0% found this document useful (0 votes)
6 views3 pages

Cryptography

This is a lecture note in the subject IAS1.

Uploaded by

Jonathan Paga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

Cryptography

This is a lecture note in the subject IAS1.

Uploaded by

Jonathan Paga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

IAS-Information Assurance and Security

Topic: Cryptography

Cryptography is a fundamental aspect of modern information security, enabling secure


communication and protecting sensitive data.

1. What is Cryptography?

Cryptography is the science of encoding and decoding information to protect it from


unauthorized access. It involves transforming plaintext (readable data) into ciphertext (encoded
data) using algorithms and keys. The primary goals of cryptography are confidentiality, integrity,
authenticity, and non-repudiation.

2. Historical Background

 Ancient Cryptography: The earliest known use of cryptography dates back to ancient
civilizations. For example, the Egyptians used hieroglyphs, while the Romans employed
the Caesar cipher, shifting letters in the alphabet.
 Middle Ages to Renaissance: During this period, cryptography became more
sophisticated. The Vigenère cipher, developed in the 16th century, utilized a keyword to
enhance security.
 Modern Cryptography: The 20th century saw significant advancements, particularly
during World War II with the development of systems like the Enigma machine. The
advent of computers and digital communication led to the creation of modern
cryptographic algorithms.

3. Key Concepts in Cryptography

 Plaintext and Ciphertext: Plaintext is the original message, while ciphertext is the
encrypted version. The process of conversion from plaintext to ciphertext is called
encryption, and the reverse is called decryption.

Ciphertext example:

To encrypt the original message into the ciphertext above, each letter of the text was
shifted three letters back in the alphabet. So to decrypt the message into readable
plaintext, you must shift each letter three letters forward in the alphabet. So “JV
PBZOBQ QBUQ” reads “MY SECRET TEXT”

So to decrypt the message into readable plaintext, you must shift each letter three
letters forward in the alphabet.

Instructor: Jonathan B. Paga. MIT


[email protected]
IAS-Information Assurance and Security
Topic: Cryptography

 Keys: A key is a piece of information used in the encryption and decryption processes.
The security of a cryptographic system largely depends on the secrecy and complexity of
the key.
 Algorithms: Cryptographic algorithms are mathematical procedures for encryption and
decryption. They can be symmetric or asymmetric.

4. Types of Cryptography

a. Symmetric Cryptography

 Definition: In symmetric cryptography, the same key is used for both encryption and
decryption.
 Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard).
 Advantages: Faster and more efficient for large data.
 Disadvantages: Key distribution can be problematic; if the key is intercepted, the
security is compromised.

b. Asymmetric Cryptography

 Definition: Asymmetric cryptography uses a pair of keys: a public key for encryption
and a private key for decryption.
 Examples: RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography).
 Advantages: Enhances security through the use of public keys; no need to share private
keys.
 Disadvantages: Slower than symmetric cryptography and computationally intensive.

5. Cryptographic Hash Functions

 Definition: Hash functions take an input and produce a fixed-size string of characters,
which appears random.
 Properties: Deterministic, collision-resistant, pre-image resistant.
 Uses: Password storage, data integrity checks, digital signatures.
 Examples: SHA-256, MD5 (though MD5 is no longer considered secure).

6. Applications of Cryptography

 Secure Communication: Cryptography secures email, messaging apps, and voice


communications.
 Data Protection: It protects sensitive information stored in databases and cloud services.
 Digital Signatures: Used to verify the authenticity and integrity of digital messages or
documents.
 Blockchain Technology: Cryptographic techniques underpin cryptocurrencies, ensuring
secure transactions and data integrity.

Instructor: Jonathan B. Paga. MIT


[email protected]
IAS-Information Assurance and Security
Topic: Cryptography

7. Challenges and Future of Cryptography

 Quantum Computing: The rise of quantum computing poses a threat to traditional


cryptographic systems. Quantum algorithms could potentially break widely used
encryption methods.
 Regulatory Issues: As governments seek to balance security and privacy, regulations
around cryptography are evolving.
 Post-Quantum Cryptography: Research is ongoing to develop cryptographic systems
that can withstand quantum attacks.

8. Conclusion

Cryptography is an essential component of contemporary digital security. Its evolution from


ancient techniques to modern algorithms reflects the increasing complexity and necessity of
safeguarding information in a digital world. As technology continues to advance, the field of
cryptography will need to adapt and innovate to address emerging threats and challenges.

Understanding cryptography is vital not only for IT professionals but for anyone engaged in the
digital economy, as it plays a crucial role in protecting personal and organizational data from
malicious actors.

Instructor: Jonathan B. Paga. MIT


[email protected]

You might also like