Encryption Techniques From Traditional To Modern Encryption Technique - Devconf2025

Speaker: Dr. Uma Pujeri --- Encryption has played a vital role in safeguarding communication throughout history, adapting to the growing complexity of thre...

DevConf61 views43:20

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Pakistan under the topic 'f'.

About this video

Speaker: Dr. Uma Pujeri --- Encryption has played a vital role in safeguarding communication throughout history, adapting to the growing complexity of threats and the ever-increasing need for data privacy in modern times. Early methods, such as the Caesar cipher and substitution techniques, introduced fundamental ideas for securing information. While these traditional approaches were innovative for their era, they were limited in resilience, often susceptible to frequency analysis and basic decryption attempts. With the advent of modern computing, encryption methods advanced significantly, in The digital age brought revolutionary advancements in encryption, including the development of symmetric key algorithms like the Data Encryption Standard (DES). Introduced in the 1970s, DES became a widely adopted standard for data protection, relying on a single shared key for both encryption and decryption. While DES marked a significant milestone, its 56-bit key length eventually proved vulnerable to brute force attacks, prompting the adoption of more robust successors like Triple DES (3DES) and the Advanced Encryption Standard (AES). introducing sophisticated algorithms capable of withstanding more complex attacks. AES algorithm is optimized for speed and efficiency, making them ideal for protecting large volumes of data. Meanwhile, asymmetric encryption systems such as RSA and Diffie Hellman key exchange facilitate secure communication and digital verification through their reliance on intricate mathematical operations. Recent developments have pushed the boundaries further with quantum-resistant encryption to counteract the looming risks posed by quantum computing and homomorphic encryption, which enables encrypted data to be processed without exposing its contents. These breakthroughs address critical challenges in domains such as cloud computing, financial systems, and data-driven industries. This talk traces the trajectory of encryption technologies from their traditional origins to contemporary advancements, exploring their impact, limitations, and potential to secure future communications in a rapidly evolving technological landscape. Also talk will also discuss my own algorithm “Symmetric Encryption Algorithm using ASCII Values” written and its implementation. --- Slides and resources - https://pretalx.devconf.info/devconf-in-2025/talk/VQKLJR/

Video Information

Views
61

Total views since publication

Likes
2

User likes and reactions

Duration
43:20

Video length

Published
Mar 24, 2025

Release date

Quality
hd

Video definition

About the Channel