Data encryption

B
Data encryption
 WHAT IS ENCRYPTION :-
 Encryption (Round) (cont.) :-
 HISTORY OF DE :-
 TYPES OF DATA ENCRYPTION :-
 Decryption :-
 Security And Cryptanalysis :-
 KEY OF DATA ENCRYPTION:-
 Encryption is a technique for transforming
information on a computer in such a way that it
becomes unreadable.
 Encryption is the process of obscuring
information to make it unreadable without
special knowledge.
 A secure computing environment would not be
complete without consideration of encryption
technology.
Data encryption
Data encryption
 DEs was the result of research project set up by
International Business Machines (IBM).
 corporation in the late 1960’s which resulted in
a cipher know as LUCIFR in the early it was
decided to commercialise LUCIFER and a
number of significant. Changes were
introduced.
 Published in 1977, standardized in 1979.
 Key: 64 bit quantity=8-bit parity+56-bit key
 In 1971, IBM developed an algorithm, named
which operates on a block of using a key.
 In 1971, IBM developed an algorithm, named
which operates on a block of 64 using a key
 Walter Tuchman, an IBM researcher, refined
LUCIFER and reduced the key size to ,fit on a
chip.
 In 1977, the results of Tuchman’s project of
IBM was adopted as the by NSA (NIST).
 DES (and most of the other major symmetric
cipher) is based on cipher know as the festal
block cipher.
 This was block cipher developed by the IBM
cryptography research Horst feistily in the
early 70’s. it consists of a number rounds
where each round contains bit-suffering, non-
linear substitution (s-boxe) and exclusive or
operation.
 Most symmetric encryption schemes today are
based on this structure knows as a feistily
network.
 Once a plain-text message is received to be
encrypt.
 it is arranged into 64 bit blocks required for
input if the number.
 In this the message of bits in the message is
not evenly dividable by 64 then the last block.
 will be padded multiple permutation and
substitutions are incorporated throughout in
order to increase the difficulty of performing a
cryptanalyst is on the cipher.
 However it is generally accepted that the initial
and final permutation offer title or no
contribution to the security of DES and in fact
some software unit implementation then
although strictly speaking these are not DES as
 Hashing creates a unique, fixed-length
signature for a message or data set.
 Each “hash” is unique to a specific message, so
minor changes to that message would be easy
to track.
 Once data is encrypted using hashing, it cannot
be reversed or deciphered.
 Hashing, then, though not technically an
encryption method as such, is still useful for
proving data hasn’t been tampered with.
 Symmetric encryption is also known as
private-key cryptography, and is called so
because the key used to encrypt and decrypt.
 the message must remain secure, because
anyone with access to it can decrypt the data.
 Using this method, a sender encrypts the data
with one key, sends the data (the cipher text)
and then the receiver uses the key to decrypt
the data.
 Asymmetric encryption, or public-key
cryptography, is different than the previous method
because.
 it uses two keys for encryption or decryption (it has
the potential to sec such).
 With this method, a public key is freely available to
everyone and is used to encrypt messages, and a
different, private key is used by the recipient to
decrypt messages.
 Any of these methods would likely prove sufficient
for proper data security, and a quick Google search
will reveal the multitude of software available for
data encryption.
 .Data encryption is a necessity (both for legal reasons
and otherwise) when transmitting information like
PHI, so no matter what method you choose, make
sure you’re doing everything you can to protect data.
 Asymmetric encryption is most commonly used
to secure physically separate end points.
Examples include:
 Web browser and web server (HTTPS).
 VPN client and server.
 Secure FTP (SSL encrypted connection).
 The same algorithm as encryption. Asymmetric
encryption, or public-key cryptography,.
 Is different than the previous method because it
uses two keys for encryption or decryption (it
has the potential to be more secure as such).
 With this method, a public key is freely
available to everyone and is used to encrypt
messages, and a different, private key is used
by the recipient to decrypt messages.
 . Data encryption is a necessity (both for legal
reasons and otherwise) when transmitting
information like PHI, so no matter what
method you choose, make sure you’re doing
everything you can to protect data.
Data encryption
 Feistily cipher implements Shannon’s S-P
network concept.
based on invertible product cipher
 Process through multiple rounds which
 partitions input block into two halves
 perform a substitution on left data half
 based on round function of right half & sub key
 then have permutation swapping halves
 Feistel cipher implements Shannon’s S-P network
concept
 Achieve diffusion and confusion
Data encryption
 Although more information has been on the
Cryptanalysis of dfs than any other block
cipher while having a theoretical complicity
less than a brute force attack.
 The most practical attack to date is still abrate
foree approach .the length of the key
determines the number of possible.
 Differential cryptanalysis has been proposed
since 1990 to break block cipher such as DES
and while successful for breaking LUCIFER
 A signal round DES encryption let ^x represent the
difference of the two known and chosen plaintexts
x1 and x2
 ^x = x1&
 A mentioned earlier there are two main types
of cryptography in use today secret key or
Private key cryptography and public key
cryptography key cryptography
 the oldest type wheres asymmetric
cryptography is only being used publicly since
the late 1970’s asymmetric.
 The was major milestone in the search for a
perfect encryption scheme.
 There are two types of Key Private Key &
public key.
 Private Key also called as the secret key.
 This cryptography goes back to least encryption
times and is of Concern
 here it involves the use of only one key which is
used for both encryption and decryption (hence the
use of the term symmetries).
 It is necessary for security purpose that the secret
key never be revaluated.
SECRE
T KEY
E{p.k}
D{C,K}
CIPHERTEXT(C)
SECRET
KEY
SECRET KEY
 Private/secret/single key cryptography uses
one key .
 Shared by both sender and receiver.
 If this key is disclosed communications are
compromised .
 Also is symmetric, parties are equal .
 Hence does not protect sender from receiver
forging a message & claiming is sent by sender
 It also referred as a symmetric encryption. It
two gets in that security key private key or yes
and public key.
 Sender user a security key to enciphers
message and sends to receiver when the
recipient get the message .
 he uses public key of sender to descript the
message it is most secure message than
sematic one because sender need not discover
this private key .
A public-key, which may be known by
anybody, and can be used to encrypt
messages, and verify signatures
a private-key, known only to the recipient,
used to decrypt messages, and sign (create)
signatures
Asymmetric because those who encrypt
messages or verify signatures cannot
decrypt messages or create signatures
Probably most significant advance in the
3000 year history of cryptography
 Public-Key algorithms rely on two keys with
the characteristics that it is:
 Computationally infeasible to find decryption
key knowing only algorithm & encryption key
 Computationally easy to en/decrypt messages
when the relevant (en/decrypt) key is known
 Either of the two related keys can be used for
encryption, with the other used for decryption
(in some schemes)
FIG : public key
 William Stallings, Cryptography and
Network Security, 1999.
 https: www.google.com
THANKE YOU
1 von 28

Recomendados

6. cryptography von
6. cryptography6. cryptography
6. cryptography7wounders
5.6K views42 Folien
Information Security Cryptography ( L01- introduction ) von
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
935 views16 Folien
Cryptography von
CryptographyCryptography
Cryptographyamiable_indian
4.7K views31 Folien
Basic Cryptography unit 4 CSS von
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSSURBHI SAROHA
439 views35 Folien
Encryption von
EncryptionEncryption
EncryptionNitin Parbhakar
12.8K views12 Folien
Public key Cryptography & RSA von
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
1.7K views6 Folien

Más contenido relacionado

Was ist angesagt?

Encryption presentation final von
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
34.2K views9 Folien
Cryptography and network security von
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
14.7K views27 Folien
Cryptography von
CryptographyCryptography
CryptographyVicky Kamboj
4.4K views20 Folien
Overview of cryptography von
Overview of cryptographyOverview of cryptography
Overview of cryptographyRoshan Chaudhary
1.1K views17 Folien
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM von
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMsaniacorreya
3.2K views24 Folien
Information and network security 31 public key cryptography von
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
228 views16 Folien

Was ist angesagt?(20)

Encryption presentation final von adrigee12
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee1234.2K views
Cryptography and network security von Nagendra Um
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um14.7K views
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM von saniacorreya
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
saniacorreya3.2K views
Information and network security 31 public key cryptography von Vaibhav Khanna
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna228 views
Data encryption standard von Prasad Prabhu
Data encryption standardData encryption standard
Data encryption standard
Prasad Prabhu5.1K views
Cryptography and Network Security von Pa Van Tanku
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku4.3K views
Cryptography von research30
CryptographyCryptography
Cryptography
research308.4K views
Information Security & Cryptography von Arun ACE
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE5.1K views
Cryptography full report von harpoo123143
Cryptography full reportCryptography full report
Cryptography full report
harpoo12314316.9K views
Cryptography Fundamentals von Duy Do Phan
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan2.4K views
Cryptography.ppt von kusum sharma
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma203.6K views

Destacado

Communication technique von
Communication techniqueCommunication technique
Communication techniquejapEveryday
569 views26 Folien
Asif von
AsifAsif
AsifMohammad Asif
2.4K views20 Folien
Pyramid of Cyber Security von
Pyramid of Cyber SecurityPyramid of Cyber Security
Pyramid of Cyber SecurityJiří Napravnik
1.6K views28 Folien
Cryptography von
Cryptography Cryptography
Cryptography Shankar Ghorpade
543 views11 Folien
Cyber Security von
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
11.1K views22 Folien
Cryptography von
CryptographyCryptography
CryptographyShankar Ghorpade
345 views11 Folien

Destacado(18)

Communication technique von japEveryday
Communication techniqueCommunication technique
Communication technique
japEveryday569 views
Data Encryption and Decryption using Hill Cipher von Aashirwad Kashyap
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap861 views
INDIAN CYBERLAW AND SECURITY von pattok
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok7.4K views
Cyber crime and cyber security von jyoti_lakhani
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani5.9K views
Encryption And Decryption von NA
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA25.3K views
Basic Encryption Decryption Chapter 2 von AfiqEfendy Zaen
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen15K views
Introduction to Cyber Security von Stephen Lahanas
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas47.8K views
Cyber crime and security ppt von Lipsita Behera
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera603.9K views

Similar a Data encryption

International Journal of Engineering Research and Development (IJERD) von
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
249 views7 Folien
A comparative study of symmetric key algorithm des, aes and blowfish for vide... von
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
199 views5 Folien
Computer Security (Cryptography) Ch01 von
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
493 views13 Folien
A Survey on Cryptographic Techniques for Network Security.pdf von
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
6 views4 Folien
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx von
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
2 views18 Folien
Week 12 slide von
Week 12 slideWeek 12 slide
Week 12 slideHaruki0428
93 views6 Folien

Similar a Data encryption(20)

International Journal of Engineering Research and Development (IJERD) von IJERD Editor
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor249 views
A comparative study of symmetric key algorithm des, aes and blowfish for vide... von pankaj kumari
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari199 views
Computer Security (Cryptography) Ch01 von Saif Kassim
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim493 views
A Survey on Cryptographic Techniques for Network Security.pdf von Yasmine Anino
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino6 views
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx von jibonjibon5
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
jibonjibon52 views
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES von Valerie Felton
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton20 views
Analysis of Cryptographic Algorithms for Network Security von Editor IJCATR
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR1.1K views
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx von MohamedNowfeek1
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
MohamedNowfeek127 views
Running Head COMLEX HYBRID SYSTEM2COMPLEX HYBRID SYSTEM2.docx von todd271
Running Head COMLEX HYBRID SYSTEM2COMPLEX HYBRID SYSTEM2.docxRunning Head COMLEX HYBRID SYSTEM2COMPLEX HYBRID SYSTEM2.docx
Running Head COMLEX HYBRID SYSTEM2COMPLEX HYBRID SYSTEM2.docx
todd2713 views
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY von IJNSA Journal
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
IJNSA Journal25 views
Cryptography and security von research30
Cryptography and securityCryptography and security
Cryptography and security
research301K views

Último

State of the Union - Rohit Yadav - Apache CloudStack von
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStackShapeBlue
218 views53 Folien
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
52 views10 Folien
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
50 views69 Folien
Uni Systems for Power Platform.pptx von
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
60 views21 Folien
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
74 views17 Folien
Future of AR - Facebook Presentation von
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook PresentationRob McCarty
54 views27 Folien

Último(20)

State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue52 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue74 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty54 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... von The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue114 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT von ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue138 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue von ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue147 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue172 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue93 views
NTGapps NTG LowCode Platform von Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu287 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue191 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue59 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue63 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 views

Data encryption

  • 2.  WHAT IS ENCRYPTION :-  Encryption (Round) (cont.) :-  HISTORY OF DE :-  TYPES OF DATA ENCRYPTION :-  Decryption :-  Security And Cryptanalysis :-  KEY OF DATA ENCRYPTION:-
  • 3.  Encryption is a technique for transforming information on a computer in such a way that it becomes unreadable.  Encryption is the process of obscuring information to make it unreadable without special knowledge.  A secure computing environment would not be complete without consideration of encryption technology.
  • 6.  DEs was the result of research project set up by International Business Machines (IBM).  corporation in the late 1960’s which resulted in a cipher know as LUCIFR in the early it was decided to commercialise LUCIFER and a number of significant. Changes were introduced.  Published in 1977, standardized in 1979.  Key: 64 bit quantity=8-bit parity+56-bit key  In 1971, IBM developed an algorithm, named which operates on a block of using a key.
  • 7.  In 1971, IBM developed an algorithm, named which operates on a block of 64 using a key  Walter Tuchman, an IBM researcher, refined LUCIFER and reduced the key size to ,fit on a chip.  In 1977, the results of Tuchman’s project of IBM was adopted as the by NSA (NIST).
  • 8.  DES (and most of the other major symmetric cipher) is based on cipher know as the festal block cipher.  This was block cipher developed by the IBM cryptography research Horst feistily in the early 70’s. it consists of a number rounds where each round contains bit-suffering, non- linear substitution (s-boxe) and exclusive or operation.  Most symmetric encryption schemes today are based on this structure knows as a feistily network.
  • 9.  Once a plain-text message is received to be encrypt.  it is arranged into 64 bit blocks required for input if the number.  In this the message of bits in the message is not evenly dividable by 64 then the last block.  will be padded multiple permutation and substitutions are incorporated throughout in order to increase the difficulty of performing a cryptanalyst is on the cipher.  However it is generally accepted that the initial and final permutation offer title or no contribution to the security of DES and in fact some software unit implementation then although strictly speaking these are not DES as
  • 10.  Hashing creates a unique, fixed-length signature for a message or data set.  Each “hash” is unique to a specific message, so minor changes to that message would be easy to track.  Once data is encrypted using hashing, it cannot be reversed or deciphered.  Hashing, then, though not technically an encryption method as such, is still useful for proving data hasn’t been tampered with.
  • 11.  Symmetric encryption is also known as private-key cryptography, and is called so because the key used to encrypt and decrypt.  the message must remain secure, because anyone with access to it can decrypt the data.  Using this method, a sender encrypts the data with one key, sends the data (the cipher text) and then the receiver uses the key to decrypt the data.
  • 12.  Asymmetric encryption, or public-key cryptography, is different than the previous method because.  it uses two keys for encryption or decryption (it has the potential to sec such).  With this method, a public key is freely available to everyone and is used to encrypt messages, and a different, private key is used by the recipient to decrypt messages.  Any of these methods would likely prove sufficient for proper data security, and a quick Google search will reveal the multitude of software available for data encryption.
  • 13.  .Data encryption is a necessity (both for legal reasons and otherwise) when transmitting information like PHI, so no matter what method you choose, make sure you’re doing everything you can to protect data.  Asymmetric encryption is most commonly used to secure physically separate end points. Examples include:  Web browser and web server (HTTPS).  VPN client and server.  Secure FTP (SSL encrypted connection).
  • 14.  The same algorithm as encryption. Asymmetric encryption, or public-key cryptography,.  Is different than the previous method because it uses two keys for encryption or decryption (it has the potential to be more secure as such).  With this method, a public key is freely available to everyone and is used to encrypt messages, and a different, private key is used by the recipient to decrypt messages.  . Data encryption is a necessity (both for legal reasons and otherwise) when transmitting information like PHI, so no matter what method you choose, make sure you’re doing everything you can to protect data.
  • 16.  Feistily cipher implements Shannon’s S-P network concept. based on invertible product cipher  Process through multiple rounds which  partitions input block into two halves  perform a substitution on left data half  based on round function of right half & sub key  then have permutation swapping halves  Feistel cipher implements Shannon’s S-P network concept  Achieve diffusion and confusion
  • 18.  Although more information has been on the Cryptanalysis of dfs than any other block cipher while having a theoretical complicity less than a brute force attack.  The most practical attack to date is still abrate foree approach .the length of the key determines the number of possible.  Differential cryptanalysis has been proposed since 1990 to break block cipher such as DES and while successful for breaking LUCIFER
  • 19.  A signal round DES encryption let ^x represent the difference of the two known and chosen plaintexts x1 and x2  ^x = x1&
  • 20.  A mentioned earlier there are two main types of cryptography in use today secret key or Private key cryptography and public key cryptography key cryptography  the oldest type wheres asymmetric cryptography is only being used publicly since the late 1970’s asymmetric.  The was major milestone in the search for a perfect encryption scheme.  There are two types of Key Private Key & public key.
  • 21.  Private Key also called as the secret key.  This cryptography goes back to least encryption times and is of Concern  here it involves the use of only one key which is used for both encryption and decryption (hence the use of the term symmetries).  It is necessary for security purpose that the secret key never be revaluated.
  • 23.  Private/secret/single key cryptography uses one key .  Shared by both sender and receiver.  If this key is disclosed communications are compromised .  Also is symmetric, parties are equal .  Hence does not protect sender from receiver forging a message & claiming is sent by sender
  • 24.  It also referred as a symmetric encryption. It two gets in that security key private key or yes and public key.  Sender user a security key to enciphers message and sends to receiver when the recipient get the message .  he uses public key of sender to descript the message it is most secure message than sematic one because sender need not discover this private key .
  • 25. A public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures Asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures Probably most significant advance in the 3000 year history of cryptography
  • 26.  Public-Key algorithms rely on two keys with the characteristics that it is:  Computationally infeasible to find decryption key knowing only algorithm & encryption key  Computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known  Either of the two related keys can be used for encryption, with the other used for decryption (in some schemes)
  • 28.  William Stallings, Cryptography and Network Security, 1999.  https: www.google.com THANKE YOU