0% found this document useful (0 votes)
26 views

Cryptography

Cryptography is used to protect information through ensuring confidentiality, integrity, and authenticity of data. It uses algorithms and keys to encrypt plaintext into ciphertext that can only be decrypted by intended recipients. Popular symmetric algorithms include AES and Blowfish, while asymmetric techniques like RSA and Diffie-Hellman are used for key exchange and digital signatures. Secret-key encryption uses a shared key for encryption and decryption while public-key encryption has separate public and private keys.

Uploaded by

Poonam Dhankhar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Cryptography

Cryptography is used to protect information through ensuring confidentiality, integrity, and authenticity of data. It uses algorithms and keys to encrypt plaintext into ciphertext that can only be decrypted by intended recipients. Popular symmetric algorithms include AES and Blowfish, while asymmetric techniques like RSA and Diffie-Hellman are used for key exchange and digital signatures. Secret-key encryption uses a shared key for encryption and decryption while public-key encryption has separate public and private keys.

Uploaded by

Poonam Dhankhar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 11

Network Security

Aspects of security

Cryptography
Hidden writing Increasingly used to protect information Can ensure confidentiality
Integrity and Authenticity too

Plaintext A message in its natural format readable by an attacker Ciphertext Message altered to be unreadable by anyone except the intended recipients Key Sequence that controls the operation and behavior of the cryptographic algorithm

Cryptosystem The combination of algorithm, key, and key management functions used to perform cryptographic operations. Confidentiality - Only authorized entities are allowed to view. Integrity - Ensures the message was not altered by unauthorized individuals. Authenticity - Validates the source of a message, to ensure the sender is
properly identified.

Non repudiation deny having sent the message.

Establishes sender identity so that the entity cannot

Access Control -

Access to an object requires access to the associated crypto keys in many systems (e.g. login).

Examples
Some examples of popular and wellrespected symmetric algorithms include Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, RC4, 3DES, and IDEA. Examples of well-regarded asymmetric key techniques for varied purposes include: DiffieHellman key exchange protocol, DSS (Digital Signature Standard), ElGamal, Paillier cryptosystem, RSA encryption

Secret-key encryption

In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

Secret-key encryption is often called symmetric encryption because the same key can be used in both directions.

Public-key encryption

Combination

To have the advantages of both secret-key and public-key encryption, we can encrypt the secret key using the public key and encrypt the message using the secret key.

You might also like