Cryptography
Cryptography
Aspects of security
Cryptography
Hidden writing Increasingly used to protect information Can ensure confidentiality
Integrity and Authenticity too
Plaintext A message in its natural format readable by an attacker Ciphertext Message altered to be unreadable by anyone except the intended recipients Key Sequence that controls the operation and behavior of the cryptographic algorithm
Cryptosystem The combination of algorithm, key, and key management functions used to perform cryptographic operations. Confidentiality - Only authorized entities are allowed to view. Integrity - Ensures the message was not altered by unauthorized individuals. Authenticity - Validates the source of a message, to ensure the sender is
properly identified.
Access Control -
Access to an object requires access to the associated crypto keys in many systems (e.g. login).
Examples
Some examples of popular and wellrespected symmetric algorithms include Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, RC4, 3DES, and IDEA. Examples of well-regarded asymmetric key techniques for varied purposes include: DiffieHellman key exchange protocol, DSS (Digital Signature Standard), ElGamal, Paillier cryptosystem, RSA encryption
Secret-key encryption
In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.
Secret-key encryption is often called symmetric encryption because the same key can be used in both directions.
Public-key encryption
Combination
To have the advantages of both secret-key and public-key encryption, we can encrypt the secret key using the public key and encrypt the message using the secret key.