Chapter 10 Reviewer - Cryptography

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Chapter 10: Cryptography

10.1 Overview of Cryptography

 Definition: Cryptography is the practice of securing information by transforming it into an


unreadable format for unauthorized users, ensuring confidentiality, integrity, authentication, and
non-repudiation.

 Purpose: Protects data from unauthorized access, ensures data integrity, and verifies the identity
of users.

10.2 Basic Cryptographic Concepts

10.2.1 Plaintext and Ciphertext

 Plaintext: The original, readable data or message.

 Ciphertext: The transformed data that is unreadable to unauthorized users.

10.2.2 Key

 A piece of information used in the encryption and decryption processes. The security of
cryptographic systems often relies on the secrecy of the key.

10.2.3 Algorithms

 Encryption Algorithm: A mathematical procedure for performing encryption on data. Examples


include AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman).

 Decryption Algorithm: A method used to convert ciphertext back into plaintext.

10.3 Types of Cryptography

10.3.1 Symmetric Cryptography

 Definition: Uses the same key for both encryption and decryption.

 Examples: AES, DES (Data Encryption Standard), 3DES (Triple DES).

 Advantages:

o Faster than asymmetric encryption.

o Less computational overhead.

 Disadvantages:

o Key distribution challenge: Both parties must securely share the secret key.

10.3.2 Asymmetric Cryptography

 Definition: Uses a pair of keys: a public key for encryption and a private key for decryption.

 Examples: RSA, Diffie-Hellman, ECC (Elliptic Curve Cryptography).


 Advantages:

o Eliminates the key distribution problem inherent in symmetric encryption.

o Provides digital signatures for authentication.

 Disadvantages:

o Slower than symmetric encryption.

o More computationally intensive.

10.4 Cryptographic Hash Functions

 Definition: A one-way function that transforms input data into a fixed-length hash value, making
it infeasible to revert to the original data.

 Purpose: Ensures data integrity by generating unique hash values for data.

 Examples: SHA-256 (Secure Hash Algorithm), MD5 (Message Digest Algorithm 5).

 Characteristics:

o Deterministic: The same input produces the same hash output.

o Collision Resistance: It should be computationally infeasible to find two different inputs


that produce the same hash value.

o Pre-image Resistance: It should be infeasible to reverse the hash function to obtain the
original input from the hash value.

10.5 Digital Signatures

 Definition: A cryptographic method for verifying the authenticity and integrity of a message.

 Process:

o The sender creates a hash of the message and encrypts it with their private key to form
a digital signature.

o The recipient decrypts the signature using the sender's public key and compares the
hash with the received message hash.

 Purpose: Provides non-repudiation, ensuring that the sender cannot deny sending the message.

10.6 Key Management

 Importance: Effective key management is crucial for maintaining the security of cryptographic
systems.

 Key Lifecycle:

o Generation: Creating strong and secure cryptographic keys.

o Distribution: Safely sharing keys with authorized parties.


o Storage: Protecting keys from unauthorized access.

o Revocation: Disabling keys that are compromised or no longer in use.

o Destruction: Securely deleting keys when they are no longer needed.

10.7 Applications of Cryptography

 Data Encryption: Protecting sensitive information during transmission or storage (e.g., SSL/TLS
for web traffic).

 Secure Communications: Ensuring that only intended recipients can read messages (e.g., email
encryption with PGP).

 Authentication: Verifying the identity of users and devices (e.g., digital certificates).

 Integrity Checks: Ensuring data has not been altered during transmission (e.g., using hash
functions).

 Digital Rights Management (DRM): Protecting intellectual property by controlling access and
distribution.

10.8 Current Trends and Future Directions

 Quantum Cryptography: Explores cryptographic techniques resistant to quantum computing


attacks (e.g., Quantum Key Distribution).

 Post-Quantum Cryptography: Developing algorithms that remain secure against potential


quantum computing threats.

 Blockchain and Cryptography: Leveraging cryptographic techniques to secure transactions in


decentralized networks.

10.9 Challenges and Considerations

 Key Management Complexity: Proper key management is critical for security and can be a
challenge.

 Performance Impact: Cryptographic operations may introduce latency in communication and


processing.

 Compliance: Adhering to regulations and standards for data protection and encryption.

You might also like