Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Data Security And Algorithms

Data Security And Algorithms

A session on introduction to data security and algorithms. An internal company-wide presentation by Gaurav Sharma and I.

Abhinav Das

June 18, 2019
Tweet

More Decks by Abhinav Das

Other Decks in Technology

Transcript

  1. Topics 1. Cryptographic terms 2. AES (Advanced Encryption Standard) 3.

    HMAC 4. RSA Public-Private Key Algo 5. Data breach 6. Use case and bank requirements discussion
  2. Introduction Encryption Salt Hashing Pepper HMAC AES Symmetric key algorithms

    Asymmetric key algorithms Key Security Public key Private key Integrity Authenticity Secure Hash (SHA) Collision Preimage
  3. [3] Google spent 6500 CPU years and 110 GPU years

    to convince everyone we need to stop using SHA-1 for security critical applications. Also because it was cool.
  4. Brief Evolution of today’s hashing algorithms Hashing Global Salting Individual

    Salting Add pepper to it Simple comparison on multiple passwords Again comparison but now with new unknowns Really complex to crack by read only - peek only breach Peppering adds two layered security SLOW IT DOWN
  5. AES (Advanced Encryption Algorithm) 1. popular and widely adopted symmetric

    encryption algorithm 2. replacement for DES 3. 128-bit data, 128/192/256-bit keys No. of rounds Key Length 10 128 bit 12 192 bit 14 256 bit
  6. Steps in AES Algorithm 1. Pre-round Transformation 2. Substitution 3.

    Shift Rows: Circular Right Shift 4. Mix Column 5. Add Round Key