Eccyption And Asymmetric Encryption

1007 Words5 Pages
PUBLIC KEY (ASYMMETRIC) ENCRYPTION Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data. The length of Asymmetric Key Encryption is normally 1024 or 2048 bits. However, in Asymmetric framework the keys with smaller than 2048bits are considered as not safe to use. Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption is used to set up a safe connection among the server and web browser, signing the update for software and encoding the email. To apply extra measures of security lots of encryption operations use both Symmetric and Asymmetric Encryption techniques to protect and secure the communications. The most general example is using of SSL encryption which is used to keep secure and protect while connecting to the mail server from a client and also protects the transaction while shopping online. The downside of Asymmetric Encryption method is to be vulnerable for Man in the Middle Attack. To oppose this issue the keys should be delivered by trusted software or entity. ESCROW KEY This type of encryption key administration is to create an extra key for decoding the data and is kept secure in escrow by an authorised 3rd party. We can also call this as a backup key or split-key. This kind of encryption method is been using to recover the data if a user forgot the password. In July 2015, many of the... ... middle of paper ... ...tandard was announced. In a research it has been estimated that it would take 149 trillion years to crack the Advanced Encryption Standards for a computer with a speed of 255 typing keys /sec. We can encrypt the data much faster with AES compare to Triple-DES. US government switched from DES algorithm to AES algorithm on 26th of May 2002. The importance of AES (Advanced Encryption Standards) it to provide various key sizes from 128 bits to 256 bits and it can be used as a substitute for DES (Data Encryption Standards) that provides key size of 56 bits. Blowfish Blowfish encryption algorithm was invented in 1993 by Bruce Schneier. Its block size is 64 bit and its key length is from 32 bits to 448 bits. It breaks down a message in 64 bits of blocks and then individually encrypts the blocks. Blowfish is available free to use and its available in every public domain.

    More about Eccyption And Asymmetric Encryption

      Open Document