Cryptography 2marks
Cryptography 2marks
Cryptography is the practice and study of techniques for securing communication and data
from unauthorized access. It ensures confidentiality, integrity, authenticity, and
non-repudiation of information. By using cryptographic techniques, sensitive information can
be encoded so that only authorized parties can understand it.
Types of cryptography:
Cryptography is generally classified into three main categories based on the type of
keys and algorithms used:
5. Applications of Cryptography:
1. Secure Communication (e.g., HTTPS, VPNs)
2. Data Integrity (e.g., hashes like SHA-256)
3. Authentication (e.g., digital certificates)
4. Digital Signatures (e.g., verifying document authenticity)
5. Secure Storage (e.g., encrypted files)
6. E-Commerce Security (e.g., online payment encryption)
7. Blockchain and Cryptocurrencies
8. Wireless Network Security (e.g., WPA3)
9. Email Security (e.g., PGP)
10. Banking and Financial Services (e.g., ATM transactions)
Plaintext
● Example: "7gf8$@#1ab!"
● Usage: Secures the message during transmission to prevent unauthorized access.
Relation:
7. Hash Functions
Definition:
A hash function is a cryptographic algorithm that takes an input (or message) and generates
a fixed-size string of characters, typically a hexadecimal value, called a hash or digest. The
process is one-way, meaning the original input cannot be derived from the hash.
Applications:
1. Data Integrity:
2. Digital Signatures:.
3. Password Storage:
4. Blockchain:
5. Message Authentication Codes (MACs):
1. Deterministic
2. Fast Computation
3. Fixed Output Size
4. Pre-image Resistance
5. Collision Resistance
6. Avalanche Effect
1. MD5
2. SHA (SHA-1, SHA-256, SHA-512)
3. BLAKE2
4. Argon2
5. RIPEMD
These algorithms work by using a single key for both encryption and decryption, making key
management and security crucial. Let me know if you'd like further details on any!
9. Permutation in Cryptography
Definition:
Permutation in cryptography refers to the rearrangement of data (bits or bytes) to increase
security by making the encryption process harder to reverse without the key.
Key Points:
Purpose:
● Confusion: Obscures the relationship between plaintext and ciphertext.
● Diffusion: Spreads plaintext information across the ciphertext.
In cryptographic systems, permutations are often combined with substitution steps to create
confusion and diffusion, essential principles for secure encryption. Let me know if you'd
like more details!
10. Cryptanalysis
Definition:
Cryptanalysis is the study and practice of attempting to break or weaken cryptographic
systems and algorithms. The goal is to find vulnerabilities or methods to decrypt ciphertext
without the original key.
Types of Cryptanalysis:
Purpose:
The MixColumns step ensures diffusion, spreading the influence of each byte across the
column, making encryption more secure. It:
It uses matrix multiplication over a Galois Field to mix bytes within each column of the AES
state
14. Expand:
1. RSA: Rivest-Shamir-Adleman
2. ECC: Elliptic Curve Cryptography
3. CRT: Chinese Remainder Theorem
4. MAC: Message Authentication Code
5. SSA: Schnorr Signature Algorithm
6. HTTP: HyperText Transfer Protocol
7. SET: Secure Electronic Transaction
8. PRIS: Public Resource Information System
Key Points:
CA (Certificate Authority)
Definition:
A Certificate Authority (CA) is a trusted entity responsible for issuing, verifying, and
managing digital certificates. The CA validates the identity of entities (individuals, websites,
organizations) and binds them to public keys, ensuring secure communication through
encryption.
RA (Registration Authority)
Definition:
A Registration Authority (RA) acts as an intermediary between the user and the CA. It
receives requests for digital certificates and authenticates the user's identity before the CA
issues the certificate. The RA does not directly issue certificates but verifies user information
on behalf of the CA.
Key Difference:
Roles: