Difference between revisions of "Encryption Backdoor"

From SI410
Jump to: navigation, search
Line 1: Line 1:
An '''Encryption Backdoor''' is the concept of building in an alternative method of accessing data, allowing an unauthorized user to bypass security precautions and undermine the intended purpose of data encryption. Encryption is the process of manipulating information via algorithms, preventing sensitive information from being read if intercepted by an unauthorized recipient. Successful encryption will involve a pseudo-random and complex key possessed by the intended recipient of the information, allowing them to read it. An encryption backdoor has the implications of creating a master key, capable of being replicated to breach a variety of encrypted devices.
+
An '''Encryption Backdoor''' is the concept of building in an alternative method of accessing data, allowing an unauthorized user to bypass security precautions and undermine the intended purpose of data encryption. Encryption is a form of [[information security]] where information is manipulated via algorithms, preventing sensitive information from being read if intercepted by an unauthorized recipient. Successful encryption will involve a pseudo-random and complex key possessed by the intended recipient of the information, allowing them to read it. An encryption backdoor has the implications of creating a master key, capable of being replicated to breach a variety of encrypted devices.
  
 
==Overview==
 
==Overview==
 +
  
  

Revision as of 03:39, 23 February 2016

An Encryption Backdoor is the concept of building in an alternative method of accessing data, allowing an unauthorized user to bypass security precautions and undermine the intended purpose of data encryption. Encryption is a form of information security where information is manipulated via algorithms, preventing sensitive information from being read if intercepted by an unauthorized recipient. Successful encryption will involve a pseudo-random and complex key possessed by the intended recipient of the information, allowing them to read it. An encryption backdoor has the implications of creating a master key, capable of being replicated to breach a variety of encrypted devices.

Overview

History

Examples

See also

Notes

References

External links