LE3.1.1.4

STANDARD METHODS FOR ENCRYPTION AND DECRIPTIONEncryption. Decryption. Schiffer. Hash-function.

FPS Help. Standard settings.



WHY YOU NEED TO ENCRYPT INFORMATION



In Regulation (EC) 2016/679 of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of information, published in the Official Journal of the European Union on 4 May 2016, encryption is referred to as a mandatory technical and organizational security measure.

The need to encrypt the information arrays is determined by the following factors:

Note: According to official statistics, over 65% of companies are bankrupt as a result of loss of information or unauthorized access.


DATA ENCRYPTION AND CONTROL BY HASH-FUNCTION


Encrypting and decrypting files


File encryption allows the ability of other users to gain access to confidential information.

Protection of files can be performed as using the password (standard information protection) and without using one.

Encryption without password is in many cases much more reliable. In this case, instead of a password, you can use a local file, a digital image, or a text document with arbitrary content.

Note: Each of these methods has both advantages and disadvantages.

It is a good idea to choose a data protection mechanism to be tailored to the specifics of the information we encrypt.

If you encrypt Microsoft Office documents, scanned images, PDF files and / or e-mail it is advisable to use a mechanism with high reliability of the implemented protection.
To comply with all security requirements, the application needs to be built in accordance with ISO/IEC 9979: 1999 or approved by GCHQ.

Standard encryption methods use a reliable chiper and hash-function.

While the cipher is used only as a security tool, the hash function is used to verify data integrity, compress, and verify the source of data (source authentication).

Note: Electronic signatures use hash functions.


Hash-functions


Hash-functions are a basic tool in the realization of Internet transactions.
They convert data regardless of their length into a fixed length string. This process is called "hashing" and the end result is a "hash function".

Hash functions are used when comparing data. This kind of comparison is made to prevent unauthorized changes in the information arrays or to check the right of access to certain information.

In the File Protect System, hash functions are used to control the integrity of the encrypted information. This is critical when exchanging encrypted files over the Internet or LAN.

Keeping the generated hash functions for the processed files is done through specialized reports. These reports are not directly related to the content of the encrypted information. This ensures a high level of security and prevention in case of unauthorized access.

Note: In addition to standard hash functions, FPS also uses checks that are subject to separate consideration.

The signing of electronic documents by means of a qualified electronic signature in no way contradicts the FPS systems used for hashing. These two methods complement each other and allow better protection of electronic documents.
With FPS, different documents or groups of documents (packages or file lists) may be signed with unique, dynamic identifiers dynamically generated. These identifiers carry a unique character and are tied to the processing process.

There are two types of hash functions, as intended. The first type serves to confirm the source of information. It is used when we share data over the Internet or on a local network. This type of function is called Message Authentication Code (MAC).

The second type is used to verify the integrity of the data. It applies when it is necessary to check whether the file has been modified. This type of feature is known as MDC (Modification Detection Code).

Example:

Hash function of the sentence:

"The quick brown fox jumps over the lazy dog" е  2fd4e1c6 7a2d28fc ed849ee1 bb76e7391b93eb12.


If we change only one letter in this sentence and it is converted to

"The quick brown fox jumps over the lazy cog",


and the hash function will change to

de9f2c7f d25e1b3a fad3e85a 0bd17d9b100db4b3.


Changes in hash are indicative of corrections being made to the text.


Parameters setting


File Protect System version LE allows you to control the following encryption process parameters:


In order to check to what extent the chosen parameters correspond to the objectives set, it is possible to test them according to the requirements for testing, assessing and evaluating the effectiveness of the technical and organizational measures according to European Parliament Regulation 2016/679 of 27 April 2016.

The selection of the encryption algorithm and hash function is performed through the encryption process setup panel. To activate, you need to click on the "Cipher Settings" button or if a keyboard shortcut [ Alt+E ] is pressed.


FPS - Настройка на шифроването

In the following example, we'll look at how to test the selected cipher and hash function.

Example:

Let's choose the AES cipher and Haval [256 Bit, 5 passes] hash function as shown on the image.
After the parameters of the encryption process are set, we enter a test password.
The next step is to select an output file, encryption, and what name and extension will be saved to the encrypted file.
In order to test the entered settings, we need to click on the "Encryption" button.

FPS - Настройка на шифъра

If the parameters are entered correctly and the test has passed without error, a system message will appear that the file has been successfully encrypted and the result indicator in the lower left corner will glow green.
The test is completed.


What is good to know is that not always the speed of the process is tied to the length of the file. In the above test example, a 1.2 MByte PDF file is selected. The processing time is 125 ms (one hundred twenty-five thousandths of a second).
While this may seem like a very high processing speed, it is also necessary to carry out tests with other combinations.
Often, in the batch processing mode, several tens of thousands of files are encrypted within one process.
If the processing time is limited, even this speed may not be high enough.
It is also good to repeat the test for files of different formats but of the same length and the results to be compared.


  Contents