Next revision | Previous revisionNext revisionBoth sides next revision |
security [2018_01_30 17:23] – external edit 127.0.0.1 | security [2018_01_30 19:15] – [3 Data Security] steven |
---|
{{:/security:steps:sme_3_data_security.png}} | {{:/security:steps:sme_3_data_security.png}} |
| |
Storage Made Easy can be used to encrypt data transmitted to any cloud that is mapped to a user personal, Cloud File Server, or Appliance account. SME uses [[http://en.wikipedia.org/wiki/Advanced_Encryption_Standard|AES]]-256 encryption using the Rijndael cipher, with Cipher Block Chaining (CBC) where the block size is 16 bytes. The cipher Rijndael consists of:\\ \\ - an initial Round Key addition\\ - Nr-1Rounds\\ - a final round.\\ \\ The chaining variable goes into the âinputâ and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael;\\ \\ Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https://storagemadeeasy.com/clients_and_tools#Mac|Mac]], [[https://storagemadeeasy.com/clients_and_tools#Windows|Windows]] and [[https://storagemadeeasy.com/clients_and_tools#Linux|Linux]] that enable the decryption of a file if you download it directly from a mapped cloud ie. without any access to the SME service.\\ \\ The Wiki entry on encryption has further details. | Storage Made Easy can be used to encrypt data transmitted to any cloud that is mapped to a user personal, Cloud File Server, or Appliance account. SME uses [[http://en.wikipedia.org/wiki/Advanced_Encryption_Standard|AES]]-256 encryption using the Rijndael cipher, with Cipher Block Chaining (CBC) where the block size is 16 bytes. The cipher Rijndael consists of: |
| * an initial Round Key addition |
| * Nr-1Rounds |
| * a final round. |
| |
| The chaining variable goes into the input and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; |
| |
| Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https://storagemadeeasy.com/clients_and_tools#Mac|Mac]], [[https://storagemadeeasy.com/clients_and_tools#Windows|Windows]] and [[https://storagemadeeasy.com/clients_and_tools#Linux|Linux]] that enable the decryption of a file if you download it directly from a mapped cloud ie. without any access to the SME service. |
| |
| The Wiki entry on encryption has further details. |
| |
| |
{{:/security:steps:sme_5_document_security.png}} | {{:/security:steps:sme_5_document_security.png}} |
| |
Documents can be securely shared using the SME platform in a number of ways:\\ \\ - Documents can be encrypted on upload using 256 bit AES security. The private key is not stored on the platform and only known by the user.\\ - Private links can be created for documents and these can be combined with passwords to secure the document.\\ - Links can be set to be time expired and/or combined with private links and password for further additional document security. | Documents can be securely shared using the SME platform in a number of ways: |
| * Documents can be encrypted on upload using 256 bit AES security. The private key is not stored on the platform and only known by the user. |
| * Private links can be created for documents and these can be combined with passwords to secure the document. |
| * Links can be set to be time expired and/or combined with private links and password for further additional document security. |
| |
| |