Cryptography Answer
Cryptography Answer
6)Who is/are responsible for private key in asymmetric key cryptography -- sender
receiver both
Q.1)Goals of Cryptography
The Main Goals of cryptography
• Data Privacy(confidentiality)
• Data Authenticity(it came from from where it claims)
• Data integrity(it has not been modified on the way) in the digital world
Confidentiality
Data Integrity
• Integrity Ensures that the message received is the same as the message
that was sent
• Uses hashing to create a unique message digest from the message that
is sent along with the message
• Recipient uses the same technique to create a second digest from the
message to compare to the original one
• This technique only protects against unintentional alteration of the
message
• A variation is used to create digital signatures to protect against
malicious alteration
Authentication
• A user or system can prove their identity to another who does not have
personal knowledge of their identity
• Accomplished using digital certificates
• Kerberos is a common cryptographic authentication system
Example
A simple example for a transposition cipher is columnar transposition cipher where
each character in the plain text is written horizontally with specified alphabet width. The
cipher is written vertically, which creates an entirely different cipher text.
Consider the plain text hello world, and let us apply the simple columnar transposition
technique as shown below
The plain text characters are placed horizontally and the cipher text is created with
vertical format as : holewdlo lr. Now, the receiver has to use the same table to decrypt
the cipher text to plain text.
Explanation
• Using the function split_len(), we can split the plain text characters, which can be
placed in columnar or row format.
• encode method helps to create cipher text with key specifying the number of
columns and prints the cipher text by reading characters through each column.
Confusion:
Confusion means that the key does not relate in a simple way to the
ciphertext. In particular, each character of the ciphertext should depend on several
parts of the key. For example, suppose we have a Hill cipher with an n*n matrix,
and suppose we have a plaintext-ciphertext pair of length n2 with which we are
able to solve for the encryption matrix. If we change one character of the
ciphertext, one column of the matrix can change completely. Of course, it would
be more desirable to have the entire key change. When a situation like that
happens, the cryptanalyst would probably need to solve for the entire key
simultaneously, rather than piece by piece.
Algorithm Private Key is used to both encrypt and The public key is only used to encrypt
1 decrypt the data and is shared between the data and to decrypt the data, the
sender and receiver of encrypted data. private key is used and is shared.
2 Performance The private key mechanism is faster. The public key mechanism is slower.
Secret The private key is kept secret and not The public key is free to use and the
3 public to anyone apart from the sender and private key is kept secret only.
receiver.
Type The private key mechanism is called The public key mechanism is called
4 symmetric being a single key between two asymmetric being two keys for
parties. different purposes.
Sharing The private key is to be shared between The public key can be used by anyone
5 two parties. but the private key is to be shared
between two parties only.
Targets Performance testing checks the reliability, Load testing checks the sustainability
6
scalability, and speed of the system. of the system.