Cryptographic splitting
Cryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.
- Comment
- enCryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.
- Has abstract
- enCryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.
- Is primary topic of
- Cryptographic splitting
- Label
- enCryptographic splitting
- Link from a Wikipage to another Wikipage
- AES-256
- Category:Data security
- Category:Information governance
- Cloud computing
- Cryptographic hash function
- IBM
- National Security Agency
- Private cloud
- Secret sharing
- SHA-256
- Storage area networks
- Unisys
- SameAs
- 2aMSV
- Q27628452
- Subject
- Category:Data security
- Category:Information governance
- WasDerivedFrom
- Cryptographic splitting?oldid=1123294137&ns=0
- WikiPageLength
- 4054
- Wikipage page ID
- 51718327
- Wikipage revision ID
- 1123294137
- WikiPageUsesTemplate
- Template:Reflist