Encryption and Decryption
Encryption and Decryption
30
For Encryption:
Input: The “plaintext” or the raw data that is to be encrypted is entered.
Output: the encrypted data coded according to the shared key comes out as output.
For Decryption:
Input: the encrypted data which is to be decoded is entered.
Output: The “plaintext” or the original data comes out as output.
LIMITATIONS:
Losing encryption keys (such as during a natural disaster that compromises servers)
can lock organizations out of important data.
Malicious actors often concentrate their attacks (brute force attacks) on obtaining an
organization’s encryption keys. The drawback is that if an unauthorized person gets
their hands on the key, they will be able to decrypt any messages and data sent
between the parties. (Specially in symmetric encryption)
Quantum computing poses an existential threat to modern encryption techniques.
When it is ready, it will be able to find the decryption key trying every potential
combination. Hence, it has the potential to break existing encryption.
PSUEDOCODE:
NAME: SHUBHANGANA NATH CLASS: XI-I ROLL NO. 30
FLOWCHART: