0% found this document useful (0 votes)
8 views3 pages

network security

Project report

Uploaded by

priyagowda5542
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

network security

Project report

Uploaded by

priyagowda5542
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

GMIT

1. Introduction
Encryption and secure communication are fundamental components of
modern digital systems, ensuring the confidentiality, integrity, and
authenticity of information exchanged between parties. This report
outlines key concepts, steps, and technologies involved in implementing
encryption and secure communication. In today’s digital age, the importance
of protecting sensitive information cannot be overstated. Encryption and
secure communication form the backbone of modern data security, ensuring
that information remains confidential, authentic, and tamper-proof during
transmission or storage. Encryption, a process of converting plaintext into an
unreadable format, safeguards data from unauthorized access by relying on
cryptographic algorithms and keys.

2. Encryption Basics
2.1 Definition

Encryption is the process of converting plaintext data into cipher text


using an algorithm and a key, making the data unreadable to
unauthorized users.

page
GMIT

2.2 Types of Encryption


 Symmetric Encryption: Uses the same key for encryption and decryption
(e.g., AES). Symmetric encryption is one of the most widely used
encryption methods due to its simplicity and efficiency. It is based on using
the same key for both encryption and decryption of data. This method is
commonly employed in scenarios where performance and speed are critical.

 Asymmetric Encryption: Uses a pair of public and private keys for


encryption and decryption (e.g., RSA). Asymmetric encryption, also known
as public-key cryptography, is a type of encryption that uses a pair of keys
for secure communication. One key is used for encryption (public key) and
the other for decryption (private key). This method solves the key
distribution problem present in symmetric encryption.

 Hashing Encryption: Hashing converts data into a fixed-size hash value or


digest, which is Irreversible. It ensures data Integrity but Is not used for
encrypting data for transmission. Hashing is a cryptographic process that
transforms data into a fixed-length string of characters, known as a hash or
digest. Unlike traditional encryption, hashing is a one-way function,
meaning that the original data cannot be derived from the hash.

 Hybrid Encryption: Combines symmetric and asymmetric encryption to


leverage the strengths of both. Typically, the asymmetric method Is used to
exchange the symmetric key, and symmetric encryption is used for the
actual data encryption.

page
GMIT

2.3 Key Concepts


• Key: A string of data used to encrypt/decrypt information.
• Algorithm: The mathematical formula used for encryption.
• Cipher text: Encrypted data.
• Plaintext: Original data before encryption.

3. Steps for Secure Communication


3.1 Establishing Trust

• Use Public Key Infrastructure (PKI) to generate and manage keys.


• Obtain digital certificates from trusted Certificate Authorities (CAS) to verify
identities.
3.2 Encrypting Data
• Data at Rest: Encrypt files, databases, or storage devices.
• Data in Transit: Use protocols like TLS/SSL to encrypt data transmitted
over networks.
3.3 Key Exchange
• Use secure methods such as the Daffier-Hellman protocol or RSA to
exchange encryption keys.
3.4 Authentication
• Verify the Identity of communicating parties using methods like passwords,
digital certificates, or multi-factor authentication.

page

You might also like