<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Himanshu</title>
    <description>The latest articles on DEV Community by Himanshu (@himanshu_raj55).</description>
    <link>https://dev.to/himanshu_raj55</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1707626%2Fabff4c80-5dbb-4c19-b398-5b456f910790.jpg</url>
      <title>DEV Community: Himanshu</title>
      <link>https://dev.to/himanshu_raj55</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/himanshu_raj55"/>
    <language>en</language>
    <item>
      <title>Access control models in cryptography</title>
      <dc:creator>Himanshu</dc:creator>
      <pubDate>Sun, 30 Jun 2024 19:29:56 +0000</pubDate>
      <link>https://dev.to/himanshu_raj55/access-control-models-in-cryptography-dme</link>
      <guid>https://dev.to/himanshu_raj55/access-control-models-in-cryptography-dme</guid>
      <description>&lt;p&gt;Access control models are used to only allows access to an authentic user or resource. These allows to create protocols as to who can use a particular resource in an organization.&lt;/p&gt;

&lt;p&gt;There are various access control models some of which are stated below:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Discretionary access control: In discretionary access control the access control rules are create by the resource owner. Is considered less secure due to the possibility of the access protocols by the resource owner&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Mandatory access control: The access control is defined by a central authority based on predefined security rules. Access is based on classification of various users and resources. Used by military and goverment organization. Is more secure due to strict rules by the central authority&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Rule based access control: In rule based access control the access is defined based on rules defined by the system administrator. Is is similar to Mandatory access control but is more versatile. Can be used with other models as well&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Role based access control: The access control is based on roles. Can be used on corporate organizations. Is simple and straightforward. Flexible and simplifes the role as access basis&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Attribute based access control: The access granted is based on a variety of attributes , such as user attributes , resource attributes, environmental factors. Is very flexible model&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Context based access control: The access is based on context, such as user type, location ,timezone. Used in mobile and cloud communication&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Identitity based access control: The access is based on user identity. Can be user alongside DAC or other access control model&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Time based access control: The access is based on time intervals. Can be used by organizations with strict shift based policies&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Risk adaptive access control: The access is based of risk factors. Used by banks to decide whether to grant access considering mulitple risk factors&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>Confusion vs Diffusion in cryptography</title>
      <dc:creator>Himanshu</dc:creator>
      <pubDate>Sun, 30 Jun 2024 16:36:16 +0000</pubDate>
      <link>https://dev.to/himanshu_raj55/confusion-vs-diffusion-in-cryptography-i0n</link>
      <guid>https://dev.to/himanshu_raj55/confusion-vs-diffusion-in-cryptography-i0n</guid>
      <description>&lt;p&gt;Confusion and Diffusion are essential concepts in cyrptography and network security. Both confusion and diffusion are cryptographic techniques that are used to stop the deduction of the secret writing key from the attacker.&lt;/p&gt;

&lt;p&gt;The major differences between confusion and diffusion are as follows:&lt;/p&gt;

&lt;p&gt;Confusion:                                Diffusion:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In confusion the relationship between  1. In diffusion the
the key and the ciphertext is obscured       the relationship between the 
                                         plaintext and ciphertext is 
                                         obscured&lt;/li&gt;
&lt;li&gt;Confusion creates faint cipher text    2. Diffusion creates cryptic
                                         plain text&lt;/li&gt;
&lt;li&gt;Confusion uses substitution            3. Diffusion uses transposition&lt;/li&gt;
&lt;li&gt;Vagueness is increased in the          4. Redundancy is increased in 
resultant                                 in the resultant&lt;/li&gt;
&lt;li&gt;Both stream and block cipher uses      5. Only block cipher uses 
confusion                                 diffusion&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>cryptography</category>
      <category>cybersecurity</category>
      <category>cipher</category>
    </item>
  </channel>
</rss>
