SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Encryption
Technology
By:
Neha Bhambu
Preeti Chawla
1
Introduction
In the era of www and portable pc’s ,electronic
data security is under great threat from prowling
hackers and information stealers.
Information has become so important that it has
achieved the achieved the status of currency.
Encryption is a main tool used by IT geeks to
protect terabytes of data criss – crossing the
information highway .
2
Information Security Requirements : Confidentiality – accessibility of data only to
authorized users.
 Authentication – verification of the identity of
communicating user at the other end.
 Integrity control – allowing the modification of
data only by authorized personnel.

3
TERMINOLOGY
 Cryptography : science of encrypting information to
form a scrambled or randomized text by using
mathematical transformations such that it becomes
indecipherable until it is decrypted.
 Cryptanalysis : process aimed at cracking the
encrypted text either by breaking the algorithm or by
guessing or inferencing the decryption key.
 Brute force attack : process of key spacing the
algorithm by inducing trial of every possible key in
succession until text is deciphered. If the key length is
k bits , then key space is 2^k bits, and for large keys,
even the fastest computer is unable to try out all the
possible combinations in key space .
4
Encryption Model :ENCRYPTION KEY , K

PLAINTEXT

ENCRYPTION

DECRYPTION KEY

DECRYPTION

PLAINTEXT

CIPHERTEXT, C = E k ( PLAINTEXT )






Plaintext : original data or message fed as input.
Ciphertext : scrambled message produced as output.
Encryption : conversion of plaintext to ciphertext.
Decryption : conversion of ciphertext to plaintext.
5
TYPES OF ENCRYPTION
ALGORITHMS :
 Symmetric Key Algorithm : is implemented using
a secret key shared by both sender & reciever for
encryption & decryption respectively .
Shared secret key

PLAINTEXT

ENCRYPTION

CIPHERTEXT

DECRYPTION

PLAINTEXT

6
Asymmetric Key Algorithm
 It implies use of two different keys ,one for
encryption which is made public & the other private
key which serves as the unique decryption key.
PUBLIC KEY

PLAINTEXT

ENCRYPTION

PRIVATE

CIPHERTEXT

KEY

DECRYPTION

7

PLAINTEXT
PREVALENT ENCRYPTION ALGORITHMS
Symmetric Key algorithms –
DES : (DATA ENCRYPTION STANDARD ).
IDEA : (INTERNATIONAL DATA ENCRYPTION ALGORITHM).
BLOWFISH: (LATEST & MOST SECURE).
Asymmetric Key algorithms –
RSA :(RIVEST,SHAMIR,ADLEMAN).
PGP : (PRETTY GOOD PRIVACY).

8
- Relative Strength Comparisons of Encryption

Algorithms -

Type

Security Level

Implementation

Speed

Idea

Military Grade

128 bit Shared
Secret

Fast

Blowfish

Military Grade

256 to 448 bit
Shared Secret

Fastest

DES

Low

40 to 56 bit Shared
Secret

Fast

RSA

Military Grade

2048 bit
Public Key

Very Slow

9
DES Encryption Algorithm :L ( i-1)
LEFT 32 BIT INPUT

R ( i-1)
RIGHT 32 BIT INPUT

L (i-1) EX-OR f (R (i-1) ,Ki )

LEFT 32 BIT OUTPUT
LEFT32 BIT OUTPUT

L ( i )

RIGHT 32 BIT OUTPUT
R ( i )

Plaintext encrypted in blocks of 64 bits ,using 56 bit key and 16
iterations. Initial permutation of 64 bit plaintext block is
followed by iterations .Each iteration involves production of
two 32 bit outputs from two 32 bit inputs.. Left output is a
copy of right output and right output is bitwise EX-OR of left
input , a function of right input and key for this iteration Ki.
After each iteration the two 32 bit halves are swapped. After
final iteration a final permutation or transposition is applied to
get ciphertext block. decryption is done with 10 same key by
the
running steps in reverse order.
RSA ALGORITHM : It is based on a concept of number theory which implies
computational infeasibility of the factorization of large
numbers in real time which increases exponentially with
the geometric growth of numbers.
 Formulation of method by Rivest, Shamir, Adleman :  Choose two large primes, p and q (greater than 10 ^ 100).
 Compute n = p * q and z = (p – 1 ) * (q – 1).
 Choose a number relatively prime to z, and denote it by d.
 Compute e such that e = (1 mod z) / d .
 C = P ^ e (mod n)
P = C ^ d (mod n) where C and P are ciphertext and
plaintext
11
blocks of k bits where k is largest integer such that 2 ^ k < n.
DIGITAL SIGNATURES
A digital signature does not refer to a digitized image of paper signature, but is
created using asymmetric cryptography in which private key is known only to
signer and is used to create digital signature while public key is used to verify
the signature. Message digest is calculated by putting the data through one
way hash function .then the digital signature is created by encrypting this
message digest with sender’s private key. Receiver will be able to ensure that
this document has been signed by that particular person if message digest can
be obtained by using sender’s public key and it matches message digest of
Message sent
message sent along with it.
Message
sent
Hash function

Message digest

Private key of sender

Digital
signature

Received
message
Digital
signature

Hash function

Message
digest

Digital
signature
Digital
signature

Sender’s
public key

12

Message
digest
LATEST ENCRYPTION
TECHNOLOGIES
 Virtual matrix algorithm: The basis of VME is a Virtual Matrix,
a matrix of random binary values which is, in theory, is infinite
in size and therefore contains no redundant values. The data to
be encrypted is compared to the data in the Virtual Matrix.
Once a match is found, a set of pointers that indicate how to
navigate inside the Virtual Matrix is created. That set of pointers
is then further encrypted using dozens of other algorithms using
key. The data sent consists of pointers to locations of the
content of the message within a virtual matrix .
 The key size which can reach up to 1 million bits is not sent ,
but recreated at a remote location from an electronic file
available at both sender and receiver computer .VME
.
encryption results in a statistically even distribution of
13
characters .
QUANTUM CRYPTOGRAPHY
Quantum cryptography is based on the fundamental physical law that
observation by eavesdroppers inevitably affects the quantum system and the
information of the system , making the information incomplete. That is, once
communication content is tapped on the channel, the content itself changes
irreversibly. The eavesdropped content, then, becomes meaningless and the
legitimate recipient can detect the eavesdropper by the change in content. .

14
CONCLUSION
 Better and more secure algorithms are being
developed with a very large key space so that no
computer can bruteforce some encrypted text.
 Encryption applications range from providing secure
email ,authenticating users by digital signatures and
providing credibility through digital certificates.
 Thus as we can see encryption technology which
has great utility in transferring information securely
over networks is an emerging field of research and
new progress is being made day by day.
15

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.pptreshmy12
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 

Was ist angesagt? (20)

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Encryption
EncryptionEncryption
Encryption
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 

Ähnlich wie Encryption Tech Guide for Data Security

Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODVijsrd.com
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Cryptography
CryptographyCryptography
Cryptographyprasham95
 

Ähnlich wie Encryption Tech Guide for Data Security (20)

Cryptography
CryptographyCryptography
Cryptography
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Encryption
EncryptionEncryption
Encryption
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Data encryption
Data encryptionData encryption
Data encryption
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Encryption Tech Guide for Data Security

  • 2. Introduction In the era of www and portable pc’s ,electronic data security is under great threat from prowling hackers and information stealers. Information has become so important that it has achieved the achieved the status of currency. Encryption is a main tool used by IT geeks to protect terabytes of data criss – crossing the information highway . 2
  • 3. Information Security Requirements : Confidentiality – accessibility of data only to authorized users.  Authentication – verification of the identity of communicating user at the other end.  Integrity control – allowing the modification of data only by authorized personnel. 3
  • 4. TERMINOLOGY  Cryptography : science of encrypting information to form a scrambled or randomized text by using mathematical transformations such that it becomes indecipherable until it is decrypted.  Cryptanalysis : process aimed at cracking the encrypted text either by breaking the algorithm or by guessing or inferencing the decryption key.  Brute force attack : process of key spacing the algorithm by inducing trial of every possible key in succession until text is deciphered. If the key length is k bits , then key space is 2^k bits, and for large keys, even the fastest computer is unable to try out all the possible combinations in key space . 4
  • 5. Encryption Model :ENCRYPTION KEY , K PLAINTEXT ENCRYPTION DECRYPTION KEY DECRYPTION PLAINTEXT CIPHERTEXT, C = E k ( PLAINTEXT )     Plaintext : original data or message fed as input. Ciphertext : scrambled message produced as output. Encryption : conversion of plaintext to ciphertext. Decryption : conversion of ciphertext to plaintext. 5
  • 6. TYPES OF ENCRYPTION ALGORITHMS :  Symmetric Key Algorithm : is implemented using a secret key shared by both sender & reciever for encryption & decryption respectively . Shared secret key PLAINTEXT ENCRYPTION CIPHERTEXT DECRYPTION PLAINTEXT 6
  • 7. Asymmetric Key Algorithm  It implies use of two different keys ,one for encryption which is made public & the other private key which serves as the unique decryption key. PUBLIC KEY PLAINTEXT ENCRYPTION PRIVATE CIPHERTEXT KEY DECRYPTION 7 PLAINTEXT
  • 8. PREVALENT ENCRYPTION ALGORITHMS Symmetric Key algorithms – DES : (DATA ENCRYPTION STANDARD ). IDEA : (INTERNATIONAL DATA ENCRYPTION ALGORITHM). BLOWFISH: (LATEST & MOST SECURE). Asymmetric Key algorithms – RSA :(RIVEST,SHAMIR,ADLEMAN). PGP : (PRETTY GOOD PRIVACY). 8
  • 9. - Relative Strength Comparisons of Encryption Algorithms - Type Security Level Implementation Speed Idea Military Grade 128 bit Shared Secret Fast Blowfish Military Grade 256 to 448 bit Shared Secret Fastest DES Low 40 to 56 bit Shared Secret Fast RSA Military Grade 2048 bit Public Key Very Slow 9
  • 10. DES Encryption Algorithm :L ( i-1) LEFT 32 BIT INPUT R ( i-1) RIGHT 32 BIT INPUT L (i-1) EX-OR f (R (i-1) ,Ki ) LEFT 32 BIT OUTPUT LEFT32 BIT OUTPUT L ( i ) RIGHT 32 BIT OUTPUT R ( i ) Plaintext encrypted in blocks of 64 bits ,using 56 bit key and 16 iterations. Initial permutation of 64 bit plaintext block is followed by iterations .Each iteration involves production of two 32 bit outputs from two 32 bit inputs.. Left output is a copy of right output and right output is bitwise EX-OR of left input , a function of right input and key for this iteration Ki. After each iteration the two 32 bit halves are swapped. After final iteration a final permutation or transposition is applied to get ciphertext block. decryption is done with 10 same key by the running steps in reverse order.
  • 11. RSA ALGORITHM : It is based on a concept of number theory which implies computational infeasibility of the factorization of large numbers in real time which increases exponentially with the geometric growth of numbers.  Formulation of method by Rivest, Shamir, Adleman :  Choose two large primes, p and q (greater than 10 ^ 100).  Compute n = p * q and z = (p – 1 ) * (q – 1).  Choose a number relatively prime to z, and denote it by d.  Compute e such that e = (1 mod z) / d .  C = P ^ e (mod n) P = C ^ d (mod n) where C and P are ciphertext and plaintext 11 blocks of k bits where k is largest integer such that 2 ^ k < n.
  • 12. DIGITAL SIGNATURES A digital signature does not refer to a digitized image of paper signature, but is created using asymmetric cryptography in which private key is known only to signer and is used to create digital signature while public key is used to verify the signature. Message digest is calculated by putting the data through one way hash function .then the digital signature is created by encrypting this message digest with sender’s private key. Receiver will be able to ensure that this document has been signed by that particular person if message digest can be obtained by using sender’s public key and it matches message digest of Message sent message sent along with it. Message sent Hash function Message digest Private key of sender Digital signature Received message Digital signature Hash function Message digest Digital signature Digital signature Sender’s public key 12 Message digest
  • 13. LATEST ENCRYPTION TECHNOLOGIES  Virtual matrix algorithm: The basis of VME is a Virtual Matrix, a matrix of random binary values which is, in theory, is infinite in size and therefore contains no redundant values. The data to be encrypted is compared to the data in the Virtual Matrix. Once a match is found, a set of pointers that indicate how to navigate inside the Virtual Matrix is created. That set of pointers is then further encrypted using dozens of other algorithms using key. The data sent consists of pointers to locations of the content of the message within a virtual matrix .  The key size which can reach up to 1 million bits is not sent , but recreated at a remote location from an electronic file available at both sender and receiver computer .VME . encryption results in a statistically even distribution of 13 characters .
  • 14. QUANTUM CRYPTOGRAPHY Quantum cryptography is based on the fundamental physical law that observation by eavesdroppers inevitably affects the quantum system and the information of the system , making the information incomplete. That is, once communication content is tapped on the channel, the content itself changes irreversibly. The eavesdropped content, then, becomes meaningless and the legitimate recipient can detect the eavesdropper by the change in content. . 14
  • 15. CONCLUSION  Better and more secure algorithms are being developed with a very large key space so that no computer can bruteforce some encrypted text.  Encryption applications range from providing secure email ,authenticating users by digital signatures and providing credibility through digital certificates.  Thus as we can see encryption technology which has great utility in transferring information securely over networks is an emerging field of research and new progress is being made day by day. 15