Skip to main content

Featured post

8 Top AWS services before you learn read today

AWS provides various services. This post gives clear understanding on AWS top services. Not only for traditional services, it also offer services for Mobile  IoS and Android Os.


Aws Service catalog helps organizations to manage their IT services.
List of Top AWS  ServicesEC2LambdaS3DynamoDBIAMAmazon CognitioDevice FarmMobile analyticsSNS AWS EC2 Instance EC2: Amazon Elastic Compute Cloud (EC2) provides secure, scalable, on-demand hardware virtualization in the cloud.
Using Amazon EC2 eliminates the need to invest in server hardware up front so that users can focus on, develop, and deploy applications faster. 
EC2 instances come in various hardware configurations and include an operating system.

Lambda Function in AWS AWS Lambda lets users run snippets of code without provisioning an infrastructure. 
This service is billed on a pay-as-you-go model, with users only paying for the execution time of their lambda code. 
There is no charge when code is not running. Lambda code can be set up to…

8 Popular Encryption methods real Usage

Encryption works as it replaces original data with some special characters and stores the data. You need a private key to decrypt the data. Else it is not possible to understand encrypted data even for hackers.

Private keys are two types. Sender uses one private key and receiver uses one other private key.

I have given in this post about 8 encryption methods.

Flow Diagram Encryption


encryption
image courtesy by digit.in

 Different Encryption Methods

  1. Classic Cipher
  2. Random Key Generation
  3. RSA Token
  4. Hash Functions
  5. Mac value - Message Authentication code
  6. Key Hash
  7. TLS Protocol
  8. Authenticated Cipher

 1. Classic Cipher

The best example is this kind of algorithm was used in world war -II communication machines.

2. Random Key Generations

One kind of security. They use an algorithm that sends random numbers. People use that number as a password.

3. RSA Token

Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password.

4. Hash Functions

It assigns a hash value for each input data value. So that third person cannot map to original data. The hash value is either 256 or 512 bits.

5. MAC Value

It is also called message authentication value. It takes 3 types of input.

6. Key Hash

Key hash is little different than Hash Function. In the case of Hash function, the reverse calculation of 256 or 512 bits give a clue to original data. So possibility of hacking you can find in Hash functions.

So Key Hash came into picture. The data first go through a MAC algorithm, where it creates Tag called MAC tag. So in Key Hash process one additional data transmitted that is called MAC Tag.

One more mechanism is Pseudorandom Functions also called PRFs. Where it calculates random key.

7. TLS Protocol

TLS is a transport layer security protocol(TLS). It works basically as a internet security layer. This works as middle layer between Server and Website.

8. Authenticated Cipher

In this case, both encryption, MAC tag help to check the authenticity of data or transactions.

Related Posts

Comments

Most Viewed

Hyperledger Fabric Real Interview Questions Read Today

I am practicing Hyperledger. This is one of the top listed blockchains. This architecture follows R3 Corda specifications. Sharing the interview questions with you that I have prepared for my interview.

Though Ethereum leads in the real-time applications. The latest Hyperledger version is now ready for production applications. It has now become stable for production applications.
The Hyperledger now backed by IBM. But, it is still an open source. These interview questions help you to read quickly. The below set of interview questions help you like a tutorial on Hyperledger fabric. Hyperledger Fabric Interview Questions1). What are Nodes?
In Hyperledger the communication entities are called Nodes.

2). What are the three different types of Nodes?
- Client Node
- Peer Node
- Order Node
The Client node initiates transactions. The peer node commits the transaction. The order node guarantees the delivery.

3). What is Channel?
A channel in Hyperledger is the subnet of the main blockchain. You c…