Encryption Techniques From Traditional To Modern Encryption Technique - Devconf2025
Speaker: Dr. Uma Pujeri --- Encryption has played a vital role in safeguarding communication throughout history, adapting to the growing complexity of thre...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Speaker: Dr. Uma Pujeri
---
Encryption has played a vital role in safeguarding communication throughout history, adapting to the growing complexity of threats and the ever-increasing need for data privacy in modern times. Early methods, such as the Caesar cipher and substitution techniques, introduced fundamental ideas for securing information. While these traditional approaches were innovative for their era, they were limited in resilience, often susceptible to frequency analysis and basic decryption attempts.
With the advent of modern computing, encryption methods advanced significantly, in The digital age brought revolutionary advancements in encryption, including the development of symmetric key algorithms like the Data Encryption Standard (DES). Introduced in the 1970s, DES became a widely adopted standard for data protection, relying on a single shared key for both encryption and decryption. While DES marked a significant milestone, its 56-bit key length eventually proved vulnerable to brute force attacks, prompting the adoption of more robust successors like Triple DES (3DES) and the Advanced Encryption Standard (AES). introducing sophisticated algorithms capable of withstanding more complex attacks. AES algorithm is optimized for speed and efficiency, making them ideal for protecting large volumes of data. Meanwhile, asymmetric encryption systems such as RSA and Diffie Hellman key exchange facilitate secure communication and digital verification through their reliance on intricate mathematical operations.
Recent developments have pushed the boundaries further with quantum-resistant encryption to counteract the looming risks posed by quantum computing and homomorphic encryption, which enables encrypted data to be processed without exposing its contents. These breakthroughs address critical challenges in domains such as cloud computing, financial systems, and data-driven industries. This talk traces the trajectory of encryption technologies from their traditional origins to contemporary advancements, exploring their impact, limitations, and potential to secure future communications in a rapidly evolving technological landscape.
Also talk will also discuss my own algorithm “Symmetric Encryption Algorithm using ASCII Values” written and its implementation.
---
Slides and resources - https://pretalx.devconf.info/devconf-in-2025/talk/VQKLJR/
Video Information
Views
61
Total views since publication
Likes
2
User likes and reactions
Duration
43:20
Video length
Published
Mar 24, 2025
Release date
Quality
hd
Video definition