SlideShare a Scribd company logo
1 of 32
Download to read offline
An Understanding And Perspectives of END
TO END ENCRYPTION
Presented by
Kailasshaji
S7 cse B
1
End-to-end encryption is a security measure that ensures the confidentiality and integrity
of data transmitted between two or more parties
It involves encrypting the data at the sender's end and decrypting it at the receiver's
end, making it unreadable to any intermediaries or unauthorized entities who may try to
intercept or access the data during transmission.
End to End Encryption
2
PROCESS OF END TO END ENCRYPTION
Encryption: The data is encrypted using a cryptographic algorithm at the sender's device before it is transmitted. This encryption
converts the data into an unreadable format, known as ciphertext.
Transmission: The encrypted data is then transmitted over a network, such as the internet, to the intended recipient. During this
transmission, the data remains encrypted and cannot be understood by anyone who intercepts it.
Decryption: Upon reaching the recipient's device, the encrypted data is decrypted using a corresponding decryption key. This
process converts the ciphertext back into its original readable format, known as plaintext
Key Management: To ensure secure communication, end-to-end encryption requires the use of encryption keys. These keys are
generated and securely exchanged between the sender and recipient. Only the authorized parties possess the necessary keys to
encrypt and decrypt the data.
Security Assurance: End-to-end encryption provides a high level of security by ensuring that the data remains encrypted
throughout the entire transmission process. It protects against eavesdropping, data tampering, and unauthorized access by third
parties.
3
Cryptographic Algorithms
Advance Encryption Standard (AES}
Blow fish
Data Encryption Standard (DES)
Hybrid (AES - RSA)
Triple Data Encryption Standard (3DES)
4
CRYPTOGRAPHY
Cryptography is the practice and study of techniques used to secure
communication and data from unauthorized access or modification.
It involves the use of mathematical algorithms and principles to convert plain
text into an unreadable format, known as ciphertext, and vice versa.
The main objectives of cryptography are confidentiality, integrity,
authentication, and non-repudiation.
5
01 Encryption is the process of converting plaintext (readable
data) into ciphertext (unreadable data) using an algorithm
and a secret key. This ensures that even if the ciphertext is
intercepted, it cannot be understood without the
corresponding decryption key.
02 Decryption is the reverse process of encryption. It involves
converting ciphertext back into plaintext using the correct
decryption key. Only authorized parties with the correct
key can decrypt the ciphertext and access the original
data.
Decryption
03 Symmetric cryptography, also known as secret-key
cryptography, uses the same key for both encryption and
decryption. The sender and receiver must share the secret
key securely before communication can take place.
Symmetric Cryptography
04 Asymmetric cryptography, also known as public-key cryptography, uses
a pair of mathematically related keys: a public key for encryption and a
private key for decryption. The public key can be freely shared, while
the private key must be kept secret. This allows for secure
communication without the need to exchange secret keys beforehand.
Asymmetric Cryptography
05 Hash functions are cryptographic algorithms that take an
input (message) and produce a fixed-size output called a
hash value or digest. Hash functions are used to verify the
integrity of data, as even a small change in the input will
result in a completely different hash value.
Hash Functions
06 Cryptography relies on secure key management practices
to ensure the confidentiality and integrity of data. This
includes generating strong keys, securely distributing and
storing them, and regularly updating them to maintain
security.
Key Management
Encryption
6
SYMMETRIC ENCRYPTION ALGORITHM
In symmetric Encryption Algorithm a single encryption key is used in the encryption and decryption
process
The Encryption Key is conveyed to the sender and the recepient before the encryption /decription
process
So the Encryption key is vital and its strength is configent on its length
7
8
EXAMPLES OF SYMMETRIC ENCRYPTION
ALGORITHM
RC2
RC5
Advance Encryption Standard
Blowfish
Data Encription Standard (DES)
Hyrid (AES-RSA)
Triple Data Encryption Standard (3DES)
9
The Data Encryption Standard (DES) is a symmetric-key block cipher
DES operates on fixed-size blocks of data, and each block is 64 bits long.
The key length in DES is 56 bits
DES was considered secure for many years, but due to advances in computing
power, it is now vulnerable to brute-force attacks
Data Encryption Standard (DES)
10
64-bit plaintext
Initial permutation
Round 1
Round 2
Round 16
Final permutation
64-bit ciphertext
K₁
48-bit
K₂
48-bit
K16
48-bit
Round-key
generator
DES
-56-bit cipher key
Structure of Data Encryption Standard
11
Initial key is passed through a permutation function
Round key is produces for 15 round of operation by
Permutation is same for all rounds but different key
the combination of left circular shift and permutation
produced because of the repeated shifts of key bit
12
Triple Data Encryption Standard (3DES)
This is a process in through which data is encrypted using 56 bit two keys
Its process follows EDE model , which says data must be sequentially encrypted
twice and decrypted once.
It encrypts using one encryption key, then decrypts using a different encryption
key, and finally encrypts using same encryption key
For encryption, EDE uses only 168-bit out of 192-bits keys
13
Advances Encryption Standard (AES)
AES was established as a federal standard by the National Institute of Standards and Technology (NIST)
in 2001
AES is a symmetric-key algorithm
AES supports key lengths of 128, 192, and 256 bits. The security strength of AES is directly related to
the key length, and longer keys provide higher security.
AES uses a substitution-permutation network (SPN) structure.
The decryption process for AES is the inverse of the encryption process.
AES is widely considered secure and has withstood extensive cryptanalysis. Its security is based on the
choice of key length
14
No of Rounds
Key size
(in bits)
10 128
12 192
14 256
Advanced Encryption Standard Structure
15
AES-128 AES-192 AES-256
Key Size 128 192 256
Plaintext Size 128 128 128
Number of rounds 10 12 14
Round Key Size 128 128 128
Advanced Encryption Standard Parameters
16
Blowfish
Blowfish is a symmetric-key block cipher algorithm that was designed by Bruce Schneier in
1993
It is widely used for encryption and decryption of data. Blowfish operates on 64-bit blocks
and supports key sizes ranging from 32 bits to 448 bits.
It is known for its simplicity, speed, and security
17
Assymetric algorithm
In asymmetric encryption algorithms, two types of keys called Private keys and Public Keys, are
utilized.
The recipient’s public key is used to produce a ciphertext from the plaintext.. Then the ciphertext
can only be decrypts using the recipient’s private key
The private key is known by the authorized person only. But the public key is stored in the
public domain for ease of assess
Examples are Digital Signatures, Rivest-Shamir-Adleman (RSA) and so on
18
Asymmetric Encryption Process
19
Rivest-Shamir-Adleman (RSA) Algorithm
Invented byRivest-Shamir-Adleman
This is based on number theory, using two prime numbers or mathematical operation to
randomly produce the public and private keys
The public key (which is public) is used for encryption, and the private key (which is private)
is used for decryption
Sender encrypts the communication using public key of the recipient and when the
communication is received, the recipient can decrypt it with its private key
C= M^e mod n
M= C^d mod n
20
Hybrid Encryption Algorithm
Hybrid encryption is a blend of symmetric and asymmetric encryption methods
In a hybrid encryption scheme, data is encrypted using a symmetric key algorithm, and the
symmetric key itself is protected by asymmetric encryption
Hybrid encryption is commonly used in various secure communication protocols, including SSL/TLS
for secure web browsing and PGP (Pretty Good Privacy) for secure email communication.
21
Methodology
The work proposes to ascertain which cryptographic algorithm is best suited for End-To-
End Encryption security.
By carrying out a performance evaluation analysis on various cryptographic
algorithms; such as 3DES, DES, AES, Blowfish and Hybrid (AES-RSA).
The following performance evaluation parameters such as encryption time, different
key size, CPU utilization, memory consumption rate and overall process time, would be
utilized
22
Specify
data to encrypt
or decrypt
DATA PHASE
Generate results
from each
algorithm based
on performance
REPORT PHASE
Select algorithm
to process
encryption or
decryption
ALGORITHM PHASE
Microsoft Excel
Simulation Parameters
Data Phase
Algorithm Phase
Report Phase
23
Performance Evaluation Parameters
The performance evaluation parameters used to analysis comparatively the use case cryptographic
algorithms below
Encryption and Decryption Time
Different Key Length (Size)
CPU Utilization Time Period
Memory Consumption Rate
Overall Process Time
24
File name File sizes
Text 400, 1500, 2048, 3000 (bytes)
Image 400, 1500, 2048, 3000 (kb)
Audio 26.1(Mb)
SIMULATION IMPLEMENTATION
PyCharm IDE for windows applications was utilized to compile the simulation using the interpreter settings.
And also, to implement the algorithms in python programing language
The packages utilized are Ecryptography PyCryptodome Psutil
The sizes of the input files used are shown in Table below and consists of text, images and audio
25
RESULTS OF EXPERIMENT
The results illustrate the effect of varying data sizes and the effect of encryption/decryption mode for each
use case cryptographic algorithms
While the audio file was used to ascertain the memory rate, CPU utilization, and overall process time.
The overall result is transferred to Microsoft excel for more investigation and graphs plotted in Chart 1 –
Chart 8 for each resourced measured
18
27
28
Discussion of findings
From the experimental results above, advanced encryption standard (AES) performed best in comparison
to other algorithms
But in terms of security, hybrid encryption is more secure combining the speed benefit of AES algorithm
and security and key management benefit of RSA algorithm
29
CONCLUSION AND RECOMMENDATION
The research highlights the critical importance of selecting the right cryptographic algorithm for End-To-End Encryption security
While AES is efficient, its limitations in key management led to the exploration of a Hybrid (AES-RSA) approach
The hybrid solution, leveraging the strengths of both AES and RSA, emerged as a more secure and versatile option, especially in
scenarios involving bidirectional communication
The findings emphasize the need for a nuanced understanding of cryptographic algorithms and their implications for secure digital
communication.
30
REFERENCES
Ohwo Onome Blaise, Oludele Awodele, Odunayo Yewande, "An Understanding and Perspectives of End-To-End
Encryption", International Research Journal of Engineering and Technology (IRJET), Volume 8, Issue 4, April 2021
Ben Lutkevich, Madelyn Bacon, "What is End-to-End Encryption (E2EE) and How does it work?", Available at:
https://www.techtarget.com
What Is Data Encryption: Types, Algorithms, Techniques and Methods, Available at: https://www.simplilearn.com
RSA Algorithm with example and mod calculation, Available at: https://youtu.be/y5dPfW3I9Aw?si=FYh7NJmoAtqihlLx
31
THANK YOU
32

More Related Content

Similar to An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf

A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 

Similar to An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf (20)

A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cryptography
CryptographyCryptography
Cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Cryptography
CryptographyCryptography
Cryptography
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf

  • 1. An Understanding And Perspectives of END TO END ENCRYPTION Presented by Kailasshaji S7 cse B 1
  • 2. End-to-end encryption is a security measure that ensures the confidentiality and integrity of data transmitted between two or more parties It involves encrypting the data at the sender's end and decrypting it at the receiver's end, making it unreadable to any intermediaries or unauthorized entities who may try to intercept or access the data during transmission. End to End Encryption 2
  • 3. PROCESS OF END TO END ENCRYPTION Encryption: The data is encrypted using a cryptographic algorithm at the sender's device before it is transmitted. This encryption converts the data into an unreadable format, known as ciphertext. Transmission: The encrypted data is then transmitted over a network, such as the internet, to the intended recipient. During this transmission, the data remains encrypted and cannot be understood by anyone who intercepts it. Decryption: Upon reaching the recipient's device, the encrypted data is decrypted using a corresponding decryption key. This process converts the ciphertext back into its original readable format, known as plaintext Key Management: To ensure secure communication, end-to-end encryption requires the use of encryption keys. These keys are generated and securely exchanged between the sender and recipient. Only the authorized parties possess the necessary keys to encrypt and decrypt the data. Security Assurance: End-to-end encryption provides a high level of security by ensuring that the data remains encrypted throughout the entire transmission process. It protects against eavesdropping, data tampering, and unauthorized access by third parties. 3
  • 4. Cryptographic Algorithms Advance Encryption Standard (AES} Blow fish Data Encryption Standard (DES) Hybrid (AES - RSA) Triple Data Encryption Standard (3DES) 4
  • 5. CRYPTOGRAPHY Cryptography is the practice and study of techniques used to secure communication and data from unauthorized access or modification. It involves the use of mathematical algorithms and principles to convert plain text into an unreadable format, known as ciphertext, and vice versa. The main objectives of cryptography are confidentiality, integrity, authentication, and non-repudiation. 5
  • 6. 01 Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) using an algorithm and a secret key. This ensures that even if the ciphertext is intercepted, it cannot be understood without the corresponding decryption key. 02 Decryption is the reverse process of encryption. It involves converting ciphertext back into plaintext using the correct decryption key. Only authorized parties with the correct key can decrypt the ciphertext and access the original data. Decryption 03 Symmetric cryptography, also known as secret-key cryptography, uses the same key for both encryption and decryption. The sender and receiver must share the secret key securely before communication can take place. Symmetric Cryptography 04 Asymmetric cryptography, also known as public-key cryptography, uses a pair of mathematically related keys: a public key for encryption and a private key for decryption. The public key can be freely shared, while the private key must be kept secret. This allows for secure communication without the need to exchange secret keys beforehand. Asymmetric Cryptography 05 Hash functions are cryptographic algorithms that take an input (message) and produce a fixed-size output called a hash value or digest. Hash functions are used to verify the integrity of data, as even a small change in the input will result in a completely different hash value. Hash Functions 06 Cryptography relies on secure key management practices to ensure the confidentiality and integrity of data. This includes generating strong keys, securely distributing and storing them, and regularly updating them to maintain security. Key Management Encryption 6
  • 7. SYMMETRIC ENCRYPTION ALGORITHM In symmetric Encryption Algorithm a single encryption key is used in the encryption and decryption process The Encryption Key is conveyed to the sender and the recepient before the encryption /decription process So the Encryption key is vital and its strength is configent on its length 7
  • 8. 8
  • 9. EXAMPLES OF SYMMETRIC ENCRYPTION ALGORITHM RC2 RC5 Advance Encryption Standard Blowfish Data Encription Standard (DES) Hyrid (AES-RSA) Triple Data Encryption Standard (3DES) 9
  • 10. The Data Encryption Standard (DES) is a symmetric-key block cipher DES operates on fixed-size blocks of data, and each block is 64 bits long. The key length in DES is 56 bits DES was considered secure for many years, but due to advances in computing power, it is now vulnerable to brute-force attacks Data Encryption Standard (DES) 10
  • 11. 64-bit plaintext Initial permutation Round 1 Round 2 Round 16 Final permutation 64-bit ciphertext K₁ 48-bit K₂ 48-bit K16 48-bit Round-key generator DES -56-bit cipher key Structure of Data Encryption Standard 11
  • 12. Initial key is passed through a permutation function Round key is produces for 15 round of operation by Permutation is same for all rounds but different key the combination of left circular shift and permutation produced because of the repeated shifts of key bit 12
  • 13. Triple Data Encryption Standard (3DES) This is a process in through which data is encrypted using 56 bit two keys Its process follows EDE model , which says data must be sequentially encrypted twice and decrypted once. It encrypts using one encryption key, then decrypts using a different encryption key, and finally encrypts using same encryption key For encryption, EDE uses only 168-bit out of 192-bits keys 13
  • 14. Advances Encryption Standard (AES) AES was established as a federal standard by the National Institute of Standards and Technology (NIST) in 2001 AES is a symmetric-key algorithm AES supports key lengths of 128, 192, and 256 bits. The security strength of AES is directly related to the key length, and longer keys provide higher security. AES uses a substitution-permutation network (SPN) structure. The decryption process for AES is the inverse of the encryption process. AES is widely considered secure and has withstood extensive cryptanalysis. Its security is based on the choice of key length 14
  • 15. No of Rounds Key size (in bits) 10 128 12 192 14 256 Advanced Encryption Standard Structure 15
  • 16. AES-128 AES-192 AES-256 Key Size 128 192 256 Plaintext Size 128 128 128 Number of rounds 10 12 14 Round Key Size 128 128 128 Advanced Encryption Standard Parameters 16
  • 17. Blowfish Blowfish is a symmetric-key block cipher algorithm that was designed by Bruce Schneier in 1993 It is widely used for encryption and decryption of data. Blowfish operates on 64-bit blocks and supports key sizes ranging from 32 bits to 448 bits. It is known for its simplicity, speed, and security 17
  • 18. Assymetric algorithm In asymmetric encryption algorithms, two types of keys called Private keys and Public Keys, are utilized. The recipient’s public key is used to produce a ciphertext from the plaintext.. Then the ciphertext can only be decrypts using the recipient’s private key The private key is known by the authorized person only. But the public key is stored in the public domain for ease of assess Examples are Digital Signatures, Rivest-Shamir-Adleman (RSA) and so on 18
  • 20. Rivest-Shamir-Adleman (RSA) Algorithm Invented byRivest-Shamir-Adleman This is based on number theory, using two prime numbers or mathematical operation to randomly produce the public and private keys The public key (which is public) is used for encryption, and the private key (which is private) is used for decryption Sender encrypts the communication using public key of the recipient and when the communication is received, the recipient can decrypt it with its private key C= M^e mod n M= C^d mod n 20
  • 21. Hybrid Encryption Algorithm Hybrid encryption is a blend of symmetric and asymmetric encryption methods In a hybrid encryption scheme, data is encrypted using a symmetric key algorithm, and the symmetric key itself is protected by asymmetric encryption Hybrid encryption is commonly used in various secure communication protocols, including SSL/TLS for secure web browsing and PGP (Pretty Good Privacy) for secure email communication. 21
  • 22. Methodology The work proposes to ascertain which cryptographic algorithm is best suited for End-To- End Encryption security. By carrying out a performance evaluation analysis on various cryptographic algorithms; such as 3DES, DES, AES, Blowfish and Hybrid (AES-RSA). The following performance evaluation parameters such as encryption time, different key size, CPU utilization, memory consumption rate and overall process time, would be utilized 22
  • 23. Specify data to encrypt or decrypt DATA PHASE Generate results from each algorithm based on performance REPORT PHASE Select algorithm to process encryption or decryption ALGORITHM PHASE Microsoft Excel Simulation Parameters Data Phase Algorithm Phase Report Phase 23
  • 24. Performance Evaluation Parameters The performance evaluation parameters used to analysis comparatively the use case cryptographic algorithms below Encryption and Decryption Time Different Key Length (Size) CPU Utilization Time Period Memory Consumption Rate Overall Process Time 24
  • 25. File name File sizes Text 400, 1500, 2048, 3000 (bytes) Image 400, 1500, 2048, 3000 (kb) Audio 26.1(Mb) SIMULATION IMPLEMENTATION PyCharm IDE for windows applications was utilized to compile the simulation using the interpreter settings. And also, to implement the algorithms in python programing language The packages utilized are Ecryptography PyCryptodome Psutil The sizes of the input files used are shown in Table below and consists of text, images and audio 25
  • 26. RESULTS OF EXPERIMENT The results illustrate the effect of varying data sizes and the effect of encryption/decryption mode for each use case cryptographic algorithms While the audio file was used to ascertain the memory rate, CPU utilization, and overall process time. The overall result is transferred to Microsoft excel for more investigation and graphs plotted in Chart 1 – Chart 8 for each resourced measured 18
  • 27. 27
  • 28. 28
  • 29. Discussion of findings From the experimental results above, advanced encryption standard (AES) performed best in comparison to other algorithms But in terms of security, hybrid encryption is more secure combining the speed benefit of AES algorithm and security and key management benefit of RSA algorithm 29
  • 30. CONCLUSION AND RECOMMENDATION The research highlights the critical importance of selecting the right cryptographic algorithm for End-To-End Encryption security While AES is efficient, its limitations in key management led to the exploration of a Hybrid (AES-RSA) approach The hybrid solution, leveraging the strengths of both AES and RSA, emerged as a more secure and versatile option, especially in scenarios involving bidirectional communication The findings emphasize the need for a nuanced understanding of cryptographic algorithms and their implications for secure digital communication. 30
  • 31. REFERENCES Ohwo Onome Blaise, Oludele Awodele, Odunayo Yewande, "An Understanding and Perspectives of End-To-End Encryption", International Research Journal of Engineering and Technology (IRJET), Volume 8, Issue 4, April 2021 Ben Lutkevich, Madelyn Bacon, "What is End-to-End Encryption (E2EE) and How does it work?", Available at: https://www.techtarget.com What Is Data Encryption: Types, Algorithms, Techniques and Methods, Available at: https://www.simplilearn.com RSA Algorithm with example and mod calculation, Available at: https://youtu.be/y5dPfW3I9Aw?si=FYh7NJmoAtqihlLx 31