keskiviikko 26. helmikuuta 2025

Homomorphic encryption can encrypt information better than other algorithms.



As you can see above. Homomorphic encryption handles information in encrypted mode. Or otherwise saying. The sender sends data to the receiver in encrypted mode. Then the cloud system makes the computing process. And then the cloud system transmits data to the receiver, who will decrypt the answer using its own decryption key. And that keeps the cloud services more secure than before. 

The encryption can also protect the system against malware. When the system stores data in encrypted mode, it can prevent malicious software from running. That keeps data safe, also in cases. Where thieves physically steal hard disks. 

The next part is taken from Wikipedia, Homomorphic Encryption. 

The homomorphic algorithms were useless when they were created in the 1970's. The best way to use that algorithm is to use it to secure data that travels between servers and clients. That means the homomorphic encryption is not so effective in communication between two equal workstations. However, the cloud-based data architecture makes homomorphic encryption more effective. In that model, the cloud is the tool that has a similar role. 

Homomorphic encryption is a form of encryption with an additional evaluation capability for computing over encrypted data without access to the secret key. The result of such a computation remains encrypted. Homomorphic encryption can be viewed as an extension of public-key cryptography. Homomorphic refers to homomorphism in algebra: the encryption and decryption functions can be thought of as homomorphisms between plaintext and ciphertext spaces.

Homomorphic encryption includes multiple types of encryption schemes that can perform different classes of computations over encrypted data. The computations are represented as either Boolean or arithmetic circuits. Some common types of homomorphic encryption are partially homomorphic, somewhat homomorphic, leveled fully homomorphic, and fully homomorphic encryption:

Partially homomorphic encryption encompasses schemes that support the evaluation of circuits consisting of only one type of gate, e.g., addition or multiplication.

Somewhat homomorphic encryption schemes can evaluate two types of gates, but only for a subset of circuits.

Leveled fully homomorphic encryption supports the evaluation of arbitrary circuits composed of multiple types of gates of bounded (pre-determined) depth.

Fully homomorphic encryption (FHE) allows the evaluation of arbitrary circuits composed of multiple types of gates of unbounded depth and is the strongest notion of homomorphic encryption.

For the majority of homomorphic encryption schemes, the multiplicative depth of circuits is the main practical limitation in performing computations over encrypted data. Homomorphic encryption schemes are inherently malleable. In terms of malleability, homomorphic encryption schemes have weaker security properties than non-homomorphic schemes". 


(Wikipedia, Homomorphic encryption)


As the supercomputers had in the past. So, we can say that in homomorphic encryption the system pushes the data handling process to the back office out from the user's eyes. The entire data handling process happens in the cloud. And that makes homomorphic encryption more secure than traditional two-stage (RSA) encryption. 

The two-stage homomorphic encryption can also make the networking between equal workstations more secure. In that model, the sender must not know the receiver's decryption key. The idea is that the sender sends data to the cloud. There the system encrypts the data again so that the receiver can open it using the receiver's own key. The system can look like RSA encryption. 

The public key that RSA uses can point the message to the right locker or receiving point. There the system decrypts the message so that the receiver can open it with its own individual key. The idea is that all the system users have their own, individual keys. One for encryption and one for decryption. The keys are made by random ASCII numbers and the part of the mark rows that the user gives. The user sees only a small part of that key. 

The encryption key is also the key that the system uses to accept information. If the key is wrong the system denies the message. The system hides its internal key-pair which is a combination of the sender's encryption key and the key that the system generates. 

That combination is the key that the system uses the encrypt information. Then receiving system uses that key and the receiver's private key to decrypt the message. The point where the sender sends data to the receiver is vulnerable. The system must keep encryption and decryption keys secret. The system must also be careful that the receiving system can decode that data using its own individual key. 


https://en.m.wikipedia.org/wiki/Homomorphic_encryption


Ei kommentteja:

Lähetä kommentti

The 4D optics are the optics that see things over time.

"A groundbreaking study has revealed how quantum light behaves at abrupt temporal boundaries, opening the door to an entirely new realm...