You are on page 1of 5

Data Encryption

Computer encryption is based on the science of


cryptography, which has been used throughout
history.

The existence of coded messages has been


verified as far back as the Roman Empire. But
most forms of cryptography these days rely on
computers, simply because a human-based
code is too easy for a computer to crack.
Cyptography
Definition :-

Cryptography is a discipline of mathematics concerned with


information security and related issues, particularly encryption,
authentication, and access control. Its purpose is to hide the
meaning of a message rather than its existence.

cryptography :-
o concerned solely with message confidentiality (encryption)—
conversion of messages from a comprehensible form into an
incomprehensible one and back again at the other end

o thus rendering it unreadable without secret knowledge (namely, the


key).
Most computer encryption systems belong in one of two categories:

1.Symmetric-key encryption ( Private-key encryption )


2.Asymmetric-key encryption ( Public-key encryption )

 Symmetric-key encryption

-> Each computer has a secret key (code) that it can use to encrypt a packet of
information before it is sent.

-> We should know which computers will be talking to each other so that you
can install the key on each one.

-> It is essentially the same as a secret code that each of the two computers
must know in order to decode the information

-> The code provides the key to decoding the message.


contd….
-> can be divided into stream ciphers and block ciphers.
-> Stream ciphers encrypt the bits of the message one at a time.
-> Block ciphers take a number of bits and encrypt them as a single unit.

Limitations :-
- The requirement of a shared secret key, with one copy at each end.

- Since keys are subject to potential discovery by a cryptographic adversary, they


need to be changed often and kept secure during distribution and in service.

- requirement to choose, distribute and store keys without error and without loss is
difficult to reliably achieve.

Examples of popular & well-respected symmetric algorithms :


- Twofish, Serpent, AES (aka Rijndael), Blowfish, CAST5, RC4, TDES,
and IDEA
 Asymmetric-key encryption (Private Key Encryption) :-

• uses a combination of a private key and a public key.

• private key is known only to your computer, while the public key is
given by your computer to any computer that wants to communicate
securely with it

• To decode an encrypted message, a computer must use the public


key, provided by the originating computer, and its own private key.

• The sending computer encrypts the document with a


symmetric key, then encrypts the symmetric key with the public
key of the receiving computer. The receiving computer uses its
private key to decode the symmetric key. It then uses the
symmetric key to decode the document