Biology for Computer Engineers Course Handout.pptx
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
1. An Understanding And Perspectives of END
TO END ENCRYPTION
Presented by
Kailasshaji
S7 cse B
1
2. End-to-end encryption is a security measure that ensures the confidentiality and integrity
of data transmitted between two or more parties
It involves encrypting the data at the sender's end and decrypting it at the receiver's
end, making it unreadable to any intermediaries or unauthorized entities who may try to
intercept or access the data during transmission.
End to End Encryption
2
3. PROCESS OF END TO END ENCRYPTION
Encryption: The data is encrypted using a cryptographic algorithm at the sender's device before it is transmitted. This encryption
converts the data into an unreadable format, known as ciphertext.
Transmission: The encrypted data is then transmitted over a network, such as the internet, to the intended recipient. During this
transmission, the data remains encrypted and cannot be understood by anyone who intercepts it.
Decryption: Upon reaching the recipient's device, the encrypted data is decrypted using a corresponding decryption key. This
process converts the ciphertext back into its original readable format, known as plaintext
Key Management: To ensure secure communication, end-to-end encryption requires the use of encryption keys. These keys are
generated and securely exchanged between the sender and recipient. Only the authorized parties possess the necessary keys to
encrypt and decrypt the data.
Security Assurance: End-to-end encryption provides a high level of security by ensuring that the data remains encrypted
throughout the entire transmission process. It protects against eavesdropping, data tampering, and unauthorized access by third
parties.
3
5. CRYPTOGRAPHY
Cryptography is the practice and study of techniques used to secure
communication and data from unauthorized access or modification.
It involves the use of mathematical algorithms and principles to convert plain
text into an unreadable format, known as ciphertext, and vice versa.
The main objectives of cryptography are confidentiality, integrity,
authentication, and non-repudiation.
5
6. 01 Encryption is the process of converting plaintext (readable
data) into ciphertext (unreadable data) using an algorithm
and a secret key. This ensures that even if the ciphertext is
intercepted, it cannot be understood without the
corresponding decryption key.
02 Decryption is the reverse process of encryption. It involves
converting ciphertext back into plaintext using the correct
decryption key. Only authorized parties with the correct
key can decrypt the ciphertext and access the original
data.
Decryption
03 Symmetric cryptography, also known as secret-key
cryptography, uses the same key for both encryption and
decryption. The sender and receiver must share the secret
key securely before communication can take place.
Symmetric Cryptography
04 Asymmetric cryptography, also known as public-key cryptography, uses
a pair of mathematically related keys: a public key for encryption and a
private key for decryption. The public key can be freely shared, while
the private key must be kept secret. This allows for secure
communication without the need to exchange secret keys beforehand.
Asymmetric Cryptography
05 Hash functions are cryptographic algorithms that take an
input (message) and produce a fixed-size output called a
hash value or digest. Hash functions are used to verify the
integrity of data, as even a small change in the input will
result in a completely different hash value.
Hash Functions
06 Cryptography relies on secure key management practices
to ensure the confidentiality and integrity of data. This
includes generating strong keys, securely distributing and
storing them, and regularly updating them to maintain
security.
Key Management
Encryption
6
7. SYMMETRIC ENCRYPTION ALGORITHM
In symmetric Encryption Algorithm a single encryption key is used in the encryption and decryption
process
The Encryption Key is conveyed to the sender and the recepient before the encryption /decription
process
So the Encryption key is vital and its strength is configent on its length
7
9. EXAMPLES OF SYMMETRIC ENCRYPTION
ALGORITHM
RC2
RC5
Advance Encryption Standard
Blowfish
Data Encription Standard (DES)
Hyrid (AES-RSA)
Triple Data Encryption Standard (3DES)
9
10. The Data Encryption Standard (DES) is a symmetric-key block cipher
DES operates on fixed-size blocks of data, and each block is 64 bits long.
The key length in DES is 56 bits
DES was considered secure for many years, but due to advances in computing
power, it is now vulnerable to brute-force attacks
Data Encryption Standard (DES)
10
11. 64-bit plaintext
Initial permutation
Round 1
Round 2
Round 16
Final permutation
64-bit ciphertext
K₁
48-bit
K₂
48-bit
K16
48-bit
Round-key
generator
DES
-56-bit cipher key
Structure of Data Encryption Standard
11
12. Initial key is passed through a permutation function
Round key is produces for 15 round of operation by
Permutation is same for all rounds but different key
the combination of left circular shift and permutation
produced because of the repeated shifts of key bit
12
13. Triple Data Encryption Standard (3DES)
This is a process in through which data is encrypted using 56 bit two keys
Its process follows EDE model , which says data must be sequentially encrypted
twice and decrypted once.
It encrypts using one encryption key, then decrypts using a different encryption
key, and finally encrypts using same encryption key
For encryption, EDE uses only 168-bit out of 192-bits keys
13
14. Advances Encryption Standard (AES)
AES was established as a federal standard by the National Institute of Standards and Technology (NIST)
in 2001
AES is a symmetric-key algorithm
AES supports key lengths of 128, 192, and 256 bits. The security strength of AES is directly related to
the key length, and longer keys provide higher security.
AES uses a substitution-permutation network (SPN) structure.
The decryption process for AES is the inverse of the encryption process.
AES is widely considered secure and has withstood extensive cryptanalysis. Its security is based on the
choice of key length
14
15. No of Rounds
Key size
(in bits)
10 128
12 192
14 256
Advanced Encryption Standard Structure
15
17. Blowfish
Blowfish is a symmetric-key block cipher algorithm that was designed by Bruce Schneier in
1993
It is widely used for encryption and decryption of data. Blowfish operates on 64-bit blocks
and supports key sizes ranging from 32 bits to 448 bits.
It is known for its simplicity, speed, and security
17
18. Assymetric algorithm
In asymmetric encryption algorithms, two types of keys called Private keys and Public Keys, are
utilized.
The recipient’s public key is used to produce a ciphertext from the plaintext.. Then the ciphertext
can only be decrypts using the recipient’s private key
The private key is known by the authorized person only. But the public key is stored in the
public domain for ease of assess
Examples are Digital Signatures, Rivest-Shamir-Adleman (RSA) and so on
18
20. Rivest-Shamir-Adleman (RSA) Algorithm
Invented byRivest-Shamir-Adleman
This is based on number theory, using two prime numbers or mathematical operation to
randomly produce the public and private keys
The public key (which is public) is used for encryption, and the private key (which is private)
is used for decryption
Sender encrypts the communication using public key of the recipient and when the
communication is received, the recipient can decrypt it with its private key
C= M^e mod n
M= C^d mod n
20
21. Hybrid Encryption Algorithm
Hybrid encryption is a blend of symmetric and asymmetric encryption methods
In a hybrid encryption scheme, data is encrypted using a symmetric key algorithm, and the
symmetric key itself is protected by asymmetric encryption
Hybrid encryption is commonly used in various secure communication protocols, including SSL/TLS
for secure web browsing and PGP (Pretty Good Privacy) for secure email communication.
21
22. Methodology
The work proposes to ascertain which cryptographic algorithm is best suited for End-To-
End Encryption security.
By carrying out a performance evaluation analysis on various cryptographic
algorithms; such as 3DES, DES, AES, Blowfish and Hybrid (AES-RSA).
The following performance evaluation parameters such as encryption time, different
key size, CPU utilization, memory consumption rate and overall process time, would be
utilized
22
23. Specify
data to encrypt
or decrypt
DATA PHASE
Generate results
from each
algorithm based
on performance
REPORT PHASE
Select algorithm
to process
encryption or
decryption
ALGORITHM PHASE
Microsoft Excel
Simulation Parameters
Data Phase
Algorithm Phase
Report Phase
23
24. Performance Evaluation Parameters
The performance evaluation parameters used to analysis comparatively the use case cryptographic
algorithms below
Encryption and Decryption Time
Different Key Length (Size)
CPU Utilization Time Period
Memory Consumption Rate
Overall Process Time
24
25. File name File sizes
Text 400, 1500, 2048, 3000 (bytes)
Image 400, 1500, 2048, 3000 (kb)
Audio 26.1(Mb)
SIMULATION IMPLEMENTATION
PyCharm IDE for windows applications was utilized to compile the simulation using the interpreter settings.
And also, to implement the algorithms in python programing language
The packages utilized are Ecryptography PyCryptodome Psutil
The sizes of the input files used are shown in Table below and consists of text, images and audio
25
26. RESULTS OF EXPERIMENT
The results illustrate the effect of varying data sizes and the effect of encryption/decryption mode for each
use case cryptographic algorithms
While the audio file was used to ascertain the memory rate, CPU utilization, and overall process time.
The overall result is transferred to Microsoft excel for more investigation and graphs plotted in Chart 1 –
Chart 8 for each resourced measured
18
29. Discussion of findings
From the experimental results above, advanced encryption standard (AES) performed best in comparison
to other algorithms
But in terms of security, hybrid encryption is more secure combining the speed benefit of AES algorithm
and security and key management benefit of RSA algorithm
29
30. CONCLUSION AND RECOMMENDATION
The research highlights the critical importance of selecting the right cryptographic algorithm for End-To-End Encryption security
While AES is efficient, its limitations in key management led to the exploration of a Hybrid (AES-RSA) approach
The hybrid solution, leveraging the strengths of both AES and RSA, emerged as a more secure and versatile option, especially in
scenarios involving bidirectional communication
The findings emphasize the need for a nuanced understanding of cryptographic algorithms and their implications for secure digital
communication.
30
31. REFERENCES
Ohwo Onome Blaise, Oludele Awodele, Odunayo Yewande, "An Understanding and Perspectives of End-To-End
Encryption", International Research Journal of Engineering and Technology (IRJET), Volume 8, Issue 4, April 2021
Ben Lutkevich, Madelyn Bacon, "What is End-to-End Encryption (E2EE) and How does it work?", Available at:
https://www.techtarget.com
What Is Data Encryption: Types, Algorithms, Techniques and Methods, Available at: https://www.simplilearn.com
RSA Algorithm with example and mod calculation, Available at: https://youtu.be/y5dPfW3I9Aw?si=FYh7NJmoAtqihlLx
31