Uploaded on Jul 11, 2019
Presentation on "All about encryption schemes"
All about encryption schemes
ALL ABOUT
ENCRYPTION SHEMES.
Threatpost
Introduction
Encryption means, Encoding an
information in a secure format so that,
only you can access it.
You can give authorities to person you
want to give access to your information.
Encrypted message is called as plain
text in any Encryption scheme.
javaquery
Applications
Military
Government
Defense system
Scientific projects javaquery
Basic Encryption schemes
Symmetric Key Public key
Symmetric As name suggest in these scheme both
Key the encryption and decryption keys are
symmetric.
When sender send message with some
encryption key, receiver has to put
same key to read the message.
Rapidsslonline.com Enigma Machine is the best example
of symmetric key.
Public As name suggest in these scheme the
encryption keys are open to everyone
Key to secure message.
Decryption keys are different for
every reader.
If you know the decryption key only
then you can access the information.
Other 1. Multiple encryption
Important 2. Substitution cipher
3. Rotor cipher machine
Encryption 4. Brute force attack
Schemes 5. Cold boot attack
6. Encrypted function
Amrita vishwa vidyapitham
1. Multiple encryption
In this type of encryption message
will be encrypted several times.
2. Substitution cipher
In this type of encryption cipher
text is used instead of plaintext.
3. Rotor cipher machine
Electro-mechanical rotor machine
is used for coding and to secure your
data.
4. Brute force attack
Several passwords are used to read
the encrypted message.
5. Cold boot attack
If your important data is lost, you
can use cold boot attack to restore it.
6. Encrypted function
You can encrypted your data with
mobile code.
Comments