SlideShare a Scribd company logo
Encryption Techniques
What is Encryption?
Encryption
In cryptography, encryption is the process of encoding information.
This process converts the original representation of the information,
known as plaintext, into an alternative form known as ciphertext.
Cryptography
Cryptography is a method of protecting information and
communications through the use of codes, so that only those for
whom the information is intended can read and process it.
Why encryption is need
◇It helps protect private information, sensitive data, and can
enhance the security of communication between client and
servers.
◇In essence, when your data is encrypted, even if an unauthorized
person or entity gains access to it, they will not be able to read it.
◇ Privacy. Encryption guarantees that no one can read messages
or access data except the legitimate recipient or data owner.
This measure prevents cybercriminals, hackers, internet service
providers, spammers, and even government institutions from
accessing and reading personal data.
◇ Security. Encryption helps protect information from data
breaches, whether the data is at rest or in transit.
◇ Authentication. Public key encryption proves that a website's
origin server owns the private key and thus was legitimately
assigned an SSL certificate.
◇ Symmetric Encryption (Secret Key)
In symmetric-key schemes, the encryption and decryption keys are the same.
Communicating parties must have the same key in order to achieve secure
communication.
◇ Asymmetric Encryption (Public Key)
In public-key encryption schemes, the encryption key is published for anyone to
use and for encrypting messages. Only the receiving party has access to the
decryption key that enables messages to be read.
Encryption types
DES Encryption
DES(Data Encryption Standard) is a block
Cipher, which means that it takes a fixed-
length string of plaintext bits and transforms it
through a series of complicated operations.
This fixed-length of plaintext is of 64-bits, and
the key which is the same for both encryption
and decryption is also of 64-bits.
The Feistel structure, it is a design model from
which various block Ciphers are derived. DES
is one such block Cipher. A cryptographic
system based on a Feistel model uses the
same algorithm for both encryption and
decryption. The Feistel model takes 64 bits of
plaintext and divides it into halves, L and R of
32 bits each. R₂ is calculated as L⊕ƒ(R, Key)
and L₂ is the same as R.
Triple DES Encryption
Triple Data Encryption Algorithm or Triple-DES uses symmetric encryption. It is an
advanced version of DES block cipher, which used to have a 56-bit key. However, and
as the name suggests, TDES encrypts data using 56-bit key thrice, making it a 168-bit
key.
It works in three phases when encrypting the data:
■ encrypt
■ decrypt
■ re-encrypt
Likewise, the decryption phases would be:
■ decrypt
■ encrypt
■ decrypt again
AES (Advanced Encryption Standards) is the successor of DES and trusted as the
standard by the United States government and various organizations. Low RAM
requirement and high speed were the main reason it was selected to hide top-secret
information. The algorithm can perform well on a wide range of hardware, from 8-bit
smart cards to high-performance processors.
AES is extremely efficient in 128-bit form, it also uses keys of 192 and 256 bits for heavy
security. It has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for
256-bit keys. The same key is used for both encryption and decryption of data.
No practical attacks against AES have been discovered. It is used in many different
protocols and transmission technologies, such as WPA2 protection of WiFi network,
Voice-over-IP technology, etc.
AES Encryption
AES Encryption
RSA (Rivest–Shamir–Adleman) is a public-key encryption algorithm and the standard for encrypting
data sent over the internet. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir,
and Leonard Adleman. It also happens to be one of the methods used in PGP(Pretty Good Privacy)
and GPG(GNU Privacy Guard) programs.
Unlike Triple DES, RSA is considered an asymmetric encryption algorithm because it uses a pair of
keys. The public key is used to encrypt a message and a private key to decrypt it. It takes attackers
quite a bit of time and processing power to break this encryption code.
RSA Encryption
RSA Encryption
Computer security expert Bruce Schneier is the mastermind behind Blowfish
and its successor Twofish. Keys used in this algorithm may be up to 256 bits in
length and as a symmetric technique, only one key is needed.
Twofish is regarded as one of the fastest of its kind, and ideal for use in both
hardware and software environments. Like Blowfish, Twofish is freely available
to anyone who wants to use it. As a result, you’ll find it bundled in encryption
programs such as PhotoEncrypt, GPG, and the popular open source software
TrueCrypt.
Twofish Encryption
Blowfish is yet another algorithm
designed to replace DES. This symmetric
cipher splits messages into blocks of 64
bits and encrypts them individually.
Blowfish is known for both its tremendous
speed and overall effectiveness as many
claim that it has never been defeated.
Meanwhile, vendors have taken full
advantage of its free availability in the
public domain.
Blowfish can be found in software
categories ranging from e-commerce
platforms for securing payments to
password management tools, where it
used to protect passwords. It’s definitely
one of the more flexible encryption
methods available.
Blowfish encryption
IDEA Encryption
IDEA (International Data Encryption Algorithm) is an encryption algorithm
developed at ETH(public research university) in Zurich, Switzerland. It uses a
block cipher with a 128-bit key, and is generally considered to be very
secure. It is considered among the best publicly known algorithms.
In the several years that it has been in use, no practical attacks on it have
been published despite of a number of attempts to find some. IDEA is
patented in the United States and in most of the European countries. The
patent is held by Ascom-Tech. Non-commercial use of IDEA is free.
MD5 Encryption
Hashing is generating a value or values from a string of text using a
mathematical function.
Hashing is one way to enable security during the process of message
transmission when the message is intended for a particular recipient only. A
formula generates the hash, which helps to protect the security of the
transmission against tampering.
FPE Encryption
Format Preserving Encryption (FPE) is a fairly new encryption method. It
encrypts your data in a similar format. For instance, if you have encrypted
your password having 6 letters, 5 numbers and 4 special letters, then your
output will be a different combination of a similar format.
In other words, if you use this encryption technique, it will preserve the
format of your plain text that is after encryption the structure of your data
will remain the same. example: our 16-digit card number can encrypt to a
16-digit number
It is widely used in financial database systems, banking systems, retail, etc.
Encryption Key in
Magento
Magento uses an encryption key to protect passwords and other sensitive
data. An industry-standard Advanced Encryption Standard (AES-256)
algorithm is used to encrypt all data that requires decryption. This includes
credit card data and integration (payment and shipping module) passwords.
In addition, a strong Secure Hash Algorithm (SHA-256) is used to hash all
data that does not require decryption.
During the initial installation, you are prompted to either let Magento
generate an encryption key, or enter one of your own. The Encryption Key
tool allows you to change the key as needed. The encryption key should be
changed on a regular basis to improve security, as well as at any time the
original key might be compromised. Whenever the key is changed, all legacy
data is re-encoded using the new key.
Step 1: Make the File Writable
◇ To change the encryption key, make sure that the following file is
writable: [your store]/app/etc/env.php
Step 2: Change the Encryption Key
◇ On the Admin sidebar, go to System > Other Settings > Manage
Encryption Key.
◇ Do one of the following:
■ To generate a new key, set Auto-generate Key to Yes.
■ To use a different key, set Auto-generate Key to No. Then in the
New Key field, enter or paste the key that you want to use.
◇ Click Change Encryption Key.
◇ Keep a record of the new key in a secure location.
◇ It will be required to decrypt the data, if any problems occur with your
files.
The Future of
Encryption
Cyber attacks are constantly evolving, so security specialists must stay busy
in the lab concocting new schemes to keep them at bay.
Expert observers are hopeful that a new method called Honey Encryption
will deter hackers by serving up fake data for every incorrect guess of the
key code. This unique approach not only slows attackers down, but
potentially buries the correct key in a haystack of false hopes.

More Related Content

What's hot

Encryption
EncryptionEncryption
Encryption
keith dias
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
reshmy12
 
Encryption
EncryptionEncryption
Encryption
Jasleen Khalsa
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
farazvirk554
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
ramya marichamy
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
RajaKrishnan M
 

What's hot (20)

Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Encryption
EncryptionEncryption
Encryption
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
cryptography
cryptographycryptography
cryptography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
 

Similar to Encryption techniques

A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
 
Data encryption
Data encryptionData encryption
Data encryption
Aman Jain
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
jibonjibon5
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
Hussain Almohammadi
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
Luisa Francisco
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 

Similar to Encryption techniques (20)

A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 

More from ShrikantSharma86

Various aspects of organizational behavior
Various aspects of organizational behaviorVarious aspects of organizational behavior
Various aspects of organizational behavior
ShrikantSharma86
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
ShrikantSharma86
 
Parsing
ParsingParsing
Industrial pollution
Industrial  pollutionIndustrial  pollution
Industrial pollution
ShrikantSharma86
 
Ethics in Human Resource Management (HRM) of an Organisation
Ethics in Human Resource Management (HRM) of an OrganisationEthics in Human Resource Management (HRM) of an Organisation
Ethics in Human Resource Management (HRM) of an Organisation
ShrikantSharma86
 
Library Management System (LMS)
Library Management System (LMS)Library Management System (LMS)
Library Management System (LMS)
ShrikantSharma86
 
RAM (RANDOM ACCESS MEMORY)
RAM (RANDOM ACCESS MEMORY)RAM (RANDOM ACCESS MEMORY)
RAM (RANDOM ACCESS MEMORY)
ShrikantSharma86
 
Online Education
Online EducationOnline Education
Online Education
ShrikantSharma86
 
Electronic Ink Technology
Electronic Ink TechnologyElectronic Ink Technology
Electronic Ink Technology
ShrikantSharma86
 
Audio System Measurements
Audio System MeasurementsAudio System Measurements
Audio System Measurements
ShrikantSharma86
 
Personality
PersonalityPersonality
Personality
ShrikantSharma86
 
Perception
PerceptionPerception
Perception
ShrikantSharma86
 
Organizational culture
Organizational cultureOrganizational culture
Organizational culture
ShrikantSharma86
 
Motivation
MotivationMotivation
Motivation
ShrikantSharma86
 
Leadership
LeadershipLeadership
Leadership
ShrikantSharma86
 
14 principles of management of Henry fayol
14 principles of management of Henry fayol14 principles of management of Henry fayol
14 principles of management of Henry fayol
ShrikantSharma86
 
Report on employee satisfaction
Report on employee satisfactionReport on employee satisfaction
Report on employee satisfaction
ShrikantSharma86
 
Golden ratio and Fibonacci series
Golden ratio and Fibonacci seriesGolden ratio and Fibonacci series
Golden ratio and Fibonacci series
ShrikantSharma86
 

More from ShrikantSharma86 (18)

Various aspects of organizational behavior
Various aspects of organizational behaviorVarious aspects of organizational behavior
Various aspects of organizational behavior
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Parsing
ParsingParsing
Parsing
 
Industrial pollution
Industrial  pollutionIndustrial  pollution
Industrial pollution
 
Ethics in Human Resource Management (HRM) of an Organisation
Ethics in Human Resource Management (HRM) of an OrganisationEthics in Human Resource Management (HRM) of an Organisation
Ethics in Human Resource Management (HRM) of an Organisation
 
Library Management System (LMS)
Library Management System (LMS)Library Management System (LMS)
Library Management System (LMS)
 
RAM (RANDOM ACCESS MEMORY)
RAM (RANDOM ACCESS MEMORY)RAM (RANDOM ACCESS MEMORY)
RAM (RANDOM ACCESS MEMORY)
 
Online Education
Online EducationOnline Education
Online Education
 
Electronic Ink Technology
Electronic Ink TechnologyElectronic Ink Technology
Electronic Ink Technology
 
Audio System Measurements
Audio System MeasurementsAudio System Measurements
Audio System Measurements
 
Personality
PersonalityPersonality
Personality
 
Perception
PerceptionPerception
Perception
 
Organizational culture
Organizational cultureOrganizational culture
Organizational culture
 
Motivation
MotivationMotivation
Motivation
 
Leadership
LeadershipLeadership
Leadership
 
14 principles of management of Henry fayol
14 principles of management of Henry fayol14 principles of management of Henry fayol
14 principles of management of Henry fayol
 
Report on employee satisfaction
Report on employee satisfactionReport on employee satisfaction
Report on employee satisfaction
 
Golden ratio and Fibonacci series
Golden ratio and Fibonacci seriesGolden ratio and Fibonacci series
Golden ratio and Fibonacci series
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Encryption techniques

  • 2. What is Encryption? Encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Cryptography Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.
  • 3. Why encryption is need ◇It helps protect private information, sensitive data, and can enhance the security of communication between client and servers. ◇In essence, when your data is encrypted, even if an unauthorized person or entity gains access to it, they will not be able to read it. ◇ Privacy. Encryption guarantees that no one can read messages or access data except the legitimate recipient or data owner. This measure prevents cybercriminals, hackers, internet service providers, spammers, and even government institutions from accessing and reading personal data. ◇ Security. Encryption helps protect information from data breaches, whether the data is at rest or in transit. ◇ Authentication. Public key encryption proves that a website's origin server owns the private key and thus was legitimately assigned an SSL certificate.
  • 4. ◇ Symmetric Encryption (Secret Key) In symmetric-key schemes, the encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication. ◇ Asymmetric Encryption (Public Key) In public-key encryption schemes, the encryption key is published for anyone to use and for encrypting messages. Only the receiving party has access to the decryption key that enables messages to be read. Encryption types
  • 5. DES Encryption DES(Data Encryption Standard) is a block Cipher, which means that it takes a fixed- length string of plaintext bits and transforms it through a series of complicated operations. This fixed-length of plaintext is of 64-bits, and the key which is the same for both encryption and decryption is also of 64-bits. The Feistel structure, it is a design model from which various block Ciphers are derived. DES is one such block Cipher. A cryptographic system based on a Feistel model uses the same algorithm for both encryption and decryption. The Feistel model takes 64 bits of plaintext and divides it into halves, L and R of 32 bits each. R₂ is calculated as L⊕ƒ(R, Key) and L₂ is the same as R.
  • 6. Triple DES Encryption Triple Data Encryption Algorithm or Triple-DES uses symmetric encryption. It is an advanced version of DES block cipher, which used to have a 56-bit key. However, and as the name suggests, TDES encrypts data using 56-bit key thrice, making it a 168-bit key. It works in three phases when encrypting the data: ■ encrypt ■ decrypt ■ re-encrypt Likewise, the decryption phases would be: ■ decrypt ■ encrypt ■ decrypt again
  • 7.
  • 8. AES (Advanced Encryption Standards) is the successor of DES and trusted as the standard by the United States government and various organizations. Low RAM requirement and high speed were the main reason it was selected to hide top-secret information. The algorithm can perform well on a wide range of hardware, from 8-bit smart cards to high-performance processors. AES is extremely efficient in 128-bit form, it also uses keys of 192 and 256 bits for heavy security. It has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys. The same key is used for both encryption and decryption of data. No practical attacks against AES have been discovered. It is used in many different protocols and transmission technologies, such as WPA2 protection of WiFi network, Voice-over-IP technology, etc. AES Encryption
  • 10. RSA (Rivest–Shamir–Adleman) is a public-key encryption algorithm and the standard for encrypting data sent over the internet. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman. It also happens to be one of the methods used in PGP(Pretty Good Privacy) and GPG(GNU Privacy Guard) programs. Unlike Triple DES, RSA is considered an asymmetric encryption algorithm because it uses a pair of keys. The public key is used to encrypt a message and a private key to decrypt it. It takes attackers quite a bit of time and processing power to break this encryption code. RSA Encryption
  • 12. Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed. Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, you’ll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt. Twofish Encryption
  • 13. Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually. Blowfish is known for both its tremendous speed and overall effectiveness as many claim that it has never been defeated. Meanwhile, vendors have taken full advantage of its free availability in the public domain. Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. It’s definitely one of the more flexible encryption methods available. Blowfish encryption
  • 14. IDEA Encryption IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH(public research university) in Zurich, Switzerland. It uses a block cipher with a 128-bit key, and is generally considered to be very secure. It is considered among the best publicly known algorithms. In the several years that it has been in use, no practical attacks on it have been published despite of a number of attempts to find some. IDEA is patented in the United States and in most of the European countries. The patent is held by Ascom-Tech. Non-commercial use of IDEA is free.
  • 15. MD5 Encryption Hashing is generating a value or values from a string of text using a mathematical function. Hashing is one way to enable security during the process of message transmission when the message is intended for a particular recipient only. A formula generates the hash, which helps to protect the security of the transmission against tampering.
  • 16. FPE Encryption Format Preserving Encryption (FPE) is a fairly new encryption method. It encrypts your data in a similar format. For instance, if you have encrypted your password having 6 letters, 5 numbers and 4 special letters, then your output will be a different combination of a similar format. In other words, if you use this encryption technique, it will preserve the format of your plain text that is after encryption the structure of your data will remain the same. example: our 16-digit card number can encrypt to a 16-digit number It is widely used in financial database systems, banking systems, retail, etc.
  • 17. Encryption Key in Magento Magento uses an encryption key to protect passwords and other sensitive data. An industry-standard Advanced Encryption Standard (AES-256) algorithm is used to encrypt all data that requires decryption. This includes credit card data and integration (payment and shipping module) passwords. In addition, a strong Secure Hash Algorithm (SHA-256) is used to hash all data that does not require decryption. During the initial installation, you are prompted to either let Magento generate an encryption key, or enter one of your own. The Encryption Key tool allows you to change the key as needed. The encryption key should be changed on a regular basis to improve security, as well as at any time the original key might be compromised. Whenever the key is changed, all legacy data is re-encoded using the new key.
  • 18. Step 1: Make the File Writable ◇ To change the encryption key, make sure that the following file is writable: [your store]/app/etc/env.php Step 2: Change the Encryption Key ◇ On the Admin sidebar, go to System > Other Settings > Manage Encryption Key. ◇ Do one of the following: ■ To generate a new key, set Auto-generate Key to Yes. ■ To use a different key, set Auto-generate Key to No. Then in the New Key field, enter or paste the key that you want to use. ◇ Click Change Encryption Key. ◇ Keep a record of the new key in a secure location. ◇ It will be required to decrypt the data, if any problems occur with your files.
  • 19. The Future of Encryption Cyber attacks are constantly evolving, so security specialists must stay busy in the lab concocting new schemes to keep them at bay. Expert observers are hopeful that a new method called Honey Encryption will deter hackers by serving up fake data for every incorrect guess of the key code. This unique approach not only slows attackers down, but potentially buries the correct key in a haystack of false hopes.