User:Kzw53/sandbox

About
Null encryption (also referred to as the NULL Encryption Algorithm) is a method that, "does nothing to alter plaintext data" and mixes plaintext with substantial amounts of non-cipher data when other encryption methods may be offered. The term null means to not alter or do nothing, and helps provide two of the three pillars of the CIA Triad: integrity and authentication and provided but confidentiality is not provided. Unlike other ciphers, null encryption allows for nothing to happen to the plaintext data; it is a block cipher who’s origins are unknown. When this method is used, the text is the same before and after encryption which can help with testing and debugging a system. Null encryption is most convenient way to represent encryption without applying it, also referred to as [rfc:2410 ESP_NULL].

In the IPsec Authentication Header, which is known to provide similar encryption services, the data is authenticated within a portion of the packet, along with the in transit portions of the IP header. "ESP_NULL does not include the IP header in calculating the authentication data.  This can be useful in providing IPsec services through non-IP network devices."

Mathematical Definition
Null encryption is represented mathematically through the Identity Function.

Theoretical Applications

 * Using a pattern
 * Moving letters from each word
 * Moving letters to specific positions
 * Placing important letters next to specific characters or punctuations

Security
There is virtually no security when using null encryption because, "...it significantly reduces the protection afforded by a good encryption algorithm, but it also makes fixing the problem extremely difficult." Although, this can be useful when trying to create a decoy cipher. If an attacker is trying to sniff through packets, and find data that is easy to uncover, they will more likely than not look for null encryption. Since humans are the weakest link when it comes to decrypting, they were more likely than not look for easy unencrypted garbage. By distracting them with null encryption, it will mislead an attacker and have them respond to false red flags, and help companies easily detect that there is an intruder within the system.