Data Encryption and Obsoleting the Hash

Data Encryption and Obsoleting the Hash

Paul Andreas Fischer
Professor Kathleen Hyde
Data Encryption Using AES 128 and 256 Images
  Sometimes AES encryption can be used to protect data against oncoming attackers or simply prying eyes. While this paper will discuss the procedure and benefits of encrypting a simple text document, and display the radical difference between the raw data which is produced without appropriate permissions and the data which is produced with appropriate permissions, it should be noted that this technology can also be used to encrypt programs, pictures, films, or even operating systems and firewalls. Finally, the obsolescence of a hash will be discussed by the use of two-fold encryption, which will be demonstrated in the course of the procedure.

Preparing to Encrypt Your Data
  In my data, the chess sheet, some very embarrassing information about the first attempt to learn to play chess using professional lessons is provided. The first thing to do is to identify the document or documents which need to be encrypted and place them in a folder as seen in figure 1. It is then necessary to open an encryption software, in this case Disk Utility.
The Encryption Process
  The option to create an image from the file will give the capability to encrypt the data as seen in figure 2. In this case blue is used for a lighter encryption while green is used for a heavier encryption, it should be possible to change the file to read/write as well at this point, both actions of which can be seen in figure 3. A .dmg is created as seen in figure 4, and the encryption process has been completed.   The finished products, encrypted at AES-128 and AES-256 can be seen in figure 5.
Figures 6 and 7 serve two purposes. The first is to demonstrate how radically different both forms of encryption are, while the second will be discussed in the section on the hash later. The unsuccessful attempts to access the data using Textedit are followed by a successful authorization process in figures 8 and 9.
  Finally, this embarrassing data can be seen in figure 10. A complete analysis of these first 16 games which precede completion of the lessons has been provided and, given time now that 150 lessons have been completed over the course of a weekend, will be followed by more successful statistics, undoubtedly, which will not require encryption. Double redundancy means that the files will not be lost but also provides another security measure.
Obsolete the Hash
  The purpose of the hash is to not only protect the data from unwanted viewers by producing hash values (Anderson), but ceding that possibility for some batches of data, which became necessary with the popularization of the personal computer, to alert the reader to any manipulations of the data. By using a double redundancy, even if one form of encryption is intercepted and manipulated, or even if both are, the chances that both will be intercepted by the same attacker makes this a secure method of securing information. It can be verified by a third-party partway to delivery, just as with a hash, without access to the actual information by verification of the source, as long as the package identity is confirmed.
Anderson, K. D., & Glover, N. (1995). U.S. Patent No. 5,406,279. Washington, DC: U.S. Patent and Trademark Office.
Figure 1: File Awaiting Encryption
Figure 2: Dropdown tab from Disk Utility

Figure 3: Disk Utility, creating AES encryption

Figure 4: Disk Utility, Encryption Completed

Figure 5: Encrypted .dmg files
Figure 6: Accessing AES-128 Encryption with Textedit, notice difference despite same source from AES-256 Encryption
Figure 7: Accessing AES-256 Encryption with Textedit, notice difference despite same source from AES-128 Encryption
Figures 8 and 9: Access of Chess Gradesheet Using Password
Figure 10: A final decrypted file, the Chess Gradesheet
Skip to toolbar