Ecommerce Security   «Prev 

Methods and purposes of encryption

  1. Symmetric: Uses one key to encrypt and decrypt information
  2. Asymmetric: Uses one key pair to encrypt and decrypt information
  3. One way: Creates hash code
  4. Applied: Combines several different encryption strategies
  5. Data confidentiality: Uses algorithms that make information remain secret
  6. Data integrity: A service for ensuring that information cannot be altered
  7. Authentication: Establishes a person's identity
  8. Access control: Determines where a person or network host is allowed to enter
  9. Nonrepudiation: The ability to prove a transaction has in fact occurred

3 different encryption methods

There are three different basic encryption methods, each with their own advantages:
  1. Hashing: Hashing creates a unique, fixed-length signature for a message or data set. Each hash is unique to a specific message, so minor changes to that message would be easy to track. Once data is encrypted using hashing, it cannot be reversed or deciphered. Hashing, then, though not technically an encryption method as such, is still useful for proving data has not been tampered with.
  2. Symmetric methods: Symmetric encryption is also known as private-key cryptography, and is called so because the key used to encrypt and decrypt the message must remain secure, because anyone with access to it can decrypt the data. Using this method, a sender encrypts the data with one key, sends the data (the ciphertext) and then the receiver uses the key to decrypt the data.
  3. Asymmetric methods: Asymmetric encryption, or public-key cryptography, is different than the previous method because it uses two keys for encryption or decryption (it has the potential to be more secure as such). With this method, a public key is freely available to everyone and is used to encrypt messages, and a different, private key is used by the recipient to decrypt messages.
Any of these methods would likely prove sufficient for proper data security, and a quick search will reveal the multitude of solutions available for data encryption. Data encryption is a necessity (both for legal reasons and otherwise) when transmitting information like PHI, so no matter what method you choose, make sure you are doing everything you can to protect data.