Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

UNIVERSITY OF

POONCH RAWLAKOT

KAHUTA HAVELI

CAMPUS

Name:- Kashif Riaz Rathore

Roll no:- 24

Subject:- Data & Network Security

Department:- Computer Science

Semester:- 7th

Assignment No:- 04

Submitted To:- Respected Sir (Adil Riaz)

1) End-to-End Encryption (E2EE)


2) Link Encryption
The basic role of E2EE & Link encryption is safeguarding sensitive
information and ensuring secure communication channel.
1|Page
1) End-to-End Encryption (E2EE)
It is use for secure communication between users. To deliver a message
securely to destination host and protect them from hackers or 3rd persons
on internet.
It encrypt the data on sender device and decrypt on receiver device. The
data is useless for any 3rd person because it is meaningless until it is
converted into plan text.
In E2EE the message is encrypted by using symmetric key. This key is
only known to the the sender and recipient. Then the data is send on the
internet.
On the receiving side the encryption message is decrypt by the key that is
shared by sending side and then data is converted in read able format.

Popular messaging application that is use E2EE like whats app and some
e-mail services.

2|Page
2) Link Encryption

Link encryption focusing on securing communication link between


sender and receiver OR network devices.
The data is encrypted before it is transmitted over a communication
link (cable, fiber optic connection or wireless channel).
The data remains safe and indecipherable to unauthorized parties
without decryption key.

VPN is a common implementation of link encryption that establish


secure link over public networks.
It encrypt data before transmitted on internet to secure the data from
unauthorized users because it’s use proxy server.

Another common example of link encryption is secure socket layer


(SSL). That is cryptography protocol. It generate extra layer on data to
protect from third person.

3|Page
Link encryption Vs End to End encryption
Link encryption:- encrypt a packet at every network on its way from the
source network to the destination network.

 Encryption handled at the network routers.


 Data is exposed at the intermediate routers.
 Every network on the source-destination path needs to support
encryption, otherwise no use
 Encryption keys are to be maintained for every pair of network
router

End-To-End encryption:- the application user encrypts the data

 No need for the network to support encryption


 Data is not exposed at intermediate routers
 Encryption keys need to be maintained on per-user basis

4|Page

You might also like