12.07.2015 Views

to download - Secure Support - SafeNet

to download - Secure Support - SafeNet

to download - Secure Support - SafeNet

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1IntroductionSecurity OverviewThere are a number of simple cryp<strong>to</strong>graphic terms mentioned throughout thismanual which the reader is required <strong>to</strong> understand. This section is intended as abrief overview of what these terms mean in the context of the ProtectFile product.In the field of cryp<strong>to</strong>graphy, the term key refers <strong>to</strong> a value which is used <strong>to</strong> encryptdata using an algorithm. There are many different types of keys and algorithms.The term algorithm refers <strong>to</strong> a defined mathematical calculation that is used <strong>to</strong>encrypt, decrypt, or verify data using a key.Key ManagementKeys are used <strong>to</strong> protect or unlock data. It is important <strong>to</strong> correctly manage yourkeys in order <strong>to</strong> minimize the risk of compromise <strong>to</strong> your protected files. InProtectFile, key management is performed in software and, for the most part, anadministra<strong>to</strong>r or user of ProtectFile does not need <strong>to</strong> know or perform any specialactions <strong>to</strong> manage their keys.ProtectFile Premium can be configured <strong>to</strong> operate in two different modes, eachusing a different type of key management. These are:Domain mode, which uses symmetric key managementPKI mode, which uses asymmetric key managementProtectFile Business uses symmetric key management.The following sections are presented as an overview <strong>to</strong> help explain the benefitsand disadvantages within each of the discussed key management environments. It isup <strong>to</strong> the individual <strong>to</strong> select which type of key management is considered best for aparticular application, or contact <strong>SafeNet</strong> <strong>Support</strong> for assistance.Symmetric Key ManagementSymmetric encryption systems (for example, DES) have been used in governmentand business applications for a long time. The encryption algorithm is published <strong>to</strong>allow independent and widespread analysis of the algorithms. The security of thesesystems depends on the security and strength of a secret key shared by sender andrecipient.2 © <strong>SafeNet</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!