Skip to main content

Encryption


Have you ever wondered when you start a conversation with new person it shows “Message to this chat and call are now secured with end-to-end encryption”. Here what does the encryption mean? If you are like me, who wonder what does it means I am here to clear your doubt.


Encryption:

It is a process of converting readable texts into unreadable form(text) through key which can be use to decrypt the unreadable text into plain text.

What is key?

A key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it encrypts data so that only someone with the right key can decrypt it.

In Computer term unencrypted data is called “Plain text” and encrypted data is called “Cipher text” and the formula used to encode and decode the text is called “Cipher”.And the science of encryption and decryption of information is called “Cryptography”.

Why is data encryption necessary?

Privacy: Encryption ensures that no one can read communications or data except the intended recipient or proper data owner. This prevents cyber criminals, ad networks, Internet service providers, and in some cases governments from intercepting and reading sensitive data.

Security: Encryption helps data breaches, whether the data is in transit or at rest. If a corporate device is lost or stolen and its hard drive is properly encrypted, the data on that device will likely still be secure. Similarly, encrypted communications enable the communicating parties to exchange sensitive data without leaking the data. Encryption also helps prevent malicious behavior such as man-in-the-middle attacks.

Authentication: Public key encryption, among other things, establishes that a website's origin server owns the private key and therefore was legitimately issued an SSL certificate (see What is public key encryption? to learn more).

Types of encryption:
1.Symmetric cipher
2.Asymmetric cipher

1.Symmetric cipher use only one key which does the both works encode as well as decode the text. The key is sometime referred as shared secret key because the same is use in encryption and the same key is public provide to the authorized user. The most widely use symmetric cipher is Advanced encryption standard (AES). Symmetric encryption is usually much faster than Asymmetric encryption.

2. Asymmetric cipher uses two keys in which any one can be used to encode the text and the other key can decrypt the text.

Note: The key which encode the text can be use to decode the text.
This type of often use prime numbers to create keys since it is computationally difficult to factor large prime numbers and reverse engineer the encryption. The RSA(Rivest-Shamir-Adieman) is most commonly used algorithm.





Comments

Popular posts from this blog

Hustle

The innate hunger to build,create,do something & try. Hustle isn't just working on the things you like,it means doing the things you don't enjoy so you can do the things you love. Hustle:The ability to make things happen in light of knowing,how to get there ,but operate with the general principle that action breed results. Hustle stands for: H - How U - U  S -  Survive T -  The L - life  E - Everyday Some days I'm Humble. Some days I  Struggle. But everyday I Hustle. Remember Every Boss started as a worker.

TCP Segment

A TCP segment is made up of a TCP header and a data section. Source Port :  A source port is a high numbered port chosen from a special section of ports known as ephemeral ports. A source port is needed so that when the web server replies, the computer making the original request can send this data to the program that was actually requesting it. It is in this way that when it web server responds to your requests to view a web page that this response gets received by your web browser and not your word processor. Destination Port : port on which the client in request the data( The destination port is the port of the service the traffic is intended for ) Sequence Number :This is a 32-bit number that's used to keep track of where in a sequence of TCP segments this one is expected to be.There are limits to the total size of what we send across the wire. In Ethernet frame, it's usually limited in size to 1,518 bytes, but we usually need to send way more data than that. At the transp...

Troubleshooting and debugging

Troubleshooting is the process of identifying, analyzing, and solving problems.  Debugging is the process of identifying, analyzing, and removing bugs in a system. We sometimes use troubleshooting and debugging interchangeably.  But generally, we say troubleshooting when we're fixing problems in the system running the application, and debugging when we're fixing the bugs in the actual code of the application. Debuggers let us follow the code line by line, inspect changes in variable assignments, interrupt the program when a specific condition is met, and more. System calls are the calls that the programs running on our computer make to the running kernel.   A reproduction case is a way to verify if the problem is present or not. Where to check for log file in OS? On Linux , you'd read system logs like /var/log/syslog and user-specific logs like the .xsession-errors file located in the user's home directory. On MacOs , on top of the system logs, you'd go through...