Cryprographic Algorithms in Cloud
Security Services
● Authentication
● Data Confidentiality
● Data Integrity
● Non repudiation
Data Confidentiality
● Encryption Algorithms
− Symmetric Key Algorithms
● DES
● 3DES
● AES
− Asymmetric Key Algorithms
● RSA
● ECC
Authentication
● Encryption Algorithms - Asymmetric Key
Algorithms
● RSA,ECC
● Public Key Infrastructure
● Biometric authentication
● Two Factor or Multi-factor authentication
Data Integrity
● Hashing
● Message Authentication Code
● Digital Signatures
Non repudiation
● Digital Signatures
● Digital Certificates
Security in Whatsapp
● Signal Protocol
− Curve25519 for key exchange
− AES-256 for message encryption
− HMAC-SHA256 for message authentication
− Double Ratchet algorithm - updates the encryption
keys for every new message
Security in Telegram
● MTProto - Encryption Protocol
− AES-256
− Diffie-Hellman Key Exchange
− RSA-2048
● Cloud Chats - client-server encryption model
● Secret Chats – End to end encryption
Security in Telegram
● Cloud Chats - client-server encryption model
− RSA-2048 – Key exchange
− AES-256 – Data encryption
− SHA-256 - Key
● Secret Chats – End to end encryption
− Diffie–Hellman (DH) key exchange - shared key exchange
− AES-256 and SHA-256
Security in GMail
● Encryption for data in transit
− Transport Layer Security (TLS) – communicating with other service
providers
− TLS 1.3 with AES-256-GCM , TLS 1.2 with various ECDHE and
AES-GCM/CBC ciphers.
− Within Google's own network - AES-128-GCM
● Encryption for data in rest
− AES-256
− BoringCrypto and Tink - own cryptographic library of google
Application / Symmetric Key Exchange / Hashing / Notes
Service Encryption Asymmetric Integrity
Signal AES-256 (CTR + X3DH HMAC-SHA256 Double Ratchet
HMAC) (Curve25519 algorithm for
ECDH) forward secrecy.
Zoom AES-256-GCM ECDHE (TLS SHA-256 AES-256-GCM
1.2/1.3) added in 2020 for
all meetings.
Microsoft AES-256-GCM ECDHE (TLS SHA-256 End-to-end
Teams 1.2/1.3) encryption
available for 1:1
calls.
Dropbox AES-256 RSA-2048 / SHA-256 Data at rest
ECDHE encrypted with
AES-256, in
transit with TLS.
Google Drive AES-256 RSA / ECDHE SHA-256 File encryption at
rest with
AES-256.
Summary
● Cryptographic algorithms are the backbone of cloud security.
● They ensure confidentiality, integrity, authentication, and trust.
● AES, RSA/ECC, hashing, and TLS/SSL protect data and communication.
● Strong cryptography enables secure, reliable, and compliant cloud applications.