Data Encryption and
Data Encryption and
8.1 INTRODUCTION
One of the most powerful and important methods for security in computer systems
is to encrypt sensitive records and messages in transit and in storage. Cryptography
has a long and colorful history. Historically, four groups of people have used and
contributed to the art of Cryptography, the military, the diplomatic corps, diarists,
and lovers. The military has had the most sensitive role and has shaped the field.
At present, information and data security plays a vital role in the security of the
country, the security of the corporate sector and also of every individual, working
for personal benefit.
8.2 OBJECTIVES
At the end of this unit, you will able to:
36 • discuss what is conventional cryptography and types of ciphers;
• explain the meaning of encryptions ; Data Encryption and
Digital Signatures
• describe Algorithms used in Cryptology;
• discuss encryption schemes, their merits and demerits;
• explain the meaning and use of Digital Signature;
• discuss cryptographic hash functions and cryptographic protocols and
mechanism;
• describe methodology for ensuring the secure distribution of keys for
cryptographic purposes; and
• explain the concept of trusted third parties and public key certificates.
JULIUSCAESAR Plaintext
74 85 76 73 85 83 67 65 69 83 65 82 Plaintext, ASCII
70 79 82 69 88 65 77 80 76 69 83 84 Key ASCII
Figure 2
A ONE-TIME PAD
One-time pad ciphers are unbreakable because they give no information to the
cryptanalyst. The primary difficulty with one-time pad is that the key must be as long
as the message itself, so key distribution becomes a problem, since a different pad
must be used for each communication.
CONSULT Keyword
E N C RYPT Plaintext:
I ONISP E
ENCRYPTIONSPERFORMEDBYWRITINGTHEPLAINTEXT
R FORMED
B YWR ITI
N G T H E P L cipher text:
A I N T E X
TEIRBNAPPETPXCNOWTNNOFYGIRIRRHTTEDILTYSMIEE
43
Cyberspace
8.7 DIGITAL SIGNATURE
People authenticate other people by recognising their faces, voices and handwriting.
Signatures on letterhead paper handle proof of signing raised seals and so on.
Handwriting, paper, and ink experts can usually detect tampering. But none of these
options are available electronically. That’s why the concept of Digital signature came
into existence to authenticate electronic documents.
The authenticity of many legal, financial, and other documents is determined by the
presence or absence of an authorized handwritten signature. For a computerised
message system to replace the physical transport of paper and ink documents
handwritten signatures have to be replaced by Digital Signatures. Basically what is
needed, is a system by which one party can send a “signed” message to another
party in such a way that
C) The receiver cannot possibly have concocted the message himself/ herself.
A digital signature is only a technique that can be used for different authentication
purposes. For an E-record, it comes functionally very close to the traditional hand-
written signatures. The user himself/ herself can generate key pair by using specific
crypto software. Now Microsoft IE and Netscape, allow the user to create his/ her
own key pair.
Here, the most important thing is how can the user be sure that public keys belong to
his/ her partner only? In this case, a third party (TTP) will guarantee the relationship
between the identity and the public keys. The TTP are popularly called Certified
Authorities (CAs).
Issuer, Issued to, orgnization name, organization unit, validity, Version, Public Keys,
Thumbprint, algorithms etc.
Secure Socket Layer (SSL) is the widely used protocol for digital certificates. The
Uniform Resource Locator (URL) starts with “https” instead of “http” and are
secured by SSL. At the bottom of the window, a lock symbol appears for SSL.
Generally 128 bits SSL are used.40 bits SSL are also available.
Hash functions may be used for data integrity as follows. The hash-value
corresponding to a particular input is computed at some point in time. The integrity
of this hash-value is protected in some manner. At a subsequent point in time, to
verify that the input data has not been altered, the hash-value is recomputed using
the input at hand, and compared for equality with the original hash-value. Specific
applications include virus protection and software distribution.
Hash functions as discussed above are typically publicly known and involve no
secret keys. When used to detect whether the message input has been altered, they
are called modification detection codes (MDCs). Related to these are hash functions
which involve a secret key, and provide data origin authentication as well as data
integrity; these are called message authentication codes (MACs).
Example (mechanism failure) Jack and Bond are communicating using a stream
cipher.
Messages which they encrypt are known to have a special form: the first twenty bits
carry information which represents a monetary amount. An active adversary can
simply XOR an appropriate bit string into the first twenty bits of cipher text and
change the amount. While the adversary has not been able to read the underlying
message, she has been able to alter the transmission. The encryption has not been
compromised but the protocol has failed to perform adequately; the inherent
assumption that encryption provides data integrity is incorrect.
Example (forward search attack) Suppose that in an electronic bank transaction
the bit field which records the value of the transaction is to be encrypted using a
public-key scheme. This simple protocol is intended to provide privacy of the value
field – but does it? An adversary could easily take all possible entries that could be
plaintext in this field and encrypt them using the public encryption function.
(Remember that by the very nature of public-key encryption this function must be
available to the adversary.) each of the cipher texts with the one which is actually
encrypted in the transaction, the adversary can determine the plaintext. Here the
public-key encryption function is not compromised, but rather the way it is used.
8.14 SUMMARY
• Encryption is one common method of protecting information transmitted over
unreliable lines where plain text is being converted to Cipher text and then
again to plain text.
• Basically there are two algorithms used for encryption .One is RSA and other
one is DES.
• RSA is an asymmetric cryptography and DES is symmetric one.
• A system where one secret key shared is called Symmetric or Secret Key
Cryptography.
• A cryptosystem where two different keys are used for encryption and
decryption is called Asymmetric or Public Key System.
• Digital signature is a technique to secure electronic information in such a way
that the originator of the information, as well as the integrity of information can
50 be verified with proper authentication.
• Digital certificates are provided by Certified Authorities (CAs) to authenticate Data Encryption and
Digital Signatures
that a particular site is globally secured.
• There are five common CAs in India. They are Safescrypt Ltd, TCS, IDRBT,
MTNL and NIC.
• A hash function is a computationally efficient function mapping binary strings of
arbitrary length to binary strings of some fixed length called hash-values. The
most common cryptographic uses of hash functions are with digital signatures
and for data integrity.
• Key establishment is any process whereby a shared secret key becomes
available to two or more parties, for subsequent cryptographic use.
• Key establishment can be subdivided into key agreement and key transport.
• Key management is the set of processes and mechanisms, which support key
establishment and the maintenance of ongoing keying relationships between
parties, including replacing older keys with new keys as and when necessary.
3. Silberschatz. Galvin, Gagne. Operating System Concepts. 7th ed. John Wiley
& Sons, 2006.
52