Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
security [2019_06_18 16:10] – [Security] jim | security [2019_06_18 16:12] – [3 Encryption Algorithm] jim | ||
---|---|---|---|
Line 21: | Line 21: | ||
===== 3 Encryption Algorithm ===== | ===== 3 Encryption Algorithm ===== | ||
- | Storage Made Easy can be used to encrypt data transmitted to any cloud that is mapped to a user personal, Cloud File Server, or Appliance account. | + | The Enterprise File Fabric |
* an initial Round Key addition | * an initial Round Key addition | ||
* Nr-1Rounds | * Nr-1Rounds | ||
Line 28: | Line 28: | ||
The chaining variable goes into the input and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; | The chaining variable goes into the input and the message block goes into the âCipher Key. The likelihood of recovering a file that has been encrypted using our encryption is fairly remote. The most efficient key-recovery attack for Rijndael is exhaustive key search. The expected effort of exhaustive key search depends on the length of the Cipher Key and for a 16-byte key, 2127 applications of Rijndael; | ||
- | Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https:// | + | Any AES-256 decryption tool that supports the Rijndael cipher with 16 byte blocksizes can be used to un-encrypt files. We also provide free desktop decryption tools for [[https:// |
See also [[https:// | See also [[https:// | ||
- | |||
===== 4 Authentication Security ===== | ===== 4 Authentication Security ===== | ||