Cryptographic splitting

Cryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.

Comment
enCryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.
Has abstract
enCryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.
Is primary topic of
Cryptographic splitting
Label
enCryptographic splitting
Link from a Wikipage to another Wikipage
AES-256
Category:Data security
Category:Information governance
Cloud computing
Cryptographic hash function
IBM
National Security Agency
Private cloud
Secret sharing
SHA-256
Storage area networks
Unisys
SameAs
2aMSV
Q27628452
Subject
Category:Data security
Category:Information governance
WasDerivedFrom
Cryptographic splitting?oldid=1123294137&ns=0
WikiPageLength
4054
Wikipage page ID
51718327
Wikipage revision ID
1123294137
WikiPageUsesTemplate
Template:Reflist