May 08, 2012

ENCRYPTION


In this 21st century we have moved into a digital world where most of use the Email for data transmission. Some of us don’t like to share our data in the internet with the unauthorized people  but only to a specific people .So we need a specific technology to keep our data secure from the unauthorized people  this is called as encryption.. Encryption is a technique or a process where the data is encoded using different methods so that one cannot access the data until unless he has got the key to unlock the encryption. And the process of bringing back to the original form is called decryption.

TYPES OF  ENCRYPTION:

                         Cryptography is the study of  keeping the digital  data secure. Initially the encryption is based on replacing the alphabets with different symbols and the decryption where also based on the same. As we are in the fast moving world we cannot use this older type of encryption because  its slow .So the cryptographer improved the encrypting technique .Modern computer security encryption systems can be classified into two categories.
·  Symmetric-key encryption
·  Asymmetric-key encryption
Modern encrypting technique are far more complex than the older one and the combination key in  encryption are based on algorithms.

SYMMETRIC-KEY ENCRYPTION:

In the symmetric-key encryption the encryptor has a unique key which helps in encrypting the data that is to be transmitted .The receiver also has the same key for decryption of data. Each transition has a unique key for transmitted data. The 56 bit data encryption standard was the first encryption algorithm in the Symmetric-key encryption. This was developed byUnited States for the encryption and decryption of data. This were easily hacked so they created a 128bit advance encryption standards. This are still used in data security of email ,atm encryption and many more.

ASYMETRIC-KEY ENCRYPTION:

Asymmetric-key encryption is little bit similar  to the previous one but the code for encrypting the data is different from the decrypting key.In digital signatures, has of the message is calculated first and then it is used as privatekey or senders code . Public key or receiver key is compared first and then the private key is used to decode the data.

SSL AND TLS:

SSL stands for Secure Socket Layer, TLS stands for Transport layer Transport layer security. Both the SSL and TLS are the encryption protocol.. SSL and TLS both uses asymmetric or public key encryption technique to encrypt the network connection segments. Basic and foremost SSL technique was developed by Netscape for providing transport layer security. SSL became very popular among all browsers and web servers as it was very efficient to transfer the sensitive data .Later their wear upgrades in the SSL and  then the TLS were released.If you have noticed while making bank transfers, the http changes to https once you login to the bank's official website. Https uses the TLS technique to make the data transfer more secure. TLS checks three important things before transacting and they are whether the certificate of website is a valid one or not, secondly it checks whether the certificate belongs to the corresponding trusted website or not, and third one is whether the sending website does have a valid relationship with the received certificate or not. Once all above things are verified, then one computer generates asymmetric key and sends it to the other computer.

CONLCLUSION:

     Some of the hackers  will hack any type of encryption. So in this case data could not be kept secured so the research are going on the field of encryption.



CLOUD COMPUTING:


CLOUD COMPUTING:

                  Current trend we come across  in the day to day life is cloud computing .In cloud computing - Cloud refers to network in which all the computers are connected by the means of internet .In the cloud computing all the resources and files are shared among the systems and they are rendered to the user as a service.

FEATURES:

·         In the cloud computing the software need not to be installed or downloaded from the internet sites. Instead the software can be used directly by choosing what u need. This saves the downloading time and the initialization time. This also saves your valuable memory space because it consumes less or no memory space for the software to be used. 
·         The pirated products can be avoided. Since the software company release their product in the cloud computing basis the piracy is avoid to a greater extend
·          Pay for what you use is one of the main objective of this technology .The user are charged only for what they use. So the user and the companies get a satisfaction.
·         This service are provided 24*7 so that it can be used anywhere and at any time.
·         For the security of each individuals they are provided with an user id and a password. So that their privacy can be secured.

CURRENT WORLD AND CLOUD COMPUTING:

              The real time application of the cloud computing can be seen in the form of YOUTUBE. In the YouTube the videos can be seen anywhere and at any time. For the user private security they are given a user id and a password. For seeing the videos the basic software is sufficient and this can be seen anywhere.
        The next one is the Facebook-they provide various services like live chats, online videos and various other application. This are now used widely by a variety of people of different agegroups. The feature of uploading and editing the photos are some of the excellent featured services that they offer.

PROBLEMS OF CLOUD COMPUTING:

There will be some unique system called the database system which loads all the services of that they offer. Some of the hacker try to crack this database for their personal convenience and if they do so then the other user will be in a state that they could not do any of the activities. So in order to sort out this problem  there is a backup system that is if the main system is hacked the backup can be used if that too is hacked then it’s the fate and some alternative ways are their but it takes time.so the user cannot use that to their convenience at that  period of time.

WORKING OF ATM


            When we run short of money we usually go to atm center. But have we ever thought how this magnificent   atm machine works? But answer from most of us is no. The atm is controlled by a host server which controls and co-ordinates the whole transaction process. The host server keep track of the transaction that are done.

WORKING OF ATM(AUTOMATED TELLER MACHINE):

                             The atm machine consists of an atm card reader in which the credit or debit cardar inserted to. The card consists of a coat of a magnetic material and outer plastic covering .The details of the card holder are stored in the card in the form of a magnet strip. When the debit or credit card are inserted into the atm this machine identifies the user and it sends a requesting the password. When the password is entered correctly the atm connects itself with the host. When the amount is entered the information is converted into electronic signals and send the signal to the  again and connect it with the bank data base and then in return the bank sends the information about the transaction, then the host sends this to the atm.
These connections are classified into two major types, that is Leased-line ATM and Dial-up ATM. Both the types use a telephone connection to get connected to the host processor. However, the Leased-line uses a dedicated, point to point telephone connection in order to get connected to the host processor, making it very costly to set it up and maintain it throughout the year. However, Dial-up ATM use an ordinary telephone connection to get connected to the user. Hence, Dial-up ATM is very easy to set up and the maintenance costs are also less compared to Leased-line.
                The atm consists of a sensor that checks the length and the thickness of the currency and differentiates as 100,500 and 1000that come from the safe. The damaged and folded currency are sent to separate section in which the note are placed. Then the notes are sent to the dispenser where the cash could be drawn. The numbers of notes are counted by the special sensors that goes to the dispenser.