You are on page 1of 5

TERM PAPER

ON

Cloud Cryptography

Submitted by:
Sai Teja Uppuluri
11703780
K17KP
Computer Science and Engineering
Saitejachowdary.uppuluri@gmail.com
I. INTRODUCTION
Cloud computing is the usage of computing
services like servers, databases, networking,  Authentication: It defines a computer
software through any web-based interface to make system or a user so that it can be trusted.
use of infrastructure more efficiently. There are  Confidentiality: Only the recipient and
different types of clouds: sender must be able to access the message.
 Public cloud We lose confidentiality if a person who is
 Private cloud not authorised will access a message.
 Hybrid cloud  Integrity: It assures that there is no
 Community cloud alteration in the content during
 and organisations or people using cloud transmission of data.
are concerned about the privacy of data.  Non-repudiation: It specifies that the
Cloud computing provides customers a virtual sender of a message cannot be refused
computing infrastructure on which you can run having sent it later on in case of dispute.
applications and store data. We face security
challenges as cloud operators may manipulate II. METHODS OF CRYPTOGRAPHY
client data without being fully trusted from 1) Encryption :
digitalisation of education system to facilitating Encryption is considered as one of the most
remote access to data cloud technology had played effective approaches to data security, scrambling
a very vital role. As business information content of any database or any system or any file
regulations security expand at a fast pace, such a way that it cannot be read without
corporate world often faces privacy and security decryption key by applying encryption and
challenges that they might not be aware of. So, we through the practice of secure encryption key
use cloud cryptography to protect this data. management, companies assure secure access to
Cryptography is used in all fields to secure the sensitive data, even if it is
data and prevent it from getting hacked. For
example, for securing the passwords
authenticating the banking transactions and many stolen, lost or accessed without authorization,
more nowadays various new cryptographic encrypted data is unreadable and meaningless
techniques are developed and cracked. Hence it is without its key.
important to always be aware of the computer ◦ Type of keys for Cloud Cryptography
threats and take precautions to avoid them as best 1) Symmetric Key :
as we can. It is the type of encryption scheme in which
Cloud Cryptography is the technique of using same key is used for both encryption and
encryption techniques to protect the data used or decryption. This method is largely used for
stored in the cloud. The data which is hosted by encrypting and decrypting messages in past years
cloud providers is encrypted which provides the to facilitate secret communication. Between
user a secure access to shared cloud services. governments and militaries these days, algorithms
Cryptography enables a user to protect their data of symmetric key are widely used in various types
with some codes. Cryptography is used by of computer systems for greater data security.
interchangeable digital means for verification of
asset transfer and for controlling the creation of
additional units and shield transactions. It protects
the sensitive cloud data without delaying the
transmission of information. Many companies
define cryptographic algorithms for their cloud
computing for the balance between security and
efficiency.
Cloud cryptography deals with various principles
of security:
◦ Working of a Symmetric Key ◦ Advantages
This working relies on a single key which is  Symmetric encryption algorithms need less
shared among multiple users. Data that is to be computational power.
encoded is called plain text. Same key is used for  It is widely used in applications ranging
encryption and decryption of plain text. The from securing internet traffic to protection
encryption algorithm used to run this plain text in of data stored in cloud servers.
this process is called cipher. This algorithm gives 2) Asymmetric Key :
output which is called cipher text. The decryption Asymmetric Cryptography is also as called
process converts the ciphertext to plain text. public key cryptography. It uses a pair of related
Symmetric encryption system's security is keys. One is public key and the another one is
determined by the level of difficulty it provides to private key. They both are used for encryption and
randomly guess the corresponding key to brute decryption of data and assure secure
force them. For example, a 128-bit key may Access of data. A public key can be used by
require some millions of years to crack it using anyone to encrypt the data and private key is used
common computer hardware. So, length of only by a recipient to decrypt and access the data
encryption key is directly proportional to its level securely. Usually this process of encryption and
of difficulty to break it. Usually keys which are decryption happen automatically, users do not
256-bits length are generally regarded as the most need to physically lock and unlock their data.
secure keys and are theoretically resistant to brute
force attacks.
Two of the common symmetric encryption
schemes are based on block and stream ciphers.
Block ciphers groups data into blocks of
predetermined size and each individual block is
encrypted using a particular-key and encryption
algorithm. Stream ciphers encrypt plain data by 1-
bit increments unlike block ciphers.
◦ Protocols related to Assymetric Key
There are many protocols which rely on
asymmetric cryptography, some of them are
 Transport layer security (TLS)
 Secure socket layer (SSL)
 Protocols which are responsible for
working of HTTPS.
Some of the stream cipher algorithms are RC4, Many software programs also make use of
A5, BLOWFISH. In this encryption code can be these protocols to establish a secure connection
cracked if someone finds out the symmetric key. over an insecure network or for validation of
But this problem can be overcome with the Diffie digital signature. This is considered as the most
Hellman algorithm. In the Diffie Hellman key secured encryption process because users need not
exchange or agreement algorithm, the receiver and share their decryption keys thus reducing
the sender should agree on a symmetric key using cybercrimes.
this technique.
◦ Uses
 Mail Encryption: To encrypt a message a
public key can be used and to decrypt a
message private key can be used.
 Cryptocurrencies and bitcoins usually rely
on this asymmetric cryptography because
users have public keys and private keys are
kept as secret.
 Besides, bitcoin uses a cryptographic
algorithm which allows only a valid owner
to spend funds.
◦ Disadvantages places where data is needed to be sent very
 Asymmetric cryptography is a bit slow secretly.
compared to others which makes it not
suitable for decrypting bulk messages.
 Identification of a public keys are difficult
because they cannot be authenticated.
 If a private key is hacked by someone all
the information can be easily read.
◦ Applications of Asymmetric Cryptography
RSA algorithm: it is largely used asymmetric
algorithm. It is embedded in SSL and TSL ◦ Techniques of Steganography
protocols. RSA keys are 1024-2048-bits long. But Using applications:
experts say that 1024-bit keys are can be easily There are many numbers of softwares available in
cracked because of which government and markets which are used to implement
industries are using a key with 2048-bit length steganography. Some of them are Image
keys. Steganography, Steghide. Crypture. They all are
◦ Elliptic Curve Cryptography (ECC) supposed to keep the internal process abstract. The
It is used as an alternative to RSA for application has an interface which provokes the
implementing asymmetric cryptography. It is user to enter file name and type of information
based on elliptic curve theory which creates they want to keep secure. After finishing this , the
smaller, faster and efficient cryptographic keys. application hides the message and makes it
To crack ECC one should develop elliptic curve transferrable through the given file.
discrete logarithm. Manual method:
Hiding of data behind the files can also be done
manually. kali Linux’s terminal would be
preferable for this. Besides, this window's
command prompt can also be used. Some lines of
code are used to hide the file and the information
we want to hide. These methods are leveraged by
military and organizations to transmit important
information from host to another.
3) Hashing :
Hashing is a cryptographic technique which
converts data of any form into a string.
Irrespective of type and size any data can be
hashed using aa hashing algorithm. Hashing is
2) Steganography :
different from other encryption methods because,
It is the technique of hiding files videos images or in hashing, encryption cannot be reversed that is
any file to other file image video or message. The cannot be decrypted using keys. It uses hash
useless bits are replaced by useful bits so that a functions.
required file can be hided into any file. This
technique holds a greater role in cyber security. It
allows only legitimate users to send the data in a
secured manner so that it is protected from hacker
or other users who wants to disturb the system.
This can be done using a software that is available
in market for free or paid
applications like steganpeg and openstego are
used to wrap one file into another.in encryption
and hacking. The attacker can crack some bits but
in this it is not possible to detect is something
important is transmitted. It is usually applied in
◦ Hash Function applications and protocols including
A hash function is a mathematical function Secure Socket Layer (SSL) security in
which converts a numerical input value into 2005 SHA-1 collisions were observed later
another compressed value. Values which are further models were built.
returned by this hash function are called message Ripemd:
digest or hash values.  RACE Integrity Primitives Evaluation
Message Digest is a set of hash functions
which were designed by family of
European hash functions.
 This includes RIPEND, RIPEND-128,
RIPEND-160. There also exists 256,
320bit versions of this algorithm.
Whirlpool:
 It is a 512-bit hash function.
◦ Features of Hash Function  Three versions of Whirlpool have been
Fixed length output: released namely WHIRLPOOL-0,
 It covers data of the arbitrary length to data WHIRLPOOL-T and WHIRLPOOL.
of fixed length. This process is called
hashing of data. III. CONCLUSION
 Hash is smaller than the input data.
 Hash is smaller representation of larger
data. It is also called as digest.
 Hash function with n bit output are called
n bit hash functions.
Efficiency:
 Usually for any hash function f with input
h, computing f(h) is fast.
 Computationally hash functions are faster
than a symmetric encryption.
Properties:
 Pre-image resistance.
 Collision resistance.
◦ Some of popular Hash functions:
Message Digest(md):
 md family consists of hash functions md2,
md4, md5, md6.
 md5 was the most popular and largely
used hash functions for some years in
2004, collisions were found in md5
because of which it is no longer
recommended to user.
Secure Hash Function(sha):
 SHA family consists of four algorithms
which are SHA-0, SHA-1, SHA-2, SHA-3.
They all are structurally different though
they belong to same family the original
version of sha-0 a 160bit hash function
was published by NIST. It has some
drawbacks and hence did not become very
popular.
 Later in 1995 SHA-1 was built SHA-1 was
implemented in many largely used

You might also like