A Brief History of Encryption

60 %
40 %
Information about A Brief History of Encryption

Published on March 10, 2014

Author: ciphercloud

Source: slideshare.net


For enterprises in regulated industries considering cloud adoption, information protection for compliance is a key concern. Data privacy and breach notification laws abound, creating potential concerns with cloud applications. Cloud encryption solves many of those problems.

Cloud encryption isn’t a one-size-fits-all solution, however. Encryption works well in many cases, but then again, so does tokenization, and both options have their place in an effective cloud information protection program.

Quick Primer on Encryption
Encryption has long been recognized as a powerful tool for securing data (see the cool “A Brief History of Encryption” infographic below!). It uses algorithms to transform specified pieces of information so that they become unreadable until decrypted using cryptographic keys. CipherCloud offers a variety of different encryption schemes for different purposes, among them 256-bit AES encryption, and customers always host the keys locally, never in the cloud or with a cloud provider, making it a powerful tool for cloud data protection.

Encryption addresses many regulatory concerns. More and more data privacy laws recognize that when data is encrypted and the encryption keys remain in the owners’ hands, a loss of data is actually not a data breach. Even when encrypted data is disclosed, it is unintelligible and useless. In such cases, safe harbor laws stipulate that the enterprises who own the disclosed data are not required to notify the public of the breach. It is only when encrypted data and the encryption keys are disclosed that problems arise. Encryption is so secure, in fact, that end-to-end encryption with enterprise control over the encryption key is the most secure and confidential method of protecting corporate data in the cloud.

Overview of Tokenization
Tokenization, on the other hand secures information in a different fashion than encryption. Rather than using an algorithm to transform data, tokenization replaces the actual data with structurally similar but mathematically unrelated “tokens” before the data leaves the enterprise. The original data and a token mapping table are stored on-premise in a secure database. Tokenization meet the strictest data residency laws while still taking advantage of cloud computing. Much like cloud encryption, tokenization can reduce the regulatory burden on an enterprise. The PCI Security Standards Council has declared that tokenization can reduce an organization’s PCI-DSS scope, provided that the tokenization implementation meets several recommendations.

Click here for best practices and recommendations for using tokenization:

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

A Brief History of Cryptography - Inquiries Journal

It is easy to see why this method of encryption is simple to break. ... A Brief History of Cryptography. Inquiries Journal/Student Pulse [Online], 1.
Read more

A Brief History of Cryptography - Red Hat Customer Portal

A Brief History of Cryptography. Red Hat ... use a form of encryption to convey secret messages to ... as AES or the Advanced Encryption Standard. To ...
Read more

A brief history of U.S. encryption policy | Brookings ...

The FBI’s recent attempt to force Apple to unlock the iPhone of Syed Farook brought the battle over encryption directly to the pockets of many Americans ...
Read more

A brief history of modern encryption — Medium

A brief history of modern encryption. F or many people, cryptography is associated with encryption. An encryption algorithm (or a tool, or a method) allows ...
Read more

A Brief History of Encryption | Security | TechNewsWorld

Threats to computer and network security increase with each passing day and come from a growing number of sources. No computer or network is immune from ...
Read more

The History of Encryption - CES Comm

The History of Encryption. A brief overview of the development of secure communications methods from antiquity to the present day : Encryption has been ...
Read more

A brief history of US encryption policy | Benton Foundation

The FBI’s recent attempt to force Apple to unlock the iPhone of Syed Farook brought the battle over encryption directly to the pockets of many Americans.
Read more

2014 as the Year of Encryption: A (Very) Brief History of ...

Some people are calling 2014 the “Year of Encryption” as the tool that will let companies and individual protect their data. Perhaps this time it will ...
Read more

A Brief History of Provably-Secure Public-Key Encryption

A Brief History of Provably-Secure Public-Key Encryption Alexander W. Dent Royal Holloway, University of London Egham, Surrey, TW20 0EX, U.K. a.dent@rhul.ac.uk
Read more

The History of Encryption | Visual.ly

The History of Encryption. The History of Encryption 700 BC Scytale The Spartan military used scytales to send sensitive missives during times of battle.
Read more