In: Computer Science
Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word
Abstract
In network communication system, exchange of data mostly occurs on
networked computers and devices, mobile phones and other internet
based smart electronic gadgets. Importance of network security is
increasing day by day for various network and software applications
in human life. Many of the human activities are automatic and in
future more areas will come as part of networking system. So most
of the end-devices will come to the internet and connect, it is
important to ensure the security of data being transmitted. The
data and network encryption algorithms play a huge role to ensure
the security of data in transmission. In this paper, we provide a
theoretical overview of various encryption techniques, namely those
that range from changes in the position of a letter or word to word
transformations and transposition. These not only provide security
when sending messages, but also security for passwords that are
used to decipher and to encrypt. The conclusions in this study
examine the current theoretical framework,
and propose the usage of methods to prevent online security
breaches
Introduction
Encryption simply means the translation of data blocks into a
secret code which is considered the most effective way to ensure
data security. To read a secret file one must have access to a
secret key that enables to decrypt it. Unsecured data where no
encryption algorithms were used travels through different networks
are open to many types of attacks and can be read, changed or
forged by any attacker who has access to that data or network. To
prevent such attacks encryption and decryption techniques are
employed. Encryption algorithms are used by many software and
network applications, but most of them are not free from
cyber-attacks. Now a days encryption techniques uses algorithms
with a “key” to encrypt data into digital secret code and then
decrypting it by restoring it to its original data. It is important
to protect things like biometric information, email data, medical
records, corporate information, personal data, legal documents,
transactions details from unauthorized access. Encryption
techniques uses a fixed length parameter or key for data
transformation. There are mainly two types of algorithms used to
encrypt data, asymmetric encryption and symmetric encryption. Many
research and analysis of different encryption algorithms such as
DES, 3DES, AES, Blowfish, Twofish, Serpent, RC2, RC5, are going on
which helps to identify the pros and cons of algorithms in various
platforms and application areas. Today's most widely used
encryption algorithms fall into two categories: symmetric and
asymmetric. Symmetric-key ciphers, also referred to as "secret
key," use a single key, sometimes referred to as a shared secret
because the system doing the encryption must share it with any
entity it intends to be able to decrypt the encrypted data. The
most widely used symmetric-key cipher is the Advanced Encryption
Standard (AES), which was designed to protect government
classified information.
Symmetric-key encryption is usually much faster than asymmetric
encryption, but the sender must exchange the key used to encrypt
the data with the recipient before the recipient can perform
decryption on the cipher text. The need to securely distribute and
manage large numbers of keys means most cryptographic processes use
a symmetric algorithm to efficiently encrypt data, but they use an
asymmetric algorithm to securely exchange the secret key. All
securely transmitted live traffic today is encrypted using
symmetric encryption algorithms for example such as live telephone
conversation, streaming video transmission, high speed data link.
Blowfish, AES, RC4,DES, RC5, and RC6 are examples of symmetric
encryption. The most widely used symmetric algorithm is AES-128,
AES-192, and AES-256. In asymmetric key encryption, different keys
are used for encrypting and decrypting a message. Asymmetric
cryptography, also known as public key cryptography, uses two
different but mathematically linked keys, one public and one
private. The public key can be shared with everyone, whereas the
private key must be kept secret. The RSA encryption algorithm is
the most widely used public key algorithm, partly because both the
public and the private keys can encrypt a message; the opposite key
from the one used to encrypt a message is used to decrypt it. This
Attribute provides a method of assuring not only confidentiality,
but also the integrity, authenticity and non reputability of
electronic communications and data at rest through the use of
digital signatures. Diffie-Hellman, RSA, ECC, ElGamal, DSA. The
following are the major asymmetric encryption algorithms used for
encrypting or digitally signing data.
This research paper states about various encryption technique
that can be used to protect data from malicious attacks.
As we know that in today's world every device has been connected to
each other through network. Internet is the largest network that we
have as of now. All the communication takes place through this
network which means every message as well as crucial data will have
to pass through this network. This raises the security concerns as
data today is of utmost importance to everyone.
This gave birth to various encryption algorithms that can be used
to protect our data. This paper is used to provide an overview of
various such algorithms and encryption techniques.
First of all encryption simply means transforming our plain text into a secret code that can only be understood by the desired receiver. This is considered to be the most effective way to ensure data security. When we send a plain text to the receiver through a network, it can be easily intercepted in between by a malicious attacker and then he can easily read the message, change the text for his own good etc. There any crucial data should always be sent in encrypted format. Here crucial data may include things like bio metric information, email data, medical records, corporate information, personal data, legal documents, transactions details from unauthorized access.
These days encryption techniques uses algorithm that uses a fixed length parameter or key that is used by the sender to encrypt plain text and by receiver to decrypt the encrypted data to get back the plain text.
These algorithms can mainly be classified into two types:
1) Symmetric Encryption
2) Asymmetric Encryption
Each of these algorithms have their own pros and cons and research is still going on till date. So any algorithm should be chosen according to the requirement.
Symmetric
Algorithm:
These algorithms are also referred to as shared secret-key
encryption. In these algorithm both sender and receiver use only a
single key to encrypt as well as decrypt the data respectively.
This mechanism can be well understood by relating to a lock-key
mechanism. Because we use the same key to lock and unlock the lock
system. Since both sender sender and receiver should use same key
therefore the key should be known to both of them(in other word
shared among them).
For example, Advanced Encryption Standard (AES) is the most widely
used symmetric key cipher, which was designed to protect government
classified information .Blowfish, AES, RC4,DES, RC5, and RC6 are
other such examples of symmetric encryption. All securely
transmitted live traffic today is encrypted using symmetric
encryption algorithms for example such as live telephone
conversation, streaming video transmission, high speed data
link.
Symmetric-key encryption is usually much faster than asymmetric
encryption, but the sender must exchange the key used to encrypt
the data with the recipient before the recipient can perform
decryption on the cipher text.
Asymmetric
Algorithm:
In these algorithms, we use two different keys for for encrypting
and decrypting the message. This key pair is generated using a
specific mathematical computation, which means the two keys are
mathematically linked to each other. Any one of these keys can be
made a public key and the other is called a private key. Public key
is shared with everyone so that they can use it to encrypt the data
and send it to owner of that public key. On the other hand private
key is kept as the secret by the owner so that only he can use to
decrypt the encrypted text received by him.
For example, the RSA encryption algorithm is the most widely used
public key algorithm. Diffie-Hellman, RSA, ECC, ElGamal, DSA are
other asymmetric encryption algorithm. The distribution of keys of
symmetric cipher is done by using asymmetric cipher.