How Protect data on the internet by Encryption
Data Encryption, Decryption MD5 128 bit Hashing
Data Encryption-
Data encryption is a conversion of data into a from , called a ciphertext, that cannot be easily understood by unauthorised people. Encryption help you to protect the privacy of your message document and sensitive files.
Data decryption-
description is a process of converting encrypted data back into the original form so it is easily understood and human readable
Symmetric key algorithm and secret key algorithm-
Symmetric key encryption algorithm used a single secret key to encrypt and decrypt data. You must secure the key from access by an unauthorised agents because any party that has the key can use it to decrypt data. secret key encryption is also referred to as symmetric encryption because the same key is used for encryption and decryption.
PGP Algorithm-
Pretty good privacy is an encryption program that provides cryptographic privacy and authentication for data communications. PGP is used for singing , encryption, and decryption texts, email, files , directories, and whole disk partitions and to increase the security of e-mail communications
DES Algorithm-
Data encryption standard was the first inscription standard to be recommended by NIST(National institute of standards and technology) . DES is 64 bit key size bid 64 bit block size. It is a type of symmetric key algorithm. Data encryption standard used a key to customize the transformation, so that description can only be performed by those who now the particular key used to encrypt. The key consists of 64 bit . however, only 56 of these are actually used by the algorithm. 8 bit are used solely for checking parity, and are thereafter discarded.
RSA Algorithm-
Rivest-Shamir-Adleman(RSA) cryptography, both the public and the private key can encrypt a message, the opposite ki from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the most widely used asymmetric algorithm. It provides a method to assure the confidentiality, integrity authenticity, and non-repudiation of electronics communication and data storage.
Asymmetric key algorithm and public key algorithm-
Asymmetric key algorithm is also called public key algorithm. public key cryptography is a fundamental and widely used technology around the world, and enables secure transmission for information on the internet and other communication systems. It is a also know as is symmetric cryptography because the key is used to encrypt a message differ from the one used to decrypt it. In public key cryptography a user has a pair of cryptographic key- a public key and private key. The private key is kept secret, while the public key may be widely distribute and now for any user. Message are are encrypted with the the recipient public key and can only be decrypted with the corresponding private. public key is used to encrypt the plain text and the private key is used to decrypt the ciphertext.
Hashing-
Hash function are extremely useful and appear in almost all information security application.
a hash function is a mathematical function that convert a numerical input value into another compressed in numerical value. The input to the hash function is of arbitrary length but output is always fixed length. Value returned by a hash function are called message digest simple hash values.
MD5(message digest)-
MD5 basti most popular and widely used hash function for quite some years.
- The MD family comprises of hash function MD2,MD4,MD5,and MD6. It is a 128 bit hash function.
- MD5 digest have been widely used in the software world to provide assurance about integrity of transferred file.
SSL(Secure Socket Layer)-
SSL(Secure Socket Layer) provide security to the data that is transferred between web browser and server. SSL include the link between a web server and a browser which ensure that all data passed between then remain private and free from attack.
SSH( Secure Shell)-
SSH, also know as secure shell aur Secure Socket Shell, is a network protocol that gives users, particularly system administrator, a secure way to access a computer over and unsecured network. secure shell provides strong authentication and encrypted data communication between two computers connecting over an open network such as the internet.SSH is widely used by network administrator for managing systems and application remotely allowing then to log into another computer over a network, execute command and move files from one computer to another.
Manojkumar
ReplyDelete