Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Next revisionBoth sides next revision
security [2018_01_30 17:23] – external edit 127.0.0.1security [2018_01_30 19:15] – [3 Data Security] steven
Line 32: Line 32:
 {{:/security:steps:sme_3_data_security.png}} {{:/security:steps:sme_3_data_security.png}}
  
-Storage Made Easy can be used to encrypt data transmitted to any cloud that is mapped to a user personal, Cloud File Server, or Appliance account. SME uses [[http://en.wikipedia.org/wiki/Advanced_Encryption_Standard|AES]]-256 encryption using the Rijndael cipher, with Cipher Block Chaining (CBC) where the block size is 16 bytes. The cipher Rijndael consists of:\\ \\ - an initial Round Key addition\\ - Nr-1Rounds\\ - a final round.\\ \\ The chaining variable goes into the â€œinput” and the message block goes into the “Cipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael;\\ \\ Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https://storagemadeeasy.com/clients_and_tools#Mac|Mac]], [[https://storagemadeeasy.com/clients_and_tools#Windows|Windows]] and [[https://storagemadeeasy.com/clients_and_tools#Linux|Linux]] that enable the decryption of a file if you download it directly from a mapped cloud ie. without any access to the SME service.\\ \\ The Wiki entry on encryption has further details.+Storage Made Easy can be used to encrypt data transmitted to any cloud that is mapped to a user personal, Cloud File Server, or Appliance account. SME uses [[http://en.wikipedia.org/wiki/Advanced_Encryption_Standard|AES]]-256 encryption using the Rijndael cipher, with Cipher Block Chaining (CBC) where the block size is 16 bytes. The cipher Rijndael consists of: 
 +  * an initial Round Key addition 
 +  * Nr-1Rounds 
 +  * a final round. 
 + 
 +The chaining variable goes into the input€ and the message block goes into the “Cipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; 
 + 
 +Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https://storagemadeeasy.com/clients_and_tools#Mac|Mac]], [[https://storagemadeeasy.com/clients_and_tools#Windows|Windows]] and [[https://storagemadeeasy.com/clients_and_tools#Linux|Linux]] that enable the decryption of a file if you download it directly from a mapped cloud ie. without any access to the SME service. 
 + 
 +The Wiki entry on encryption has further details.
  
  
Line 50: Line 59:
 {{:/security:steps:sme_5_document_security.png}} {{:/security:steps:sme_5_document_security.png}}
  
-Documents can be securely shared using the SME platform in a number of ways:\\ \\ - Documents can be encrypted on upload using 256 bit AES security. The private key is not stored on the platform and only known by the user.\\ - Private links can be created for documents and these can be combined with passwords to secure the document.\\ - Links can be set to be time expired and/or combined with private links and password for further additional document security.+Documents can be securely shared using the SME platform in a number of ways: 
 +  * Documents can be encrypted on upload using 256 bit AES security. The private key is not stored on the platform and only known by the user. 
 +  * Private links can be created for documents and these can be combined with passwords to secure the document. 
 +  * Links can be set to be time expired and/or combined with private links and password for further additional document security.