Episode 98 - Encryption

The Backend Engineering Show with Hussein Nasser

Episode | Podcast

Date: Sun, 16 Jun 2019 21:23:29 GMT

<p>Encryption is the process of scrambling data to protect personal files, secure communication, hide identities and much more.&nbsp;</p> <p>In this video we will learn about the different type of encryptions we will talk about symmetric encryption, asymmetrical encryption, where they are used for and the pros and cons of each one.&nbsp;</p> <ol> <li>Symmetric encryption</li> <li>Asymmetrical encrypt&nbsp;</li> <li>Pros and cons of sym va asym&nbsp;</li> </ol> <p>Symmetric encryption&nbsp;</p> <p>Might as well just call it classic encryption I would argue and i think this is the first encryption known to us. I have some thing I dont want anyone to see I use a lock key to lock it. Only I can open it unless I have a lock.&nbsp;</p> <p>The same key you use to encrypt is the same key to Decrypt.&nbsp;</p> <p>Examples</p> <p>Examples of popular symmetric-key algorithms include&nbsp;</p> <p>AES</p> <p>Twofish</p> <p>Serpent&nbsp;</p> <p>DES</p> <p><a href="https://en.m.wikipedia.org/wiki/Twofish">Twofish</a>, <a href="https://en.m.wikipedia.org/wiki/Serpent_(cipher)">Serpent</a>, <a href="https://en.m.wikipedia.org/wiki/Advanced_Encryption_Standard">AES</a> (Rijndael), <a href="https://en.m.wikipedia.org/wiki/Blowfish_(cipher)">Blowfish</a>&nbsp;</p> <p><a href="https://en.m.wikipedia.org/wiki/CAST5">CAST5</a>, <a href="https://en.m.wikipedia.org/wiki/Kuznyechik">Kuznyechik</a>, <a href="https://en.m.wikipedia.org/wiki/RC4">RC4</a>, <a href="https://en.m.wikipedia.org/wiki/Data_Encryption_Standard">DES</a>, <a href="https://en.m.wikipedia.org/wiki/Triple_DES">3DES</a>, <a href="https://en.m.wikipedia.org/wiki/Skipjack_(cipher)">Skipjack</a>, Safer+/++ (Bluetooth), and <a href="https://en.m.wikipedia.org/wiki/International_Data_Encryption_Algorithm">IDEA</a>&nbsp;</p> <p>Asymmetrical encryptions&nbsp;</p> <p>We had symmetric encryptions for a long time, then internet came and networking and we needed to encrypt messages going back and forth. We said cool lets use AES. Then we said wait a second.. the other computer doesnt really have my key so we need to encrypt it..&nbsp;</p> <p>Also called Public key encryption&nbsp;</p> <p>1977&nbsp;</p> <p><strong>Rivest–Shamir–Adleman (RSA)</strong>&nbsp;</p> <ul> <li><a href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange">Diffie–Hellman key exchange</a>&nbsp;protocol</li> <li>DSS (Digital Signature Standard), which incorporates the&nbsp;<a href="https://en.wikipedia.org/wiki/Digital_Signature_Algorithm">Digital Signature Algorithm</a></li> <li><a href="https://en.wikipedia.org/wiki/ElGamal_encryption">ElGamal</a></li> <li>Various&nbsp;<a href="https://en.wikipedia.org/wiki/Elliptic_curve_cryptography">elliptic curve</a>&nbsp;techniques</li> <li>Various&nbsp;<a href="https://en.wikipedia.org/wiki/Password-authenticated_key_agreement">password-authenticated key agreement</a>&nbsp;techniques</li> <li><a href="https://en.wikipedia.org/wiki/Paillier_cryptosystem">Paillier cryptosystem</a></li> <li><a href="https://en.wikipedia.org/wiki/RSA_(cryptosystem)">RSA</a>&nbsp;encryption algorithm (<a href="https://en.wikipedia.org/wiki/PKCS1">PKCS#1</a>)</li> <li><a href="https://en.wikipedia.org/wiki/Cramer%E2%80%93Shoup_cryptosystem">Cramer–Shoup cryptosystem</a></li> <li><a href="https://en.wikipedia.org/wiki/YAK_(cryptography)">YAK</a>&nbsp;authenticated key agreement protocol</li> </ul>