0% found this document useful (0 votes)
1 views

Cryptography

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Cryptography

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Public

Two keys
Private

Trap Door Functions Very Difficult to factor large prime numbers

Certificates used to
Key Transfer PKI Authority
verify sender

Process to Generate Key Pair Relies


EX: Try to factor 100,160,063
heavily on semi-prime numbers that
Rives Shimear without any help....
are difficult to factor
Adlemen (RSA)
Use at least a
Preferably 4096
2048-bit key

1) User 1 Generates key P1 = K1 * F

2) User 2 does same as above


Utilizes property of elliptic curves where two points 3) User 1 can send User 2
Process S = K1 * P2
added can generate a third point on the curve message via shared secret

Elliptic Curve 4) User2 can generate same


S = K2 * P1
Cryptography shared secret independently
(ECC)
Criticism Lack of analysis

Used in mobile devices


with the AES algo
One key cannot be derived from having Benefits Low computing power
Perfect forward secrecy
possession of another key Can work with
lower sized keys
TCP/IP layer 4
Transport - Encryption Made in 1975 First one
SSL/TLS
Only a methodology for two parties to come up with the same session key Key Exchange Protocol
Sender and
Receiver is Non-repudiation Works by obfuscating based
Cryptographic Objectives off really hard discrete
EX: 3^? mod 17 =
verified 2314692094782383457
log problems
Hands key to third party
Group 1 748-bit modulus
Retrieve private key to decrypt Used for law Diffie Hellman
data needed in court enforcement Key Escrow Group 2 1024-bit modulus

Group 5 1536-bit modulus


Retrieve data in the situation where data
Used by corporations
holder is no longer present Diffie-Hellman Groups Group 14 2048-bit modulus
Asymmetrical Group 19 256-bit ECC
Can tell very easily if data
Measure data disruption
has been intercepted Group 20 384-bit ECC
Quantum Cryptography
Prime factorization is Group 21 521-bit ECC
Obsolete RSA, Blowfish, RC4 Cryptanalysis
nothing for a quantum cpu Algos
Originally Made to
Hiding messages encrypt email
Ensuring integrity Purpose 1) Generate
Random Key
Verify source
Relies on the random key that is
2) Encrypt Data with key
generated by the sender
Breaking codes
3) Encrypt Key
Key retrieval Concepts using receivers key

Brute force Phil Zimmerman came up


Trying to Cryptanalysis with this by himself.....
Try to determine determine
Differential
key for encryptions by comparing input to output cipher text plaintext "PGP Certificates"

Uses simplified cipher to discover No big companies


Linear
full key through heuristics or hierarchal structure
Generates a
Relies on each users
Art of hiding messages in images "web of trust" (Originally)
due dilligence
Non-Suspicious Medium creates PGP/GPG Usually just PKI now
barrier to initial analysis Stegonagraphy
Bit locker
Determine the offset that will not Least-Significant Bit
cause disruptions in image (LSB) encoding Filevault
Encrypt mass storage
Symantec Corporation Enterprise/Cloud
Use of cryptographic hashes to Uses special certificates solution
verify the authenticity of a
message or software
Signing
Typically Used in
Free
Asymetric Encryption
Cryptography OpenPGP PKI support
Works without
Unsigned Certificates
third party Email only

Done by getting signatures Linux based


from other people version of PGP
Digital Signatures GPG
Highly complex Web of Trust Other services
then email
Almost never used
in web browser
Shared secret method
Top is
certificate Key must be
authority transferred
Public Key Key management is
Hierarchal Method extremely important securely
Medium intermediate Infrastructure
certificate authoroity Key must be complex
Last are users
1) Generate 64 bitKey
Electronic Code 2) Permutate Key
After a certain length patterns can be found
Books Have Issues
3) Split off 48 Bit Subkey
Add an initial vector
Split Main Key
Cipher Block Chains (CBC)
Each block 4) Feistel Function into two 32 bit
gets a new key Process
3DES XOR Halves with subkey
Encrypt
5) Apply s-boxes
initialization
Vector 6) Encrypt Data
Cipher Feed Back
XOR to the first block 7) Repeat 15 times
Block Chain (Normal DES) or 45 times (Triple DES)
Recycle last piece of
block and encrypt Block Cipher
Symmetric
NONCE and COUNTER Symmetric Block
Encryption
NONCE is fixed Algos
128-bit Symmetric Block
COUNTER increments AES
CTR Key Size can either be
Add both NONCE 128, 192, or 256 bits
and COUNTER
Rounds can either be 10, 12, 14
Encrypt data and then respective to Key Size
increment COUNTER
64 Bit Size
Symmetric that is used for authentication Blowfish Size anywhere from
for the duration of a session Uncontrollable
32-bits - 448-bits
Session Keys
Auto generated Twofish
through random seed
1 bit at a time
Used once and Stream Cipher
(i.e. a Token)
only once
Ephemeral keys 1 Round
RC4
Key Size is anywhere from
40-bits - 2048-bits

Fast and few


requirements

Ensures integrity of messages


1 - Way
Encryption Passwords
Method Uses
Image Matching

Cryptanalysis Collision attacks

MD5 Can generate Collisions

Hashing 1 160 bit hash Can generate collisions

2 256 bit hash

SHA 5 512 bit hash


Algos
Not really used
RIPEMD
Bit versions 128,160,256,320

Requires a
HMAC
symmetric key

You might also like