Tuesday, November 15, 2016

Data Encryption and Obsoleting the Hash

Paul Andreas Fischer
11/15/2016
Professor Kathleen Hyde


Data Encryption Using AES 128 and 256 Images


  Sometimes AES encryption can be used to protect data against oncoming attackers or simply prying eyes. While this paper will discuss the procedure and benefits of encrypting a simple text document, and display the radical difference between the raw data which is produced without appropriate permissions and the data which is produced with appropriate permissions, it should be noted that this technology can also be used to encrypt programs, pictures, films, or even operating systems and firewalls. Finally, the obsolescence of a hash will be discussed by the use of two-fold encryption, which will be demonstrated in the course of the procedure.

Preparing to Encrypt Your Data


  In my data, the chess sheet, some very embarrassing information about the first attempt to learn to play chess using professional lessons is provided. The first thing to do is to identify the document or documents which need to be encrypted and place them in a folder as seen in figure 1. It is then necessary to open an encryption software, in this case Disk Utility.

The Encryption Process


  The option to create an image from the file will give the capability to encrypt the data as seen in figure 2. In this case blue is used for a lighter encryption while green is used for a heavier encryption, it should be possible to change the file to read/write as well at this point, both actions of which can be seen in figure 3. A .dmg is created as seen in figure 4, and the encryption process has been completed.   The finished products, encrypted at AES-128 and AES-256 can be seen in figure 5.
Figures 6 and 7 serve two purposes. The first is to demonstrate how radically different both forms of encryption are, while the second will be discussed in the section on the hash later. The unsuccessful attempts to access the data using Textedit are followed by a successful authorization process in figures 8 and 9.
  Finally, this embarrassing data can be seen in figure 10. A complete analysis of these first 16 games which precede completion of the lessons has been provided and, given time now that 150 lessons have been completed over the course of a weekend, will be followed by more successful statistics, undoubtedly, which will not require encryption. Double redundancy means that the files will not be lost but also provides another security measure.

Obsolete the Hash


  The purpose of the hash is to not only protect the data from unwanted viewers by producing hash values (Anderson), but ceding that possibility for some batches of data, which became necessary with the popularization of the personal computer, to alert the reader to any manipulations of the data. By using a double redundancy, even if one form of encryption is intercepted and manipulated, or even if both are, the chances that both will be intercepted by the same attacker makes this a secure method of securing information. It can be verified by a third-party partway to delivery, just as with a hash, without access to the actual information by verification of the source, as long as the package identity is confirmed.



References:

Anderson, K. D., & Glover, N. (1995). U.S. Patent No. 5,406,279. Washington, DC: U.S. Patent and Trademark Office.




Figure 1: File Awaiting Encryption

                                                      
Figure 2: Dropdown tab from Disk Utility



Figure 3: Disk Utility, creating AES encryption




Figure 4: Disk Utility, Encryption Completed



Figure 5: Encrypted .dmg files




Figure 6: Accessing AES-128 Encryption with Textedit, notice difference despite same source from AES-256 Encryption



Figure 7: Accessing AES-256 Encryption with Textedit, notice difference despite same source from AES-128 Encryption



Figures 8 and 9: Access of Chess Gradesheet Using Password 


Figure 10: A final decrypted file, the Chess Gradesheet



No comments:

Post a Comment