0% found this document useful (0 votes)
6 views12 pages

Cryptography

Cryptography is the practice and study of techniques for securing communication and data from adversaries by converting readable information (plaintext) into an unreadable form (ciphertext) using mathematical algorithms and keys.

Uploaded by

23z133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views12 pages

Cryptography

Cryptography is the practice and study of techniques for securing communication and data from adversaries by converting readable information (plaintext) into an unreadable form (ciphertext) using mathematical algorithms and keys.

Uploaded by

23z133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Cryprographic Algorithms in Cloud

Security Services

● Authentication
● Data Confidentiality
● Data Integrity
● Non repudiation
Data Confidentiality
● Encryption Algorithms
− Symmetric Key Algorithms
● DES
● 3DES
● AES
− Asymmetric Key Algorithms
● RSA
● ECC
Authentication
● Encryption Algorithms - Asymmetric Key
Algorithms
● RSA,ECC
● Public Key Infrastructure
● Biometric authentication
● Two Factor or Multi-factor authentication
Data Integrity
● Hashing
● Message Authentication Code
● Digital Signatures
Non repudiation
● Digital Signatures
● Digital Certificates
Security in Whatsapp
● Signal Protocol
− Curve25519 for key exchange
− AES-256 for message encryption
− HMAC-SHA256 for message authentication
− Double Ratchet algorithm - updates the encryption
keys for every new message
Security in Telegram
● MTProto - Encryption Protocol
− AES-256
− Diffie-Hellman Key Exchange
− RSA-2048
● Cloud Chats - client-server encryption model
● Secret Chats – End to end encryption
Security in Telegram
● Cloud Chats - client-server encryption model
− RSA-2048 – Key exchange

− AES-256 – Data encryption

− SHA-256 - Key

● Secret Chats – End to end encryption


− Diffie–Hellman (DH) key exchange - shared key exchange

− AES-256 and SHA-256


Security in GMail
● Encryption for data in transit

− Transport Layer Security (TLS) – communicating with other service


providers

− TLS 1.3 with AES-256-GCM , TLS 1.2 with various ECDHE and
AES-GCM/CBC ciphers.

− Within Google's own network - AES-128-GCM

● Encryption for data in rest

− AES-256

− BoringCrypto and Tink - own cryptographic library of google


Application / Symmetric Key Exchange / Hashing / Notes
Service Encryption Asymmetric Integrity
Signal AES-256 (CTR + X3DH HMAC-SHA256 Double Ratchet
HMAC) (Curve25519 algorithm for
ECDH) forward secrecy.
Zoom AES-256-GCM ECDHE (TLS SHA-256 AES-256-GCM
1.2/1.3) added in 2020 for
all meetings.
Microsoft AES-256-GCM ECDHE (TLS SHA-256 End-to-end
Teams 1.2/1.3) encryption
available for 1:1
calls.
Dropbox AES-256 RSA-2048 / SHA-256 Data at rest
ECDHE encrypted with
AES-256, in
transit with TLS.
Google Drive AES-256 RSA / ECDHE SHA-256 File encryption at
rest with
AES-256.
Summary
● Cryptographic algorithms are the backbone of cloud security.

● They ensure confidentiality, integrity, authentication, and trust.

● AES, RSA/ECC, hashing, and TLS/SSL protect data and communication.

● Strong cryptography enables secure, reliable, and compliant cloud applications.

You might also like