Data encryption is a technology with a long history. It refers to converting plain text into cipher text through encryption algorithm and encryption key, while decryption refers to restoring cipher text into plain text through decryption algorithm and decryption key. At its core is cryptography.
Data encryption is still the most reliable way for computer systems to protect information. It uses cryptographic technology to encrypt information and hide information, thereby protecting the security of information. (Recommended learning: web front-end video tutorial)
Introduction
The data encryption technology used in conjunction with the firewall is to improve information The security and confidentiality of systems and data are one of the main technical means used to prevent secret data from being deciphered by external parties. Technically, measures are taken from both software and hardware aspects.
According to different functions, data encryption technology can be divided into data transmission encryption technology, data storage encryption technology, data integrity identification technology and key management technology.
The purpose of data transmission encryption technology is to encrypt the data stream during transmission. There are usually two types: line encryption and end-end encryption. Line encryption focuses on the line without considering the source and destination. It uses different encryption keys to provide security protection for confidential information through each line.
End-to-end encryption means that the information is automatically encrypted by the sending end and encapsulated in data packets by TCP/IP, and then passes through the Internet as unreadable and unrecognizable data. When this information reaches the destination, it will be Automatically reorganize and decrypt to become readable data.
The purpose of data storage encryption technology is to prevent data loss in the storage process. Data storage encryption technology can be divided into two types: ciphertext storage and access control. The former is generally achieved through encryption algorithm conversion, additional passwords, encryption modules, etc.; the latter is to review and restrict user qualifications and permissions to prevent illegal users from accessing data or legitimate users from accessing data beyond their authority.
The purpose of data integrity authentication technology is to verify the identity and related data content of people involved in information transmission, access and processing, which generally includes the identification of passwords, keys, identities, data and other items. The system achieves data security protection by comparing and verifying whether the characteristic values entered by the object comply with the preset parameters.
Key management technology includes confidentiality measures in all aspects of key generation, distribution, storage, replacement and destruction.
The above is the detailed content of Basic functions of data encryption. For more information, please follow other related articles on the PHP Chinese website!