SlideShare a Scribd company logo
1 of 20
Encryption
Name: Alamin
Stu Id: 23-92971-2
American International University of Bangladesh (AIUB)
Table Of Content
 Introduction of Encryption.
 Types of Encryption.
 Symmetric Encryption.
 Advanced Encryption Standard (AES).
 Asymmetric Encryption.
 RSAAlgorithm.
 Digital certificate management methods.
 Public key infrastructure (PKI).
 Conclusion
Introduction of Encryption
What is Encryption?
Encryption is a fundamental concept in computer security that involves the transformation of information or data
into a coded form to prevent unauthorized access or interception. The purpose of encryption is to ensure the
confidentiality and integrity of sensitive data as it is transmitted or stored. It is a crucial component in securing
communication channels and protecting information from being accessed by unauthorized parties.
In the process of encryption, the original data, known as plaintext, is transformed using an algorithm and an
encryption key to produce ciphertext. The ciphertext is a scrambled or unreadable version of the original data.
The encryption key is essential for the encryption process, and only individuals with the corresponding
decryption key can revert the ciphertext back to its original plaintext form.
Types of Encryption
There are mainly two types of Encryptions:
Encryption
Symmetric Encryption Asymmetric Encryption
Symmetric Encryption
 Symmetric encryption is a type of encryption where only one key (a secret key) is used to both
encrypt and decrypt electronic data. The entities communicating via symmetric encryption must
exchange the key so that it can be used in the decryption process.
 By using symmetric encryption algorithms, data is "scrambled" so that it can't be understood by
anyone who does not possess the secret key to decrypt it. Once the intended recipient who
possesses the key has the message, the algorithm reverses its action so that the message is returned
to its original readable form. The secret key that the sender and recipient both use could be a
specific password/code or it can be random string of letters or numbers that have been generated
by a secure random number generator (RNG). For banking-grade encryption, the symmetric keys
must be created using an RNG that is certified according to industry standards, such as FIPS 140-
2.
Symmetric Encryption
Disadvantage of Symmetric Encryption
 Key Distribution: One of the significant challenges with symmetric encryption is key distribution.
Since the same key is used for both encryption and decryption, securely sharing the key between
the communicating parties becomes crucial. If an unauthorized party intercepts the key during
distribution, it compromises the security of the entire system.
 Key Management: In addition to distribution, managing and securely storing symmetric keys can
be complex, especially in large-scale systems. As the number of users increases, the challenges
associated with key management also grow. Regularly changing and updating keys to enhance
security adds another layer of complexity.
 Scalability: Symmetric encryption becomes less scalable as the number of users or devices
involved in communication increases. In a scenario where each pair of communicating entities
needs a unique symmetric key, the number of keys grows quadratically with the number of
participants, making key management more challenging.
Advanced Encryption Standard (AES)
Asymmetric Encryption
 Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of
related keys -- one public key and one private key -- to encrypt and decrypt a message and protect
it from unauthorized access or use.
 A public key is a cryptographic key that can be used by any person to encrypt a message so that it
can only be decrypted by the intended recipient with their private key. A private key -- also known
as a secret key -- is shared only with key's initiator.
 When someone wants to send an encrypted message, they can pull the intended recipient's public
key from a public directory and use it to encrypt the message before sending it. The recipient of the
message can then decrypt the message using their related private key.
 If the sender encrypts the message using their private key, the message can be decrypted only using
that sender's public key, thus authenticating the sender. These encryption and decryption processes
happen automatically; users do not need to physically lock and unlock the message.
 Many protocols rely on asymmetric cryptography, including the transport layer security (TLS) and
secure sockets layer (SSL) protocols, which make HTTPS possible.
Asymmetric Encryption
Advantage of Asymmetric Encryption
 Key distribution: Eliminates the need for key exchange.
 Security: Private keys are never sent or disclosed, making it difficult for unauthorized users to
access data.
 Digital signatures: Enables recipients to confirm the origin of a message.
 Authentication: Provides authentication and non-repudiation.
 Key management: Simplifies key management because each party can keep their own private key
secure and share their public key freely.
 Secure key exchange: Allows parties to use each other's public keys to encrypt and share their
symmetric keys.
RSAAlgorithm
 RSA algorithm is an asymmetric cryptography algorithm. Asymmetric actually means that it works
on two different keys i.e. Public Key and Private Key. As the name describes that the Public Key is
given to everyone and the Private key is kept private.
 RSA is invented by Rivest, Shamir and Adleman of MIT.
 It is most widely used for secure data transmission.
 RSA algorithm is known as Public key Cryptography.
 RSA algorithm consists of following steps:
 Key generation.
 Encryption
 Decryption
RSAAlgorithm
 Generating public key:
• Select two prime no's. Suppose P = 53 and Q = 59.
• Now First part of the Public key : n = P*Q = 3127.
• We also need a small exponent say e : But e Must be An integer. Not be a factor of Φ(n), 1<e<Φ(n).
• Our Public key is made of n and e.
 Generating public key:
• We need to calculate Φ(n) : Such that Φ(n) = (P-1)(Q-1) so, Φ(n) = 3016
• Now calculate Private Key, d : d = (k*Φ(n) + 1) / e, for some integer k For k = 2, value of d is 2011.
 Now we are ready with our – Public Key ( n = 3127 and e = 3) and Private Key(d = 2011) Now we will
encrypt “HI”:
• Convert letters to numbers : H = 8 and I = 9
• Thus Encrypted Data, c = (89e)mod * n
• Thus our Encrypted Data comes out to be 1394
• Now we will decrypt 1394 :
• Decrypted Data = (cd)mod * n
• Thus our Encrypted Data comes out to be 89
• 8 = H and I = 9 i.e. "HI".
RSAAlgorithm
 Generating public key:
 Very fast, very simple encryption and verification.
 Easy to implement than elliptical Curve Cryptography.
 Easier to Understand.
 Widely deployed, better industry support.
 Disadvantage:
 Very slow key generation.
 Slow decryption, which is slightly tricky to implement securely.
Digital Certificate Management Methods
 A digital certificate is a file or electronic password that proves the authenticity of a device, server,
or user through the use of cryptography and the public key infrastructure (PKI). Digital certificate
authentication helps organizations ensure that only trusted devices and users can connect to their
networks.
 Digital certificate management plays a crucial role in ensuring the security of digital
communications. There are several methods and standards employed in cryptography for digital
certificate management. Here are some key aspects and methods:
 Public Key Infrastructure (PKI)
 X.509 Standard
 Certificate Signing Request (CSR)
 Revocation
 Key Pair Generation and Storage
 Renewal
 Automated Certificate Management
 Multi-Factor Authentication
 Containerized Environments
Public Key Infrastructure (PKI)
 The Public key infrastructure (PKI) is the set of hardware, software, policies, processes, and
procedures required to create, manage, distribute, use, store, and revoke digital certificates and
public-keys. PKIs are the foundation that enables the use of technologies, such as digital
signatures and encryption, across large user populations. PKIs deliver the elements essential for
a secure and trusted business environment for e-commerce and the growing Internet of Things
(IoT).
 PKIs help establish the identity of people, devices, and services – enabling controlled access to
systems and resources, protection of data, and accountability in transactions. Next generation
business applications are becoming more reliant on PKI technology to guarantee high assurance,
because evolving business models are becoming more dependent on electronic interaction
requiring online authentication and compliance with stricter data security regulations.
 Here are some key components and concepts associated with Public Key Infrastructure:
 Public and Private Keys:
 Each entity in a PKI system has a pair of cryptographic keys: a public key and a private key.
 The public key is shared openly and is used for encryption and verifying digital signatures.
 The private key is kept secret and is used for decryption and creating digital signatures.
Public Key Infrastructure (PKI)
 Here are some key components and concepts associated with Public Key Infrastructure:
 Digital Certificates:
 Digital certificates bind a public key to an individual, device, or service, providing a way to verify
the authenticity of the public key.
 Certificates are issued by trusted entities known as Certificate Authorities (CAs). CAs verify the
identity of the certificate holder before issuing a certificate.
 Certificate Authorities (CAs):
 CAs are trusted third-party organizations responsible for issuing, revoking, and managing digital
certificates.
 Registration Authorities (RAs):
 RAs are entities that work with CAs to verify the identity of individuals or entities before a
certificate is issued.
 Certificate Revocation Lists (CRLs): CRLs are lists maintained by CAs that contain information about
certificates that have been revoked before their expiration date.
 Public and Private Key Infrastructure: The public key infrastructure involves the
distribution and management of public keys and certificates. The private key infrastructure
involves the protection and secure management of private key.
Public Key Infrastructure (PKI)
 Here are some key components and concepts associated with Public Key Infrastructure:
 Digital Signatures: Digital signatures are created using the private key and can be verified
using the corresponding public key. They ensure the authenticity and integrity of digital
messages.
 Secure Sockets Layer (SSL) / Transport Layer Security (TLS): SSL and TLS protocols use
PKI to secure communication over the internet, such as in web browsers for secure
transactions.
Public Key Infrastructure (PKI)
Thank You

More Related Content

Similar to Encryption in Cryptography

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Journals
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSSURBHI SAROHA
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 

Similar to Encryption in Cryptography (20)

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 

Recently uploaded

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 

Recently uploaded (20)

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 

Encryption in Cryptography

  • 1. Encryption Name: Alamin Stu Id: 23-92971-2 American International University of Bangladesh (AIUB)
  • 2. Table Of Content  Introduction of Encryption.  Types of Encryption.  Symmetric Encryption.  Advanced Encryption Standard (AES).  Asymmetric Encryption.  RSAAlgorithm.  Digital certificate management methods.  Public key infrastructure (PKI).  Conclusion
  • 3. Introduction of Encryption What is Encryption? Encryption is a fundamental concept in computer security that involves the transformation of information or data into a coded form to prevent unauthorized access or interception. The purpose of encryption is to ensure the confidentiality and integrity of sensitive data as it is transmitted or stored. It is a crucial component in securing communication channels and protecting information from being accessed by unauthorized parties. In the process of encryption, the original data, known as plaintext, is transformed using an algorithm and an encryption key to produce ciphertext. The ciphertext is a scrambled or unreadable version of the original data. The encryption key is essential for the encryption process, and only individuals with the corresponding decryption key can revert the ciphertext back to its original plaintext form.
  • 4. Types of Encryption There are mainly two types of Encryptions: Encryption Symmetric Encryption Asymmetric Encryption
  • 5. Symmetric Encryption  Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.  By using symmetric encryption algorithms, data is "scrambled" so that it can't be understood by anyone who does not possess the secret key to decrypt it. Once the intended recipient who possesses the key has the message, the algorithm reverses its action so that the message is returned to its original readable form. The secret key that the sender and recipient both use could be a specific password/code or it can be random string of letters or numbers that have been generated by a secure random number generator (RNG). For banking-grade encryption, the symmetric keys must be created using an RNG that is certified according to industry standards, such as FIPS 140- 2.
  • 7. Disadvantage of Symmetric Encryption  Key Distribution: One of the significant challenges with symmetric encryption is key distribution. Since the same key is used for both encryption and decryption, securely sharing the key between the communicating parties becomes crucial. If an unauthorized party intercepts the key during distribution, it compromises the security of the entire system.  Key Management: In addition to distribution, managing and securely storing symmetric keys can be complex, especially in large-scale systems. As the number of users increases, the challenges associated with key management also grow. Regularly changing and updating keys to enhance security adds another layer of complexity.  Scalability: Symmetric encryption becomes less scalable as the number of users or devices involved in communication increases. In a scenario where each pair of communicating entities needs a unique symmetric key, the number of keys grows quadratically with the number of participants, making key management more challenging.
  • 9. Asymmetric Encryption  Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.  A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted by the intended recipient with their private key. A private key -- also known as a secret key -- is shared only with key's initiator.  When someone wants to send an encrypted message, they can pull the intended recipient's public key from a public directory and use it to encrypt the message before sending it. The recipient of the message can then decrypt the message using their related private key.  If the sender encrypts the message using their private key, the message can be decrypted only using that sender's public key, thus authenticating the sender. These encryption and decryption processes happen automatically; users do not need to physically lock and unlock the message.  Many protocols rely on asymmetric cryptography, including the transport layer security (TLS) and secure sockets layer (SSL) protocols, which make HTTPS possible.
  • 11. Advantage of Asymmetric Encryption  Key distribution: Eliminates the need for key exchange.  Security: Private keys are never sent or disclosed, making it difficult for unauthorized users to access data.  Digital signatures: Enables recipients to confirm the origin of a message.  Authentication: Provides authentication and non-repudiation.  Key management: Simplifies key management because each party can keep their own private key secure and share their public key freely.  Secure key exchange: Allows parties to use each other's public keys to encrypt and share their symmetric keys.
  • 12. RSAAlgorithm  RSA algorithm is an asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key. As the name describes that the Public Key is given to everyone and the Private key is kept private.  RSA is invented by Rivest, Shamir and Adleman of MIT.  It is most widely used for secure data transmission.  RSA algorithm is known as Public key Cryptography.  RSA algorithm consists of following steps:  Key generation.  Encryption  Decryption
  • 13. RSAAlgorithm  Generating public key: • Select two prime no's. Suppose P = 53 and Q = 59. • Now First part of the Public key : n = P*Q = 3127. • We also need a small exponent say e : But e Must be An integer. Not be a factor of Φ(n), 1<e<Φ(n). • Our Public key is made of n and e.  Generating public key: • We need to calculate Φ(n) : Such that Φ(n) = (P-1)(Q-1) so, Φ(n) = 3016 • Now calculate Private Key, d : d = (k*Φ(n) + 1) / e, for some integer k For k = 2, value of d is 2011.  Now we are ready with our – Public Key ( n = 3127 and e = 3) and Private Key(d = 2011) Now we will encrypt “HI”: • Convert letters to numbers : H = 8 and I = 9 • Thus Encrypted Data, c = (89e)mod * n • Thus our Encrypted Data comes out to be 1394 • Now we will decrypt 1394 : • Decrypted Data = (cd)mod * n • Thus our Encrypted Data comes out to be 89 • 8 = H and I = 9 i.e. "HI".
  • 14. RSAAlgorithm  Generating public key:  Very fast, very simple encryption and verification.  Easy to implement than elliptical Curve Cryptography.  Easier to Understand.  Widely deployed, better industry support.  Disadvantage:  Very slow key generation.  Slow decryption, which is slightly tricky to implement securely.
  • 15. Digital Certificate Management Methods  A digital certificate is a file or electronic password that proves the authenticity of a device, server, or user through the use of cryptography and the public key infrastructure (PKI). Digital certificate authentication helps organizations ensure that only trusted devices and users can connect to their networks.  Digital certificate management plays a crucial role in ensuring the security of digital communications. There are several methods and standards employed in cryptography for digital certificate management. Here are some key aspects and methods:  Public Key Infrastructure (PKI)  X.509 Standard  Certificate Signing Request (CSR)  Revocation  Key Pair Generation and Storage  Renewal  Automated Certificate Management  Multi-Factor Authentication  Containerized Environments
  • 16. Public Key Infrastructure (PKI)  The Public key infrastructure (PKI) is the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public-keys. PKIs are the foundation that enables the use of technologies, such as digital signatures and encryption, across large user populations. PKIs deliver the elements essential for a secure and trusted business environment for e-commerce and the growing Internet of Things (IoT).  PKIs help establish the identity of people, devices, and services – enabling controlled access to systems and resources, protection of data, and accountability in transactions. Next generation business applications are becoming more reliant on PKI technology to guarantee high assurance, because evolving business models are becoming more dependent on electronic interaction requiring online authentication and compliance with stricter data security regulations.  Here are some key components and concepts associated with Public Key Infrastructure:  Public and Private Keys:  Each entity in a PKI system has a pair of cryptographic keys: a public key and a private key.  The public key is shared openly and is used for encryption and verifying digital signatures.  The private key is kept secret and is used for decryption and creating digital signatures.
  • 17. Public Key Infrastructure (PKI)  Here are some key components and concepts associated with Public Key Infrastructure:  Digital Certificates:  Digital certificates bind a public key to an individual, device, or service, providing a way to verify the authenticity of the public key.  Certificates are issued by trusted entities known as Certificate Authorities (CAs). CAs verify the identity of the certificate holder before issuing a certificate.  Certificate Authorities (CAs):  CAs are trusted third-party organizations responsible for issuing, revoking, and managing digital certificates.  Registration Authorities (RAs):  RAs are entities that work with CAs to verify the identity of individuals or entities before a certificate is issued.  Certificate Revocation Lists (CRLs): CRLs are lists maintained by CAs that contain information about certificates that have been revoked before their expiration date.  Public and Private Key Infrastructure: The public key infrastructure involves the distribution and management of public keys and certificates. The private key infrastructure involves the protection and secure management of private key.
  • 18. Public Key Infrastructure (PKI)  Here are some key components and concepts associated with Public Key Infrastructure:  Digital Signatures: Digital signatures are created using the private key and can be verified using the corresponding public key. They ensure the authenticity and integrity of digital messages.  Secure Sockets Layer (SSL) / Transport Layer Security (TLS): SSL and TLS protocols use PKI to secure communication over the internet, such as in web browsers for secure transactions.