End-to-end encryption explained

1,351 views

Published on

Why https and database encryption are not enough to secure your information on cloud services.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,351
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

End-to-end encryption explained

  1. 1. End-to-End Encryption Explained<br />Why HTTPS is not enough<br />October / 25 / 2010 GlobalCrypto.com<br />
  2. 2. Old: SFTP<br />Plaintext File<br />Encrypted Link <br />(HTTPS/SSL)<br />SFTP Server<br />
  3. 3. HTTPS with DB Encryption<br />Plaintext File<br />Encrypted Link(HTTPS)<br />AES Key for DB Encryption<br />Encrypted Files in DB<br />
  4. 4. Senders RSA Key-Pair<br />Receivers RSA Key-Pair<br />Senders Encrypted File in DB<br />Other Files <br />encrypted in DB<br />Messages are encrypted<br />on senders machine then Sent to BunkerMail.<br />Files are downloaded to receivers machine, then decrypted using his unique keys.<br />Each user has unique keys which are stored on their computer<br />End-to-End Encryption<br />
  5. 5. BunkerMail advantages <br />Every message and attachment have Unique AES keys for encryption<br />AES keys are sent to receiver encrypted with receiver’s RSA public key<br />Information is controlled by RSA keys held by end users on their machines<br />

×