INTRODUCTION
In today's scientific world, the demand for innovative software-based solutions is developing fast and on a big scale. As a result, these technologies are employed and implemented in computers, smart phones, and other electronic devices. With the evolution of the computing environment, there is an increasing need to secure it. We all know that most individuals nowadays have accounts on Google, Facebook, WhatsApp, and other social networking platforms. However, the question of how safe our private information is on such social networking sites emerges. To defend ourselves from unwanted or harmful assaults, we must safeguard our data to the greatest extent possible. Encrypting data is essential for data security. In this article, we will look at some of the traditional encryption methods, the relevance of encryption, encryption on social media and phones, and the expanding demand for encryption throughout time.
Each user wants to protect their personal information and data on social media from hackers and other malicious activities. This necessitates the use of a specialized technology known as cryptography. Cryptography is sometimes referred to as "the study of private". Cryptography assists in safeguarding data storage and transfer so that only the intended user can view it. It entirely conceals the data from the third person who is there at the same moment. It is concerned with assessing the protocols connected with knowledge security, such as information secrecy, access control, data dependability, and validation.
In Cryptography we using following key terms:
- Plain Text : Original Text
- Cipher Text : Encrypted text of plain text
- Encryption : method of convert plain text to encrypted cipher text
- Decryption : method of convert encrypted cipher text to plain text
A. Encryption Types
A.1 Symmetric Encryption
In this approach, identical keys are applied on the sender's side for plain text encoding and on the receiver's side for cipher text decryption [1].
Figure 1 - Symmetric Encryption |
In this approach, two separate keys are used: one on the sender's side for encryption and one on the receiver's side for decryption, where the recipient knows the sender's public key. The public key is shared by everyone, but the private key is only known to the individual who holds it [2].
Figure 2 - Asymmetric Encryption |
B. Encryption Methods
B.1 DES and Triple DES
The encryption key length of the original DES was enough when that technique was invented, but as processing power rose, so did the scope of developing Brute Force assaults. Triple DES is only an upgrade of DES with larger key size with the goal of eliminating such attacks without the need for a totally creative block cipher architecture. The Triple DES algorithm idea involves a key bundle that has three DES keys, K1, K2, and K3. Each key is 56 bits long (excluding parity bits). The key length of triple DES, which consists of three distinct keys, is 168 bits. It contains three keys, each with a key length of 56 bits, but due to the meet in the middle attack, it only gives 112 bits of security. Another variant known as 2-Key TDES employs KI=K3, decreasing key space to 112 bits & store length to 128 bits. The main shortcoming of this technique in software is its poor performance. The Triple DES algorithm is useful in its own right because of its unique key size, which is longer than the majority of key lengths associated with other encrypting modes [3].
B.2 International Data Encryption Algorithm (IDEA)
It is a hidden key encoding method that may be used in commercial and monetary applications.
The International Data Encryption algorithm was created by Xuejia Lai and James L in 1991 as an enciphering technique for chunk coding. PES (Proposed Encryption Standard) is a basic enhanced version of a previous secret message. IDEA was originally known as IPES (Improved PES). The novel algorithm was used as the standard code in the Pretty Decent Privacy cryptosystem's early class. It prohibits the usage of any find tables or X-Boxes [4].
This chunk coding algorithm is capable of processing 64-bit clear text and secret code chunks. It is controlled by a key of 128 bits. The primary design concept is to employ actions from three separate arithmetic groups. The substitute trunks and associated table research employed in the chunk cipher previously available have been completely avoided. The algorithm configuration is chosen so that, with the exception of using different key sub-blocks, the encipher technique is equivalent to the decode approach [5].
B.3 Blowfish
BLOWFISH is a proportionate lump cipher that may be effectively used for enciphering and protecting raw information. It was invented by Bruce Schneie and initially made public in 1993. It was designed as a fast and free alternative to a predictable encipher technique. It is permit and non-proprietary, and it is available to everyone.
It is a Fiestel setup that iterates 16 times around a simple enciphering process. The block size is 64 bits, while the key length is 448 bits. In massive microprocessors, actual data encryption has its own relevance. When run on 32-bit hardware with a large cache, it is faster than the most of encipher techniques [6].
Blowfish employs a huge number of sub-keys. The most crucial objective is to compute these subkeys prior to using any information enciphering or decoding methods.
B.4 CAST-128
Carlisle Adams and Stafford Tavares created a planned procedure for proportional encryption algorithm. It comprises of a traditional Fiestel setup that runs in 16 rounds to transform 64 bit plaintext to 64 bit cipher text. The key size varies from 40 bits to 128 bits in 8-bit augmentation. To begin the encryption process, the plaintext block is divided into left-half and right-half segments. The algorithm has eight iterations. Using function f, the right half section is coupled with a certain key issue in each round. This content is then XORed with the left half segment in order to determine the new right half. The original right half is now the new left half. The two parts are merged after 8 rounds to generate the encrypted text [7].
B.5 RC2
Ron Rivest created this algorithm with changeable key size. It is made up of a volatile scaled key of 64 bit block cipher constructed to be a DES restoration. This solution employs a variable length key that ranges from 0 bytes to the maximum size that the computer system ropes. Its encryption velocity is independent of key size.
C. USE OF ENCRYPTION ON PHONE AND SOCIAL MEDIA
AES algorithm is a safe and sound methodology for these two phenomena, which are useful for regularity field of influence and are highly protected. Both the concepts of steganography and cryptography have a safe way. On social media, two people can communicate with each other by using a variety of messaging programs, including Whatsapp, Facebook Messenger, Snap Chat, etc. To encrypt the messages transferred over the internet, a law is required.
Secure data connection and transmission over the internet is made possible via encryption. With the aftermath from Snowden's revelations, many initiatives in the realm of encryption made by social media companies up to mid-2013 have taken a turn. Following the announcements, some applications, like Telegram, were created with end-to-end encryption, and others, like WhatsApp, followed the trend in order to maintain market share and because it prevented them from responding to legitimate requests for data and other information from law enforcement.
When used in shared media apps, E2EE encryption means that only the sender and receiver may view the encrypted data because the user who decrypts it is the only one who has the key to do so. Even though the data is transmitted through a server, no other party is able to decrypt it. Not all online apps use end to end encryption, even though some of them may. In certain mobile applications, such as Facebook Messenger, the encryption process is only applied to the data that is being transferred. In contrast, services like Snap Chat only encrypt the data that is being transferred, and once the recipient has read the message, the server immediately deletes it. The 2 types of encryption utilized on social media are symmetric and asymmetric.
D. NEED OF ENCRYPTION
As the growth of both computers accelerates technology and internet security measures information is considered one of the most important essential elements of information technology and intelligence [8]. Furthermore, with the invention of social media means of communication grew with the Internet time. We used to have mailing lists and bulletin boards nameplates that allow people to collect and share information around the world. But today many advanced applications on the Internet we can communicate with each other exchange information around the world. However, this progress has a downside. Your data is not safe because social media allows you to share your data text, images, videos, audio, almost anything. While we try to keep your information safe by doing so, Personal settings in data protection, our information hidden only by people we don't want to show it. Rather, all information site owner. is the procedure for converting ordinary information (called plain text) to the confused text (called ciphertext) [9]. so, we important to know when using shared grid services, the confidentiality and security issues they raise. Previous If you are working on a public network site, it is important to recognize how they exposed and constructed us continue to take initiatives to protect ourselves and the public we work therefore, data encryption sets us free types of malicious attacks, if possible.
E. RECENT TECHNIQUES USED ON SOCIAL MEDIA FOR ENCRYPTION
E.1 Facebook
This social media site has developed various complex systems working on the backend to fully protect its users from attacks. on Facebook we have also developed some advanced features that users can use to protect themselves. B. Remote Logout and OTP (One Time Password). Such attributes are useful when the security of a network or computer system is unknown. Two new features like this in technology are:
E.1.1 A secured connection
Every time a user makes an online purchase or accesses e-banking, they may have noticed a “safety device,” a sign displayed on an address block, or an address block turning green. Indicates that the portal the user is using is a fully secured link ("HTTPS") to communicate with the website, and the messages sent are kept confidential. The application Facebook is currently using when the user's secret code was delivered ("HTTPS").
But now Facebook offers its users a complete knowledge of Facebook via HTTPS. Users should consider enhancing this choice if they frequently use Facebook from anywhere. B. In public places or at home. An alternative exists as an element of Greater Security Attributes, which users can find in the Account Security section of their Account Settings page. It is very important for a Facebook user to secure her account because after being hacked, a user's personal information can be obtained by hackers and misused on a large scale. Facebook offers a variety of options to protect its users' accounts from various malicious attacks. Different spam emails can also affect user accounts in different ways, which is very harmful. The HTTPS concept works really well and is very important in protecting user data and personal information.
Before deciding whether to use HTTPS, there are a few things you should know. Encrypted pages take longer to load and the user sees her Facebook neglecting HTTPS. In summary, certain attributes that count various 3rd party functions are not currently supported in HTTPS. Facebook assures that these remaining issues will be resolved in the near future.
Figure 3 - figure showing the security of the FB Account |
E.1.2 Social Authentication
Facebook aims to put citizens at the center of all content and socialize all event users encounter on the site. Facebook wants to take social design to a higher level and make it safer for users. Public review is the latest attempt to reach this goal. People who use Facebook often don't have security issues. however, Facebook notices suspicious activity on users' accounts, including logins from California during the day and hours later from Australia Facebook may ask about your personality so that we can verify that your account is non-negotiated. Facebook and many other social spaces use confrontational reaction checks called captchas on posts and source streams. The purpose of this experiment is to ensure that you are operating a human and not an organization dependent computer. Traditional captchas have serious flaws that can be difficult to decipher as they are only intended to protect against breakouts from vulnerable computers to computer operators. Instead of showing traditional captchas, Facebook may test you in other ways by asking you for the identities of your friends. Please show me their pictures. This way we can guarantee that the user knows the password, but never knows the identity of the user's friends.
E.2 WhatsApp
Figure 4 - Figure showing the FB Captcha |
E.2.1 What is the Concept of Whatsapp web?
WhatsApp can also be accessed from a computer Its service messaging app known as Whatsapp Web. This service uses QR codes to verify user identities instead of email id and username. don't even do that No password required. Your smartphone is the key Use WhatsApp Web. QR code is a two-dimensional bar Code that works very efficiently and can be stored More information than 1D barcodes. Or QR scan for easy access to information Code in the user's smartphone application. QR code Now available for marketing, inventory and more Related Purposes.
E.2.2 How does the QR CODE works?
WhatsApp can also be accessed from a computer That service messaging app known as WhatsApp Web.
This service uses QR codes to verify user identities instead of email id and username. don't even do that
No password required. Your smartphone is the key Use WhatsApp Web. QR code is a two-dimensional bar Code that works very efficiently and can be stored More information than 1D barcodes. Or QR scan for easy access to information Code in the user's smartphone application. QR code Now available for marketing, inventory and more Related Purposes.
When a user creates a WhatsApp account for the first time, he/she
Just enter your phone number and confirm.
WhatsApp Now Allows Users to Access Their Own I need to verify the user's account via computer Log in and authenticate your account correctly. Here are the steps the user must follow:
1. Visit web.whatsapp.com in your browser computer. The key point is WhatsApp Web only
Supports Mozilla Firefox, Google Chrome, or Open browser.
2. A QR code will appear on the main screen. that is dynamic in nature, i.e. changing from moment to moment, or in seconds.
3. Open WhatsApp on your smartphone. Important The point is that WhatsApp Mesh can access Blackberry. Windows Phone 8.0 and 8.1, Android, iPhone, etc. other smartphones.
4. Click More Options and click WhatsApp. Communication network.
5. Open WhatsApp on your smartphone. Wittig The point is you can have WhatsApp web on Blackberry.
Figure 5 - Figure showing the QR code on WhatsApp web |
Android, Windows Phone 8.0 and 8.1, Nokia S60, Nokia S40 Single SIM EVO, iPhone, BB10 Smartphone.
6. Open WhatsApp on your smartphone.
7. Click More Options, then WhatsApp. Communication network. Eighth. Click the "+" icon at the top of the screen. Right corner to open the scanner.
9. Use this scanner to scan the QR code. Browser screen to complete authentication
process.
10. Now you can see WhatsApp Chat on your computer screen. Important Need fast and secure internet It connects on both sides, so the computer and Phone for WhatsApp web to work.
E.3 Amazon
Privacy refers to protecting the data that goes inside Transfer phase and rest. data in transit Phases can be secured on the SSL client-side encryption. To ensure security, you have the following options: Stationary data in Amazon S3.
E.3.1 Server-Side Encryption
Users can ask Amazon S3 to encode entities When decoding it before discounting it to disk The user has to download the object.
E.3.2 Client Side Encryption
Users can encrypt data on the client side and can: Transfer encrypted data to Amazon S3.Here users Can manage encrypted keys, encryption methods and its devices. Amazon encrypts user data with 256 Bitwise AES encryption, also known as AES-256. Encrypt data at rest using Amazon S3 set Or a condensed iterative cache option. Whole Encryption, key management, and decryption processes Search and check personally at short intervals as part of Amazon's existing audit process.
II. Conclusion
Conventional encryption introduced in this paper Investigated and analyzed methods. that too Analyze every technology matter in real time encryption. I also looked into current encryption Done on social media and phone, urgent need the concept of encryption in social circles on the Internet. Everyone An innovative encryption system was developed; Therefore, a conforming cryptographic tool will always Exercise faster and safer.
References
[1] P. S. &. D. M.
Turner, "Cryptomathic," 18 01 2019. [Online]. Available:
https://www.cryptomathic.com/news-events/blog/symmetric-key-encryption-why-where-and-how-its-used-in-banking.
[Accessed 11 10 2022]. |
|
[2] S. Security,
"Cheap Security," 19 01 2021. [Online]. Available:
https://cheapsslsecurity.com/blog/what-is-asymmetric-encryption-understand-with-simple-examples/.
[Accessed 11 10 2022]. |
|
| [3] J. Lake, "comparitech," 17 02 2022. [Online]. Available: https://www.comparitech.com/blog/information-security/3des-encryption/. [Accessed 11 10 2022]. |
[4] V. Gupta, "Geek for Geeks," 22 10 2021. [Online]. Available: https://www.geeksforgeeks.org/simplified-international-data-encryption-algorithm-idea/. [Accessed 11 10 2022]. |
|
| [5] R. Awati, "TechTarget," [Online]. Available: https://www.techtarget.com/searchsecurity/definition/International-Data-Encryption-Algorithm. [Accessed 11 10 2022]. |
| [6] A. Bhatt, "Geek for Geeks," 30 09 2021. [Online]. Available: https://www.geeksforgeeks.org/blowfish-algorithm-with-examples/. [Accessed 11 10 2022]. |
| [7] "Vocal," [Online]. Available: https://vocal.com/cryptography/cast-128-cast-256/. [Accessed 11 10 2022]. |
[8] D. Sharma, "A Review on Image Compression and Stenography," 04 2015. [Online]. Available: http://www.ijarcsse.com/volume. [Accessed 11 10 2022]. |
|
[9] S. A. R. Vikas Agrawal, "ijesh," 02 2014. [Online]. Available: http:/www.ijser.in/volume2issue2. [Accessed 11 10 2022]. Stay Informed, Stay Safe!
|