-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Implement Encryption with Hash Digest #10
base: main
Are you sure you want to change the base?
feat: Implement Encryption with Hash Digest #10
Conversation
sir, Please review my pull request. |
@anushkaVerma1007, since you are using AES, the key used on encryption side and decryption side should be the same. How is the key getting transferred between devices? Where are the functions generateHash and verifyHash getting called on Data Block? |
@SaiDheerajPeketi , apologies for the oversight. I have implemented the generateHash and verifyHash, but not integrated. The should be generated before sending the data, and on the recievers side, it should be verfied after decryption. Is this correct approach? |
If you are generating hash on sender's side after encryption then you have to verify before decryption on receiver's side. This would be the better approach compared to calculating hash before encryption. |
@SaiDheerajPeketi yes sir this is correct approach to do the task.. |
@anushkaVerma1007 Any updates? |
@Pra-San sir can I correct my implementation and submit another pull request ? |
@anushkaVerma1007 you can update this PR once you are done with your implementation. |
@anushkaVerma1007 Any updates? |
@anushkaVerma1007 Transfer process is crashing with the error: |
🚀 ### Feature: Implement Chunk-Based Data Encryption and Integrity Verification for Secure Data Transfer
Description
This pull request implements a mechanism for encrypting data in chunks before transfer and decrypting it after transfer completion as described in issue #3. The changes include the generation of a hash digest for each chunk to ensure data integrity during transmission. The changes involves:
Related Issue
Fixes #3
Type of change
Motivation and Context
This change is required to enhance data security during transfers, addressing vulnerabilities associated with unencrypted data. Implementing encryption and integrity checks mitigates risks related to interception and tampering.
How Has This Been Tested?
their hash digests.
Screenshots (if appropriate):
Checklist:
Test Configuration: