With the rise in online
money transactions worldwide from recharging your mobile balance to purchase or
money transfer of thousands of rupees. We should aware of online ‘thugs’. Recent
study shows that every online user owes 2.80 $ to the hackers so we should know
that how different mobile apps, websites try to protect our transaction details
from the hackers.
Ø ITS ALL ABOUT AES AND RSA.
These are
nothing but the encryption techniques. The most commonly used is the AES (
Advanced Encryption Standards),AES-128,192, and 265 for governments, banks and
other popular apps.
Encryption systems
are of two types
1.
Symmetric-key
2.
Public –key
In symmetric –key encryption ,two
communicating computers have a secret key which is used to encrypt the code .
and believe me AES-128 bitkey for instance can have more than
300,000,000,000,000,000,000,000,000,000,000,000. Key combinations and cracking
it with a state-of-the-art supercomputer would take longer than the presumed
age of the universe i.e 4500 million years. And current systems uses AES-256 so
its impossible to crack AES-256.
Ø IT’S Algorithm.
The algorithm is
based on several substitutions, permutations and linear transformations which
creates 16 byte block. Operations are repeated several timesand results into ‘rounds’.
During each round a unique key is calculated out of the encryption key, and
incorporated in the calculations.
No comments:
Post a Comment