What Is Encryption ? How Encryption Works In Headend ?

encryption in headend

Encryption  Introduction

The word Encryption came from word Kryptos. Kryptos is a Greek word meaning of Kryptos is secret or hidden.

Encryption is the process in which we encrypt our data for protection from third parties. This is very essential thing in today’s technology. Even is early 1900 BC people were using encryption to send their messages but that technique was the different from now.

headend info book download

What  Is  Encryption

If you are a organization providing services to your subscribers and want to protect your data from stealing it by others then you should go for encryption technique. So encryption makes your organization enable to send the data in more secure way. There are different kind of algorithm which are applied to data to make it encrypted.

ENCRYPTION ALGORITHMS FOR HEADEND

As you can see in the figure there are some example of encryption algorithms. The speed of encryption and decryption of data is given in MBs there. You need to choose your appropriate algorithm. If you want faster speed of encryption then you should go with AES algorithm which encrypt your data with 183 Mbps and decrypt it in 178 MBps.

As we have discussed above encryption use the algorithm to protect your data from others So there are two types of Encryption Algorithm

(1) Symmetric Algorithm

(2) Asymmetric Algorithm

(1) Symmetric Algorithm

In symmetric algorithm there are basically two keys both are identical to each other but in electronics it is known as one key only because its identical for encrypt and decrypt the data.

To understand the symmetric algorithm we need to have the example of cristina and shiny.

Symmetric Algorithm Encryption

In this example cristina wants to send the message to shiny. She write her message in a box and lock her message by using the padlock and send it. Now this message is encrypted and at the other side the shiny receive the message and open it from the key that he already have and this key is identical to cristina’s key. Shiny got this key before sometime from any physical medium. So shiny applied this key which is identical and read the message. Also shiny can send the reply of this message from his padlock.

There are two parts of this encryption algorithm

stream ciphers

Block ciphers

stream ciphers encrypt the bit of the message at a time while block ciphers as its name indicates it encrypt the message bits in the blocks.

(2) Asymmetric Algorithm

There are two different keys are available in the asymmetric algorithm. One is public key and the other one is private key.

again we are going to have the example of cristina and shiny to understand it more.

asymmetric Algorithm in Encription for digital headend

In this asymmetric algorithm cristina is having the public key and first cristina needs to ask  shiny to send his open padlock from regular email. The shiny send his open padlock and cristina receive it then she type her secret message in it then she lock is by using her public key. Then she send the message that is encrypted to the shiny. The shiny use his private key and read the message.

The advantage of asymmetric algorithm is that we do not need to share our private key on the network so your key is safe. If someone get the copy  of the private key then he or she can not open the message sent by cristina because of different padlock.

Applications  Of  Encryption

SET TOP Boxes

Modems

Smart Cards

SIM Cards

ATM

   Know  More  About    ECM  and  EMM  In  CA  System

headend info

Comments



error: Want To Download These Articles ? Go To Books Tab !!!