Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
22 views3 pages

Cryptography: Concepts & Types

Uploaded by

dwenbeagarcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views3 pages

Cryptography: Concepts & Types

Uploaded by

dwenbeagarcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 10: Cryptography

10.1 Overview of Cryptography

 Definition: Cryptography is the practice of securing information by transforming it into an


unreadable format for unauthorized users, ensuring confidentiality, integrity, authentication, and
non-repudiation.

 Purpose: Protects data from unauthorized access, ensures data integrity, and verifies the identity
of users.

10.2 Basic Cryptographic Concepts

10.2.1 Plaintext and Ciphertext

 Plaintext: The original, readable data or message.

 Ciphertext: The transformed data that is unreadable to unauthorized users.

10.2.2 Key

 A piece of information used in the encryption and decryption processes. The security of
cryptographic systems often relies on the secrecy of the key.

10.2.3 Algorithms

 Encryption Algorithm: A mathematical procedure for performing encryption on data. Examples


include AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman).

 Decryption Algorithm: A method used to convert ciphertext back into plaintext.

10.3 Types of Cryptography

10.3.1 Symmetric Cryptography

 Definition: Uses the same key for both encryption and decryption.

 Examples: AES, DES (Data Encryption Standard), 3DES (Triple DES).

 Advantages:

o Faster than asymmetric encryption.

o Less computational overhead.

 Disadvantages:

o Key distribution challenge: Both parties must securely share the secret key.

10.3.2 Asymmetric Cryptography

 Definition: Uses a pair of keys: a public key for encryption and a private key for decryption.

 Examples: RSA, Diffie-Hellman, ECC (Elliptic Curve Cryptography).


 Advantages:

o Eliminates the key distribution problem inherent in symmetric encryption.

o Provides digital signatures for authentication.

 Disadvantages:

o Slower than symmetric encryption.

o More computationally intensive.

10.4 Cryptographic Hash Functions

 Definition: A one-way function that transforms input data into a fixed-length hash value, making
it infeasible to revert to the original data.

 Purpose: Ensures data integrity by generating unique hash values for data.

 Examples: SHA-256 (Secure Hash Algorithm), MD5 (Message Digest Algorithm 5).

 Characteristics:

o Deterministic: The same input produces the same hash output.

o Collision Resistance: It should be computationally infeasible to find two different inputs


that produce the same hash value.

o Pre-image Resistance: It should be infeasible to reverse the hash function to obtain the
original input from the hash value.

10.5 Digital Signatures

 Definition: A cryptographic method for verifying the authenticity and integrity of a message.

 Process:

o The sender creates a hash of the message and encrypts it with their private key to form
a digital signature.

o The recipient decrypts the signature using the sender's public key and compares the
hash with the received message hash.

 Purpose: Provides non-repudiation, ensuring that the sender cannot deny sending the message.

10.6 Key Management

 Importance: Effective key management is crucial for maintaining the security of cryptographic
systems.

 Key Lifecycle:

o Generation: Creating strong and secure cryptographic keys.

o Distribution: Safely sharing keys with authorized parties.


o Storage: Protecting keys from unauthorized access.

o Revocation: Disabling keys that are compromised or no longer in use.

o Destruction: Securely deleting keys when they are no longer needed.

10.7 Applications of Cryptography

 Data Encryption: Protecting sensitive information during transmission or storage (e.g., SSL/TLS
for web traffic).

 Secure Communications: Ensuring that only intended recipients can read messages (e.g., email
encryption with PGP).

 Authentication: Verifying the identity of users and devices (e.g., digital certificates).

 Integrity Checks: Ensuring data has not been altered during transmission (e.g., using hash
functions).

 Digital Rights Management (DRM): Protecting intellectual property by controlling access and
distribution.

10.8 Current Trends and Future Directions

 Quantum Cryptography: Explores cryptographic techniques resistant to quantum computing


attacks (e.g., Quantum Key Distribution).

 Post-Quantum Cryptography: Developing algorithms that remain secure against potential


quantum computing threats.

 Blockchain and Cryptography: Leveraging cryptographic techniques to secure transactions in


decentralized networks.

10.9 Challenges and Considerations

 Key Management Complexity: Proper key management is critical for security and can be a
challenge.

 Performance Impact: Cryptographic operations may introduce latency in communication and


processing.

 Compliance: Adhering to regulations and standards for data protection and encryption.

You might also like