Chapter 10 Reviewer - Cryptography
Chapter 10 Reviewer - Cryptography
Chapter 10 Reviewer - Cryptography
Purpose: Protects data from unauthorized access, ensures data integrity, and verifies the identity
of users.
10.2.2 Key
A piece of information used in the encryption and decryption processes. The security of
cryptographic systems often relies on the secrecy of the key.
10.2.3 Algorithms
Definition: Uses the same key for both encryption and decryption.
Advantages:
Disadvantages:
o Key distribution challenge: Both parties must securely share the secret key.
Definition: Uses a pair of keys: a public key for encryption and a private key for decryption.
Disadvantages:
Definition: A one-way function that transforms input data into a fixed-length hash value, making
it infeasible to revert to the original data.
Purpose: Ensures data integrity by generating unique hash values for data.
Examples: SHA-256 (Secure Hash Algorithm), MD5 (Message Digest Algorithm 5).
Characteristics:
o Pre-image Resistance: It should be infeasible to reverse the hash function to obtain the
original input from the hash value.
Definition: A cryptographic method for verifying the authenticity and integrity of a message.
Process:
o The sender creates a hash of the message and encrypts it with their private key to form
a digital signature.
o The recipient decrypts the signature using the sender's public key and compares the
hash with the received message hash.
Purpose: Provides non-repudiation, ensuring that the sender cannot deny sending the message.
Importance: Effective key management is crucial for maintaining the security of cryptographic
systems.
Key Lifecycle:
Data Encryption: Protecting sensitive information during transmission or storage (e.g., SSL/TLS
for web traffic).
Secure Communications: Ensuring that only intended recipients can read messages (e.g., email
encryption with PGP).
Authentication: Verifying the identity of users and devices (e.g., digital certificates).
Integrity Checks: Ensuring data has not been altered during transmission (e.g., using hash
functions).
Digital Rights Management (DRM): Protecting intellectual property by controlling access and
distribution.
Key Management Complexity: Proper key management is critical for security and can be a
challenge.
Compliance: Adhering to regulations and standards for data protection and encryption.