and an Approachable Technology!"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/07\/encryption.png\" width=\"674\" height=\"385\" \/><\/strong><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Different_methods_of_Encryption\" >Different methods of\u00a0Encryption:<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Hashing\" >Hashing:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Symmetric_Encryption\" >Symmetric Encryption:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Asymmetric_methods\" >Asymmetric methods:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Benefits_of_Encryption\" >Benefits of Encryption:<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Encryption_helps_to_move_data_in_to_the_cloud\" >Encryption helps to move data in to the cloud:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Encryption_helps_to_achieve_secure_multi_tenancy_in_cloud\" >Encryption helps to achieve secure multi tenancy in cloud:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Encryption_prevents_service_providers_from_accessing_private_data\" >Encryption prevents service providers from accessing private data:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Encryption_provides_service_providers_a_competitive_edge\" >Encryption provides service providers a competitive edge:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/#Use_of_encryption_in_Modern_world\" >Use of encryption in Modern world:<\/a><\/li><\/ul><\/nav><\/div>\n\n<p style=\"text-align: justify;\"><strong>Encryption is the process of changing information in a way as to make it unreadable by anyone except those possessing special knowledge that allows them to change the information back to its original, readable form.\u00a0Encryption\u00a0is important\u00a0because it allows us to protect data that we don&#8217;t want anyone else to have access to.<\/strong><\/p>\n<p style=\"text-align: justify;\">Businesses use encryption method to protect corporate secrets, government use it to secure classified information, and many individuals use it to protect personal information to guard against things like identity theft.\u00a0So the main purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet\u00a0or other computer networks.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Different_methods_of_Encryption\"><\/span>Different methods of\u00a0Encryption:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Hashing\"><\/span>Hashing:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">Hashing creates a unique signature for a message or set of data. Hashing takes data and creates hash out of it. Each hash is unique to the specific message so minor change to the message would be easily tracked.<\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Symmetric_Encryption\"><\/span>Symmetric Encryption:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">Symmetric encryption is also known as private-key cryptography, and is called so because the key used to encrypt and decrypt the message must remain secure. The most important thing about symmetric encryption is that both sides\u2014the encrypter, and the decrypter\u2014need access to the same key.<\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Asymmetric_methods\"><\/span>Asymmetric methods:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">It uses two keys for encryption or decryption. With this a public key is freely available to everyone and is used to encrypt the message.The private key is used by the recipient to decrypt the message.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Benefits_of_Encryption\"><\/span>Benefits of Encryption:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Encryption_helps_to_move_data_in_to_the_cloud\"><\/span>Encryption helps to move data in to the cloud:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">Encryption can make it possible to leverage benefits of infrastructure as a service while still it ensures the privacy of data.<\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Encryption_helps_to_achieve_secure_multi_tenancy_in_cloud\"><\/span>Encryption helps to achieve secure multi tenancy in cloud:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">In cloud environment multi-tenancy drives cost down and increases flexibility. If you encrypt data before it enters the cloud, and retain control of the encryption keys, you can ensure your data is safe, regardless of its neighbors.<\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Encryption_prevents_service_providers_from_accessing_private_data\"><\/span>Encryption prevents service providers from accessing private data:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">If service provider has your encrypted data and encryption keys then they can easily access your data. To avoid this problem encrypting your data on cloud and holding your own key is the safest mode.<\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Encryption_provides_service_providers_a_competitive_edge\"><\/span>Encryption provides service providers a competitive edge:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">As a <a href=\"https:\/\/www.esds.co.in\/enlight-cloud-hosting\"><strong>cloud service provider<\/strong><\/a>, you are a guardian of your customers\u2019 applications and data. Thieves are getting smarter and regulations are getting more stringent.\u00a0Encryption and key management software, designed specifically for virtualized environments, can help you significantly improve your security posture, attract new customers, and expand your business with existing clients.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Use_of_encryption_in_Modern_world\"><\/span>Use of encryption in Modern world:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Encryption makes modern world go around. Now a day making mobile calls, buying something with credit or debit cards, shopping on the web, getting cash from ATM machine is not possible without encryption. So encryption is all about transforming intelligent numbers, text, sound or images in to a stream of nonsense.<\/p>\n<p style=\"text-align: justify;\">People uses encryption to securely protect folder contents, which could contain emails, chat histories, tax information, credit card numbers, or any other sensitive information. This way, even if your computer is stolen that data is safe.<\/p>\n<p style=\"text-align: justify;\">So finally <strong>encryption is a powerful technology.<\/strong> Once anyone knows how it works, it is an approachable technology as well. This technology provides tremendous benefits to any organization handling confidential information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption is the process of changing information in a way as to make it unreadable by anyone except those possessing special knowledge that allows them to change the information back to its original, readable form.\u00a0Encryption\u00a0is important\u00a0because it allows us to protect data that we don&#8217;t want anyone else to have access to. Businesses use encryption&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":81,"featured_media":7543,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[518],"class_list":["post-7541","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","tag-cloud-encryption"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/7541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=7541"}],"version-history":[{"count":7,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/7541\/revisions"}],"predecessor-version":[{"id":8790,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/7541\/revisions\/8790"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/7543"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=7541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=7541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=7541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}