Detection of Transformed Data Leaks using Enhanced Encryption Algorithm
Abstract
Leaking sensitive information into computer systems poses a serious threat to the security of the organization. Statistics show that the lack of proper encryption and communication due to human error is one of the leading causes of data loss. Organizations need tools to identify sensitive data exposure by testing content and storage, that is, to obtain sensitive information that is stored or sent to a specific location. However, finding disclosure of sensitive information is a challenge due to data conversion of content. Modifications (such as installation and removal) lead to unexpected leakage patterns. In this paper, the secure algorithm with double encryption key authentication is used to obtain leaky asymmetric cryptography data, facilitating a guaranteed correlation between the public key (the public part of the asymmetric key pair) and the identity (and / or other attributes) of the corresponding private key holder (private part of that couple), for uses such as verifying the identity of a particular business, verifying the authenticity of information, supporting rejection, and establishing an encrypted communication section