PDF Print E-mail
Networking and Group Computing

Encryption

Although the technical details of encryption are rather complicated, encryption basically is the scrambling and alteration of data until it is no longer readable by anyone who does not have the proper decryption tool. Encryption will soon become an integral part of all transmissions.

“The reality is that the Internet is no more insecure than any other medium of commerce, such as bank, postal or telephone credit card transactions. But Internet security concerns cannot be understated either, because computerized tools such as network “sniffer’s” are employed by hackers to sort, filter and intercept sensitive information from a network”. Jerry Mechling , Director of Strategic Computing and Telecommunications, Harvard University.

Cryptography enables confidential information to be transmitted across unsecured networks without the risk of interception or tampering. This is done by putting data into codes. The sender has a special key(s) to encrypt the message and the receiver has a special code(s) to decrypt the message. Virtual Private Networks (VPN) involves encryption of data at both ends of the connection. VPN’s involve a vendor that controls the Internet connection at both ends, including protocol and secured encryption keys. VPNs use “TCP/IP tunneling” to let users dial into their offices via the Internet. For further information, see Ravlin software (www.redcreek.com). There are several different types of encryption techniques that users and senders can implement to protect their information. Below are the most common techniques.

To guarantee originator - single lock

  1. Sender creates an electronic document and prepares it for transmission.
  2. Document is encrypted with sender’s private key - only known to sender.
  3. Sender’s public key obtainable by anyone is distributed through various web sites.
  4. Recipient can open the document using the sender’s public key. The link between the two keys is proof that the sender sent the transmission.

To guarantee recipient - single lock

  1. Sender creates a document to be read only by designated recipient.
  2. Document is locked prior to transmission with designated recipient’s public key and transmitted.
  3. Because locked with public key, it can only be opened with designated recipient’s private key.
  4. Designated document is opened by recipient’s private key, thereby proving the documents security and that it was opened by recipient.

To guarantee originator and recipient - double lock

  1. Sender creates a document only to be read by designated recipient.
  2. Document is locked with recipient’s public key, and sender’s private key, and then transmitted.
  3. Since the document is locked with recipient’s public key and sender’s private key the transmitted document can be opened only with designated recipient’s private key and the sender’s public key. This proves document security and the authenticity of the sender and receiver.

For answers to your frequently asked questions on cryptography see www.rsa.com. One notable product is PGP (Pretty Good Privacy) (www.pgp.com), which allows users to encrypt on demand. Also, consider RSA Data Security Public Key Crytosystem™ (www.rsa.com).

 

Find Legal Software


Sponsors






eDiscovery Alerts

Click here to sign up for ediscovery e-mail alerts that provide news on the latest electronic discovery and evidence issues.