End-to-end encryption explained
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

End-to-end encryption explained

on

  • 1,262 views

Why https and database encryption are not enough to secure your information on cloud services.

Why https and database encryption are not enough to secure your information on cloud services.

Statistics

Views

Total Views
1,262
Views on SlideShare
1,262
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

End-to-end encryption explained Presentation Transcript

  • 1. End-to-End Encryption Explained
    Why HTTPS is not enough
    October / 25 / 2010 GlobalCrypto.com
  • 2. Old: SFTP
    Plaintext File
    Encrypted Link
    (HTTPS/SSL)
    SFTP Server
  • 3. HTTPS with DB Encryption
    Plaintext File
    Encrypted Link(HTTPS)
    AES Key for DB Encryption
    Encrypted Files in DB
  • 4. Senders RSA Key-Pair
    Receivers RSA Key-Pair
    Senders Encrypted File in DB
    Other Files
    encrypted in DB
    Messages are encrypted
    on senders machine then Sent to BunkerMail.
    Files are downloaded to receivers machine, then decrypted using his unique keys.
    Each user has unique keys which are stored on their computer
    End-to-End Encryption
  • 5. BunkerMail advantages
    Every message and attachment have Unique AES keys for encryption
    AES keys are sent to receiver encrypted with receiver’s RSA public key
    Information is controlled by RSA keys held by end users on their machines