# Encryption & Decryption

• 06-01-2001, 04:04 AM
Mu'tasem
Encryption & Decryption

I want any Method About Encryption & Decryption and how this method work?
• 06-03-2001, 09:44 PM
Chris Boyle
Re: Encryption & Decryption

"Mu'tasem" <mjar@usa.net> wrote:
>
>I want any Method About Encryption & Decryption and how this method work?

Encryption is the transformation of data into a form that is as close to
impossible as possible to read without the appropriate knowledge. Its purpose
is to ensure privacy by keeping information hidden from anyone for whom it
is not intended, even those who have access to the encrypted data. Decryption
is the reverse of encryption; it is the transformation of encrypted data
back into an intelligible form.

There are two types of cryptosystems: secret-key and public-key cryptography
. In secret-key cryptography, also referred to as symmetric cryptography,
the same key is used for both encryption and decryption. The most popular
secret-key cryptosystem in use today is the Data Encryption Standard

In public-key cryptography, each user has a public key and a private key.
The public key is made public while the private key remains secret. Encryption
is performed with the public key while decryption is done with the private
key. The RSA public-key cryptosystem is the most popular form of public-key
cryptography. (RSA stands for Rivest, Shamir, and Adleman, the inventors
of the RSA cryptosystem)

The Digital Signature Algorithm (DSA) is also a popular public-key technique,
though it can only be used only for signatures, not encryption. Elliptic
curve cryptosystems (ECCs) are cryptosystems based on mathematical objects
known as elliptic curves. Elliptic curve cryptography has been gaining in
popularity recently. Lastly, the Diffie-Hellman key agreement protocol is
a popular public-key technique for establishing secret keys over an insecure
channel.

• 07-13-2001, 03:18 PM
Christian Olsson
Re: Encryption & Decryption

I wouild like to take the opportunity to introduce you to Protegrity and Protegrity's
Secure.Data Encryption and Privacy enforcement tool which enables companies
to comply with the information-privacy legislation and legal requirements
of the:

1) U.S. Health Information Portability and Accountability Act (HIPAA) - compliance
by October 2002 www.hipaacomply.com/;
2) U.S. Gramm-Leach-Bliley Act (GLBA) (TITLE V--Consumer Privacy), regulated
by the SEC, FTC, FDIC, OCC, OTS, FRB, NAIC, and NCUA, which covers a broad
range of financial services and virtually affects any company who accepts
credit cards - compliance July 1st, 2001 http://www.privacyheadquarters.com/r...research.html;

3) European Union 95/46/EC Directive on Data Privacy http://europa.eu.int/comm/internal_market/en/dataprot/;

4) E.U./U.S. Safe Harbor requirements www.export.gov/safeharbor
5) Canadian Personal Information Protection and Electronic Documents Act
(PIPEDA) www.privcom.gc.ca/;
7) Visa U.S.A.'s Cardholder Information Security Program (CISP) - compliance
by May 1st, 2001 www.visabrc.com/section.phtml?2,115;
8) VISA International Account Information Security (AIS) Standards and Best
Practices Guide https://www.visa.com/nt/gds/main.html; and
9) BITS (the technology group for the Financial Services Roundtable) Voluntary
Guidelines for Aggregation Services www.bitsinfo.org/FinalAggregationBook051601.pdf.

Protegrity’s Secure.Data™ product suite is a one-of-a-kind technology. It
is the only cryptographic data protection and key management solution commercially
available today operating at the database column and row level. Most importantly,
it is the only data-privacy enforcement solution supported within the major
relational database vendors’ products (Oracle, Sybase ASE, Microsoft SQL
2000 and IBM DB2) …with integration points directly within the code of some
of these vendors’ software.

Protegrity addresses data privacy and data protection at the actual data-storage
level within the organization’s production corporate databases, specifically
addressing the security and protection of data at-rest (persistent data)
versus data in-transit. Secure.Data™ insures data privacy and integrity in
an operationally on-line mode, transparently to applications. It is typically
deployed in distributed databases, Web-enabled staging databases, and centralized
mega-databases requiring cryptographic protection.

contact me to discuss how Protegrity best can assist you in complying to
the new HIPAA, GLBA, Safe Harbor, PIPEDA and Visa Cardholder Information
Security Program requirements.

Protegrity, Inc.
www.protegrity.com
christian.olsson@protegrity.com
408-366-0417

"Chris Boyle" <christopher_boyle@hotmail.com> wrote:
>
>"Mu'tasem" <mjar@usa.net> wrote:
>>
>>I want any Method About Encryption & Decryption and how this method work?

>
>
>Encryption is the transformation of data into a form that is as close to
>impossible as possible to read without the appropriate knowledge. Its purpose
>is to ensure privacy by keeping information hidden from anyone for whom

it
>is not intended, even those who have access to the encrypted data. Decryption
>is the reverse of encryption; it is the transformation of encrypted data
>back into an intelligible form.
>
>There are two types of cryptosystems: secret-key and public-key cryptography
>. In secret-key cryptography, also referred to as symmetric cryptography,
>the same key is used for both encryption and decryption. The most popular
>secret-key cryptosystem in use today is the Data Encryption Standard
>
>In public-key cryptography, each user has a public key and a private key.
>The public key is made public while the private key remains secret. Encryption
>is performed with the public key while decryption is done with the private
>key. The RSA public-key cryptosystem is the most popular form of public-key
>cryptography. (RSA stands for Rivest, Shamir, and Adleman, the inventors
>of the RSA cryptosystem)
>
>The Digital Signature Algorithm (DSA) is also a popular public-key technique,
>though it can only be used only for signatures, not encryption. Elliptic
>curve cryptosystems (ECCs) are cryptosystems based on mathematical objects
>known as elliptic curves. Elliptic curve cryptography has been gaining

in
>popularity recently. Lastly, the Diffie-Hellman key agreement protocol is
>a popular public-key technique for establishing secret keys over an insecure
>channel.
>
>