0% found this document useful (0 votes)
26 views17 pages

Netwirk PDF

The document discusses the importance of cryptographic encryption techniques in data protection during communication, highlighting their role in ensuring confidentiality, integrity, and authenticity. It covers various types of encryption, common threats, and real-world applications, as well as emerging trends like end-to-end encryption and quantum-safe algorithms. The paper emphasizes that strong encryption is essential for secure digital communication in the face of evolving cyber threats.

Uploaded by

Turan Abdullayev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views17 pages

Netwirk PDF

The document discusses the importance of cryptographic encryption techniques in data protection during communication, highlighting their role in ensuring confidentiality, integrity, and authenticity. It covers various types of encryption, common threats, and real-world applications, as well as emerging trends like end-to-end encryption and quantum-safe algorithms. The paper emphasizes that strong encryption is essential for secure digital communication in the face of evolving cyber threats.

Uploaded by

Turan Abdullayev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Data Protection in

Communications
using Cryptographic
Encryption Technique

Created by: Sara Dadashova, Ayan Salmanova, Zehra Abdullayeva


Teacher: Rena Zulfuqarova
Group: 692.24E
Subject: Basics of network
P 1. Data communications
2. Data protection
3. Common threats in data communication

l
4. Cryptography
5. Types of Cryptographic Encryption
6. How Encryption works
7. Real-World Use Cases (https, vpns, pgp)

a 8. Advantages of cryptographic encryption


9. Limitations and challanges
10. Trends

n
11. Articles
12. Summary
13. Conclusion
Data Communications

Data communications refer to the process of transferring


data from one device to another.
This field involves the equipment, software, network
protocols, and methods used for exchanging information.

Main elements:
1. Sender: The device or user that sends the data.
2. Receiver: The device or user that receives the data.
3. Transmission Medium: The physical path through which
the data is transmitted (such as cables, radio waves,
network protocols, etc.).
4. Data: The information being sent and received.
5. Protocol: The agreed set of rules for correctly
transmitting the data.

Example:
• Data communications between computers use protocols
like TCP/IP for reliable transfer of information.
Data
Protection
Data protection refers to the measures and policies put in place to safeguard personal
data and ensure its confidentiality.
This field ensures that data is protected from unauthorized access, alteration,
destruction, and misuse.

Main aspects:
1. Privacy: Ensuring that data is accessed and used only by authorized individuals.
2. Integrity: Ensuring that data remains accurate and unaltered.
3. Availability: Ensuring that data is accessible to authorized users whenever needed.

Methods of data protection:


• Encryption: Encoding data so that only authorized individuals can read it.
• Access control: Defining who can access and use the data.
• Backup: Creating copies of data to prevent loss.

Example:
• Data protection laws ensure that personal information is securely handled and kept
confidential.
Common Threats
In Data
Communication
⚠️Eavesdropping
⚠️Data Modification
⚠️Identity Spoofing
⚠️Denial of Service (DoS)
⚠️Man-in-the-Middle Attack (MITM)
⚠️Session Hijacking
⚠️Replay Attack
⚠️Malware
⚠️Phishing
Cryptography
Cryptography is the science of securing information by
transforming it into a format that unauthorized parties cannot
understand.

Purpose: Protects data confidentiality, integrity,


authentication, and non-repudiation.

Key Concepts:

Encryption: Converting plaintext into ciphertext.


Decryption: Reversing ciphertext back into readable form.
Keys: Secret values used for encryption and decryption.

Real-world Use: Secure communications (e.g., WhatsApp),


online banking, digital signatures, cryptocurrencies.
Types of Cryptographic Encryption
Symmetric Encryption
Same key for encryption and decryption.
Examples: AES, DES, 3DES.
Fast, best for encrypting large amounts of
data.
Asymmetric Encryption
Uses two keys: a public key (encrypt) and a
private key (decrypt).
Examples: RSA, ECC.
Secure key exchange, often used for digital
signatures and secure communication.
Hash Functions
Converts data into a fixed-size hash value.
Examples: SHA-256, MD5.
Used for data integrity, not reversible.
Hybrid Encryption
Combines symmetric and asymmetric
methods.
Example: SSL/TLS protocols.
Best of both worlds: fast and secure.
How Encryption 01 Plaintext: The original readable data (e.g., a
message, file, or password).

works
02 Encryption Algorithm: A mathematical process
that transforms plaintext into scrambled,
unreadable text called ciphertext.

03 Key: A secret value used by the algorithm to


control the encryption and decryption process.

04 Ciphertext: The encrypted, unreadable version


of the data that can only be reversed with the
correct key.

05 Decryption: The process of turning ciphertext


back into readable plaintext using a key.
Real-World Use Cases

🔒 HTTPS (Secure Web Browsing) 🔒 VPNs (Virtual Private Networks) 🔒 PGP (Pretty Good Privacy)
Encrypts communication between browsers Encrypts internet traffic between your device Encrypts emails, files, and messages.
and websites (e.g., online banking, and VPN servers.
shopping). Ensures secure communication and
Provides privacy on public Wi-Fi and authenticates the sender’s identity.
Protects data from eavesdropping and bypasses regional restrictions.
tampering.
Advantages of cryptographic
encryption

Data Data Integrity Authentication Non-Repudiation Privacy


Confidentiality Protection
Ensures information Verifies the identity Provides proof of
Prevents is not altered during of users, devices, origin, preventing Safeguards personal
unauthorized transmission or or systems. denial of and organizational
access to sensitive storage. information against
sending/receiving
information. surveillance.
actions.
Limitations and challanges

⚠️ Key Management Complexity


Safely creating, distributing, and storing keys is difficult.
⚠️ Performance Overhead
Encryption and decryption processes can slow down systems.
⚠️ Vulnerability to Human Error
Poor implementation or weak passwords can compromise security.
⚠️ Potential for Quantum Threats
Future quantum computers could break current encryption methods.
⚠️ Legal and Regulatory Issues
Encryption use is restricted or regulated in some countries.
Trends
1. End-to-End Encryption (E2EE)
• Only sender and receiver can read the data.
• Used in apps like WhatsApp and Signal.

2. Quantum-Safe Cryptography
• New encryption methods resistant to quantum computer attacks.

3. Zero Trust Security Model


• No automatic trust; all users and devices are verified and encrypted.

4. Homomorphic Encryption
• Data is processed without being decrypted.
• Improves data privacy.

5. Lightweight Cryptography
• Fast and low-energy encryption for IoT and small devices.

6. Blockchain-Based Security
• Data is stored securely in encrypted blocks, preventing tampering.

7. Multi-Factor Authentication (MFA) Integration


• Adds extra layers of authentication beyond passwords.

8. AI and Machine Learning in Encryption


• AI improves encryption strength and detects threats faster.
Siemens:
Articles
“One of the most critical components of secure communication is the process of generating encryption keys. The Diffie-
Hellman Key Exchange (DHE) algorithm is widely used to securely generate shared keys between two parties over an
untrusted network. DHE allows two entities to collaboratively create a shared encryption key without ever transmitting
the actual key, ensuring that eavesdroppers cannot intercept it.”

IBM:
Cryptographic algorithms are the mathematical formulas used to encrypt and decrypt data. These algorithms create
secret keys to determine how data is transformed from its original plaintext into ciphertext and vice versa. Some
well-known cryptographic algorithms include RSA (Rivest-Shamir-Adleman), AES (Advanced Encryption Standard) and
ECC (Elliptic Curve Cryptography).
Information
Comissioner’s Office
When implementing encryption it is important to consider four things: choosing the right algorithm, choosing the right
key size, choosing the right software, and keeping the key secure.
Over time, vulnerabilities may be discovered in encryption algorithms that can eventually make them insecure. You
should regularly assess whether your encryption method remains appropriate.
References:

Siemens: IBM ICO


Summary
Cryptographic encryption techniques are essential for protecting
data during communication. They ensure confidentiality,
integrity, and authenticity of information by preventing
unauthorized access and attacks. With the rise of new threats
and technologies, modern trends like end-to-end encryption,
quantum-safe algorithms, and AI-driven security are becoming
increasingly important.
Strong encryption is not just a technical solution — it is a
fundamental requirement for safe and trusted digital
communication in today’s world.
Conclusion

Cryptographic encryption is essential for


protecting data in communication
systems, ensuring privacy and trust. This
paper discussed key methods like
symmetric and asymmetric encryption and
their role in securing digital interactions.
Looking ahead, continued innovation—
especially in areas like quantum-resistant
algorithms—will be crucial to stay ahead of
evolving cyber threats.
Thank you for your
attention!

You might also like