Public key Encryption Archives | Vednam https://vednam.com/tag/public-key-encryption/ Latest News on Cyber Security,Hacking and Tech Wed, 01 Jul 2020 08:10:02 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://vednam.com/wp-content/uploads/2020/05/cropped-LOGO-PNG-02-1-32x32.png Public key Encryption Archives | Vednam https://vednam.com/tag/public-key-encryption/ 32 32 Zoom provide End-to-End Encryption for the free users : Report https://vednam.com/zoom-provide-end-to-end-encryption-for-the-free-users-report/ https://vednam.com/zoom-provide-end-to-end-encryption-for-the-free-users-report/#comments Fri, 19 Jun 2020 05:13:47 +0000 https://vednam.com/?p=938 On Zoom announced on Wednesday that they had decided to provide end-to-end encryption for all customers, meaning the customers who are not using the paid version. The company announced end-to-end encryption for the video and audio calls for every user and they decide for all the users This time Zoom comes with the decision after […]

The post Zoom provide End-to-End Encryption for the free users : Report appeared first on Vednam.

]]>
On Zoom announced on Wednesday that they had decided to provide end-to-end encryption for all customers, meaning the customers who are not using the paid version.

The company announced end-to-end encryption for the video and audio calls for every user and they decide for all the users

This time Zoom comes with the decision after engaging with the civil liberties organizations of CISO council.,child safety advocates and the new encryption experts that government representatives and the users.

Zoom released an updated version of End-to-End encryption(E2EE) design, the new design can be found on GitHub

Zoom provide End-to-End Encryption for the free users
Zoom provides End-to-End Encryption for the free users

When you enable us to offer E2EE as an advanced add-on feature for all the users around the globe -free and paid-it maintain the ability to prevent and fight abuse on our platform.

How to get the E2EE

Free/Basic users to be available E2EE phone number verification needs to be done and the user needs to provide the phone and verification secret code via text messages.

As per reports, it was mentioned that “ we are confident about the implementing risk-based authentication which combines with the current mix of tools and includes the report a user function that can prevent the fight abuse”.

From the starting of July 2020, the company planned to enable E2EE for free users.AES 256 GCM transport encryption will remain as the default encryption for all the users.

E2EE will remain an optional feature because it is limited to traditional functionalities which include traditional PSTN phone lines or SIP/H.323 hardware conference room systems.

The account administrator has the power or you say option that can enable and disable E2EE at the account and group level.

If you feel any suggestions for this article. Let me know in the comment section

The post Zoom provide End-to-End Encryption for the free users : Report appeared first on Vednam.

]]>
https://vednam.com/zoom-provide-end-to-end-encryption-for-the-free-users-report/feed/ 1
What is a VPN ? Why we really need this ? https://vednam.com/what-is-a-vpn-why-we-really-need-this/ https://vednam.com/what-is-a-vpn-why-we-really-need-this/#comments Mon, 15 Jun 2020 12:20:30 +0000 https://vednam.com/?p=891 What is a VPN? When we are talking about a virtual private network (VPN) which gives you online privacy and anonymity means a hidden way that can create a private network from the public internet connection. The VPNs Mask the internet protocol(IP) address that the way you can hide the online action virtually and that […]

The post What is a VPN ? Why we really need this ? appeared first on Vednam.

]]>
What is a VPN?

When we are talking about a virtual private network (VPN) which gives you online privacy and anonymity means a hidden way that can create a private network from the public internet connection. The VPNs Mask the internet protocol(IP) address that the way you can hide the online action virtually and that helps to be untraceable.VPN established the secured and encrypted connections to provide greater privacy that can secure Wi-Fi hotspot.

Why do we really need this?

As day by day, we heard the data breach and cyber attackers are doing the attacks. The web and other transactions that have unsecured Wi-Fi networks mean that they could expose your private information and browsing stuff.

While reading the emails if you are using the coffees shop Wi-Fi and that is a public network. So using the public network you have been attacked by the third party attacker that why you need a virtual private network.

The encryption and anonymity which VPN can provide and that helps to protect your online activities which can send emails, shopping online, and paying bills. Virtual Private Network can keep your web browsing anonymous.

How Does a Virtual Private Network Protect your IP Address and Privacy?

If you ask for the How then there is a simple process to create a data tunnel between your local network and an exit node on the other location, which could be a thousand miles away.

This process can help you to go online and allow you to access your favorite apps and websites while on the go.

Just look closer at the virtual private network work. The VPNs are encryptions to scramble the data when it’s sent over a Wi-Fi network. Encryption can make the data unreadable and secure for third party access. Every time Data security is important even if you are on a private or public network.

Even if you talk about them without VPN access then it should be serious because the internet service provider knows your entire browsing history and the VPN helps to hide that search history. Search engines also track your search history and that is different but every searches associated with your IP address.

What Does VPN Hide?

  1. Your Browsing History
  2. Your Ip address and Location
  3. Your Location for streaming
  4. Your Devices
  5. Your web activity 

How to choose a VPN?

  1. Check for the privacy policy of the product.
  2. Find the protocol method that is updated or older.
  3. Data Limits.
  4. Server location.
  5. Access for multiple devices.
  6. Cost compare

Companies behind VPN Products :

  1. Noroton Secure VPN
  2. PureVPN
  3. CyberGhost
  4. Hotspot shield
  5. Nord VPN

and so on.

 If you think any comments for this article. Please share your suggestions.

The post What is a VPN ? Why we really need this ? appeared first on Vednam.

]]>
https://vednam.com/what-is-a-vpn-why-we-really-need-this/feed/ 1
What Is Public Key Encryption ? Public Key Cryptography and SSL https://vednam.com/what-is-public-key-encryption-public-key-cryptography-and-ssl/ https://vednam.com/what-is-public-key-encryption-public-key-cryptography-and-ssl/#comments Mon, 25 May 2020 13:58:01 +0000 https://vednam.com/?p=478 What Is Public Key Encryption? Public Encryption or public Cryptography is a method of encrypting the data with two different keys and making them one key the public key which is available for everyone and the other key is known as a private key. Data Encrypted with the public key that can only be decrypted […]

The post What Is Public Key Encryption ? Public Key Cryptography and SSL appeared first on Vednam.

]]>
What Is Public Key Encryption?

Public Encryption or public Cryptography is a method of encrypting the data with two different keys and making them one key the public key which is available for everyone and the other key is known as a private key. Data Encrypted with the public key that can only be decrypted by the private key. Public key Encryption is also known as the symmetric key. It is used for TLS/SSL which makes HTTPS for the website.

Cryptographic Key

The Cryptography key is a piece of information that is used for scrambling data that may help to appear data random; often string of number and larger number or letter. The unencrypted data is called as Plaintext and after that, the encryption algorithms use the key and encrypt the whole data on the other side the data decrypted and show plaintext.

For Example: If you Input data “vednam” and after encryption with key “*2696726281hj” and now you can read that data like “XYHTJLGR+*” which you think it is garbage data. However, after decrypting the same data you got plaintext “vednam”

Plaintext + key = Ciphertext

Vednam +  *2696726281hj = XYHTJLGR+*

Ciphertext + key = plaintext

XYHTJLGR+* + *2696726281hj = vednam

(The above example shows the perfect symmetric encryption methods where only one key is used.)

How Does Public Key Encryption Work?

Public key Encryption seems too difficult to initiate but a writer named “Panayiotis” writes a relatable story.

He says let’s imagine a trunk with a lock that two people, Bob and Alice, use to ship documents back and forth. A typical lock has only two states; locked and Unlocked. Anyone with a copy of the key can unlock the trunk if it’s locked and vice versa. When Bob locks the trunk and sends it to Alice, he knows that Alice can use her copy of the key to unlocking the trunk.

You must read to know the scenario of the symmetric cryptography activities. One secret key used both encrypting and decrypting and both sides of the conversation unlocked with the same key

The machine sending the data encrypts the document or file with the help of asymmetric key, then encrypts the symmetric key with the public key of the receiving computer.The receiving computer uses its private key to decode the symmetric key and after the document or file is decoded.

How does TLS/SSL use public key Encryption?

Public Key encryption is useful for establishing secure communications over the internet(Via HTTPS).A website that has SSL/TLS certificate which is shared publicly contains a public key and the private key is installed on the server.

TLS uses public-key cryptography to authenticate the identity of the originating server and to exchange data it usually generates the session keys. The exchange key algorithm ,such as RSA or Diffie-heliman,uses the public-private key pair to agree to the session keys basically used for symmetric encryption once the session is completed. The client and servers are able to agree upon new session keys for each communication session. Bad actors are unable to decrypt

Communications even if they identify or steal one of the session keys.

 

The post What Is Public Key Encryption ? Public Key Cryptography and SSL appeared first on Vednam.

]]>
https://vednam.com/what-is-public-key-encryption-public-key-cryptography-and-ssl/feed/ 1