Netwirk PDF
Netwirk PDF
Communications
using Cryptographic
Encryption Technique
l
4. Cryptography
5. Types of Cryptographic Encryption
6. How Encryption works
7. Real-World Use Cases (https, vpns, pgp)
n
11. Articles
12. Summary
13. Conclusion
Data Communications
Main elements:
1. Sender: The device or user that sends the data.
2. Receiver: The device or user that receives the data.
3. Transmission Medium: The physical path through which
the data is transmitted (such as cables, radio waves,
network protocols, etc.).
4. Data: The information being sent and received.
5. Protocol: The agreed set of rules for correctly
transmitting the data.
Example:
• Data communications between computers use protocols
like TCP/IP for reliable transfer of information.
Data
Protection
Data protection refers to the measures and policies put in place to safeguard personal
data and ensure its confidentiality.
This field ensures that data is protected from unauthorized access, alteration,
destruction, and misuse.
Main aspects:
1. Privacy: Ensuring that data is accessed and used only by authorized individuals.
2. Integrity: Ensuring that data remains accurate and unaltered.
3. Availability: Ensuring that data is accessible to authorized users whenever needed.
Example:
• Data protection laws ensure that personal information is securely handled and kept
confidential.
Common Threats
In Data
Communication
⚠️Eavesdropping
⚠️Data Modification
⚠️Identity Spoofing
⚠️Denial of Service (DoS)
⚠️Man-in-the-Middle Attack (MITM)
⚠️Session Hijacking
⚠️Replay Attack
⚠️Malware
⚠️Phishing
Cryptography
Cryptography is the science of securing information by
transforming it into a format that unauthorized parties cannot
understand.
Key Concepts:
works
02 Encryption Algorithm: A mathematical process
that transforms plaintext into scrambled,
unreadable text called ciphertext.
🔒 HTTPS (Secure Web Browsing) 🔒 VPNs (Virtual Private Networks) 🔒 PGP (Pretty Good Privacy)
Encrypts communication between browsers Encrypts internet traffic between your device Encrypts emails, files, and messages.
and websites (e.g., online banking, and VPN servers.
shopping). Ensures secure communication and
Provides privacy on public Wi-Fi and authenticates the sender’s identity.
Protects data from eavesdropping and bypasses regional restrictions.
tampering.
Advantages of cryptographic
encryption
2. Quantum-Safe Cryptography
• New encryption methods resistant to quantum computer attacks.
4. Homomorphic Encryption
• Data is processed without being decrypted.
• Improves data privacy.
5. Lightweight Cryptography
• Fast and low-energy encryption for IoT and small devices.
6. Blockchain-Based Security
• Data is stored securely in encrypted blocks, preventing tampering.
IBM:
Cryptographic algorithms are the mathematical formulas used to encrypt and decrypt data. These algorithms create
secret keys to determine how data is transformed from its original plaintext into ciphertext and vice versa. Some
well-known cryptographic algorithms include RSA (Rivest-Shamir-Adleman), AES (Advanced Encryption Standard) and
ECC (Elliptic Curve Cryptography).
Information
Comissioner’s Office
When implementing encryption it is important to consider four things: choosing the right algorithm, choosing the right
key size, choosing the right software, and keeping the key secure.
Over time, vulnerabilities may be discovered in encryption algorithms that can eventually make them insecure. You
should regularly assess whether your encryption method remains appropriate.
References: