0% found this document useful (0 votes)
41 views38 pages

Information Security 05 - Encryption

Encryption is a key technique in information security that converts plaintext into ciphertext to protect data confidentiality and integrity. It involves the use of algorithms and keys, with symmetric and asymmetric encryption as the two primary types. Key management is crucial, as the security of encrypted data relies on the secrecy of the keys used in the encryption process.

Uploaded by

faiziikanwal47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views38 pages

Information Security 05 - Encryption

Encryption is a key technique in information security that converts plaintext into ciphertext to protect data confidentiality and integrity. It involves the use of algorithms and keys, with symmetric and asymmetric encryption as the two primary types. Key management is crucial, as the security of encrypted data relies on the secrecy of the keys used in the encryption process.

Uploaded by

faiziikanwal47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Encryption

• Encryption is a fundamental technique used in information


security
to protect the confidentiality and integrity of data.
• It involves the process of converting plain text or data
into an encoded form called ciphertext, which can only
be accessed and understood by authorized parties with the
corresponding decryption key.
Encryption
cont… Key
• Cryptography
Terms
comes from the Greek words kryptos,
meaning “hidden,”
and graphein, meaning “to write,” and involves making and using
codes to secure messages.

• Cryptanalysis involves cracking or breaking encrypted


messages back into their unencrypted origins.

• Cryptography uses mathematical algorithms that are usually known to


all.
Encryption
cont… Key
Terms
• After all, cryptography is not the knowledge of the algorithm
that
protects the encrypted message, it’s the knowledge of the

key, a series of characters or bits injected into the

algorithm along with the original message to create the

encrypted message.
Encryption
cont… Key
• Cipher: When used asTerms
a verb, the transformation of the
individual components (characters, bytes, or bits) of an
unencrypted message into encrypted components or vice
versa;

• Cipher: When used as a noun, the process of encryption


or the algorithm used in encryption, and a term
synonymous with cryptosystem.
Encryption
cont… Key
Terms
• Encryption(Encipher):The process of an
converting origin
message (plaintext) into a form that cannot be usedalby
unauthorized

individuals (ciphertext). Also referred to as enciphering.

• Encryption renders the data contents to unreadable and

inaccessible form, unless one have the decryption key.


Encryption
cont… Key
• Decryption Terms
(Decipher): The process of converting an
encoded or enciphered message (ciphertext) back to its
original readable form (plaintext). Also referred to as
deciphering.

• Decryption requires two elements: the correct


password and the
corresponding decryption algorithm.
Encryption
cont… Key
• Plaintext or
Terms
cleartext: is an
unencrypted, readable, plain message
that anyone can read.

• Ciphertext: is the result of the encryption process.


• The encrypted plaintext appears as
apparently random strings of characters.
Encryption
cont… Key
Terms
• Algorithm: The mathematical formula or method used to
convert an
unencrypted message into an encrypted message.
• This sometimes refers to the programs that enable the
cryptographic processes.

• Code: The process of converting components (words/


phrases) of an
unencrypted message into encrypted components.
Encryption
cont… Key
• Bit stream Terms
cipher: An encryption method that involves
converting plaintext to ciphertext one bit at a time.

• Block cipher: An encryption method that involves


dividing the plaintext into blocks or sets of bits and then
converting the plaintext to ciphertext one block at a time.
Encryption
cont… Key
• Key or cryptovariable:Terms
The information used in conjunction
with the algorithm to create the ciphertext from the
plaintext; it can be a series of bits used in a
mathematical algorithm or the knowledge of how to
manipulate the plaintext.

• Key tells the algorithm how to transform the plaintext into


ciphertext.
Encryption
cont… Key
• Kerckhoffs's Terms
principle states that “only
secrecy of the key provides security”.

• Another law states that: “encrypted data is only as


secure as its decryption key”.

• These statements influence the role of encryption, and keys.


Encryption
cont… Key
• Keeping the
Terms
details of an entire algorithm secret
encryption is
extremely difficult; keeping a much smaller key secret is
easier.
• The key locks and unlocks the algorithm, allowing the
encryption or decryption process to function.

• Keyspace: The entire range of values that can be used to


construct an individual key.
Encryption
cont… Key
• Link encryption: Terms
A series of encryptions and decryptions
between a number of systems, wherein each system in
a network decrypts the message sent to it and then
reencrypts the message using different keys and sends it
to the next neighbor.

• This process continues until the message reaches the


final destination.
Encryption
cont… Key
• Steganography: The Terms
process of hiding messages; for
example, hiding a message within the digital encoding
of a picture or graphic so that it is almost impossible to
detect that the hidden message even exists.

• Work factor: The amount of effort (usually expressed in units


of time)
required to perform cryptanalysis on an encoded message.
Encryption
cont… Key
Termsyour password, it uses an
• Hash: When a website encrypts
encryption algorithm to convert your plaintext password to a
hash.

• A hash is different from encryption in that once the data is


hashed, it cannot be unhashed. Or rather, it is extremely
difficult.

• Hashing is really useful when you need to verify


Encryption
cont… Key
Terms
• Symmetric and Asymmetric Algorithms:
two primary encryption

algorithm types: symmetric and asymmetric.

• They both encrypt data, but function in a slightly different


manner.
Encryption
cont… Key
Terms
• Symmetric algorithm: Also known as
secret-key encryption, private

Key encryption or shared-key encryption.

• Uses the same key for both encryption and decryption.

• Both parties must agree on the algorithm key before

commencing communication.
Encryption
cont… Key
Terms8. RC6
• Symmetric Encryption Algorithms types:

1. Advanced Encryption Standard (AES) 9. Serpent

2. Data Encryption Standard (DES) 10. Camellia

3. Triple Data Encryption Standard (3DES) 11. CAST-


128
4. Blowfish 12. CAST-
256
5. Twofish 13. IDEA

6. RC4 14. SEED

7. RC5 15. Skipjack


Encryption
cont… Key
Terms
• Advanced Encryption use symmetri
Standard (AES): A widely d c
encryption algorithm known for its security and
efficiency.

• It supports key sizes of 128, 192, or 256 bits.


Encryption
cont… Key
Terms
• Data Encryption Standard (DES): An
older symmetric encryption

algorithm that uses a 56-bit key.

• While DES is considered less secure by today's standards, it

still finds some limited use.


Encryption
cont… Key
Terms
• Triple Data Encryption Standard (3DES): It applies the DES
algorithm
three times to each data block, providing a higher level of

security than DES.

• 3DES supports key sizes of 112 or 168 bits.


Encryption
cont… Key
Terms
Encryption
cont… Key
Terms

Average Time Required for Exhaustive Key Search


Encryption
cont… Key
Terms
• Asymmetric algorithm: Also known as public-key
encryption.
• Uses two different keys: a public key and a private
key.
without
• This enables secure encryption while

communicating previously establishing a mutual


• This is also known as public key
algorithm.
cryptology.
Encryption
cont… Key
• Asymmetric Encryption Algorithms:Terms
10. Merkle-Damgård-based Signature
Scheme
1. Rivest-Shamir-Adleman (RSA) (MSS)
2. Elliptic Curve Cryptography 11. RSA-KEM
(ECC) 12. Identity-Based Encryption (IBE)
3. Diffie-Hellman (DH) 13. Attribute-Based Encryption (ABE)
4. Digital Signature Algorithm 14. Homomorphic Encryption
a.
(DSA) b. Partially Homomorphic
Encryption Fully Homomorphic
5. ElGamal Encryption
6. Paillier 15. Post-Quantum Cryptography (PQC)
a.
algorithms (designed to resist attacks by
7. McEliece quantum computers)
b.
8. NTRU c. Code-based
d. Cryptography Lattice-
9. Lattice-based encryption e. based Cryptography
algorithms f. Multivariate
a. Learning With Errors (LWE) Cryptography
b. Ring Learning With Errors (RLWE) Supersingular Isogeny Diffie-Hellman
c. NTRU Prime (SIDH) Hash-based Cryptography
Encryption
cont… Key
Terms
• Rivest-Shamir-Adleman (RSA): mos widel use
One of the t y d

asymmetric encryption algorithms.


• It usesthe concept of public and private key pairs, with
encryption
performed using the public key and decryption using the

corresponding private key.


Encryption
cont… Key
Terms
• Elliptic Curve Cryptography (ECC): An encryptio
asymmetric n
algorithm that is gainingpopularity due to its strong security with

shorter key lengths compared to RSA.

• ECC uses the mathematical properties of elliptic curves for

encryption and decryption.


Encryption
cont… Key
Terms
• Diffie-Hellman (DH): Although notstrictly an
encryption algorithm,
Diffie-Hellman is a key exchange protocol used in

asymmetric encryption systems.

• It allows two parties to securely establish a shared secret key

over an insecure channel.


Encryption
cont… Key
Terms
• Public and Private Keys: Now we understand more about the
function of

keys in the encryption process, we can look at public and private


keys.

• An asymmetric algorithm uses two keys: a public key and a private


key.

• The public key can be sent to other people, while the private

key is only known by the owner. What's the purpose of this?


Encryption
cont… Key
Terms
• Well, anyone with the intended recipient's public key can
encrypt a
private message for them, while the recipient can only

read the contents of that message provided they have

access to the paired private key.


Encryption
cont… Key
Terms
Encryption
cont… Key
• Public and
Terms
private keys also play an role in
essential digital
signatures, whereby a sender can sign their message
with their
private encryption key.

• Those with the public key can then verify the message,
safe in the knowledge that the original message came
from the sender's private key.
Encryption
cont… Key
Terms
• Public and private keys also play an essential role in digital signatures,
whereby a
sender can sign their message with their private encryption key.

• Those with the public key can then verify the message, safe in the
knowledge that the original message came from the sender's private
key.

• A key pair is the mathematically linked public and private key generated
by an encryption algorithm.
Encryption
cont… Key
Terms
• HTTPS: Hyper Text Transfer Protocol Secure (HTTPS) is a
now widely
implemented security upgrade for the HTTP application protocol

that is a foundation of the internet as we know it.

• When using a HTTPS connection, your data


is encrypted using

Transport Layer Security (TLS), protecting your data while in


transit.
Encryption
cont… Key
Terms
• HTTPS generates long-term private and public keys that in
turn
are

used to create a short-term session key.

• The session key is a single-use symmetric key that the

connection destroys once you leave the HTTPS site

(closing the connection and ending its encryption).


Encryption
cont… Key
Terms
• However,when you revisitthe site, you will receive another single-
use

session key to secure your communication.

• A site must completely follow to HTTPS to offer users complete


security.

• Since 2018 the majority of sites online began offering HTTPS

connections over standard HTTP.


Encryption
cont… Key
Terms
• End-to-End Encryption: One of
the biggestencryption buzzwordsis

that of end-to-end encryption.

• Social messaging platform service WhatsApp began offering its

users end-to-end encryption (E2EE) in 2016, making sure

their messages are private at all times.


Encryption
cont… Key
Terms
• In the context of a messaging service, EE2E means that once
you hit
the send button, the encryption remains in place until the
recipient receives the messages.

• Well, this means that the private key used for encoding and
decoding your messages never leaves your device, in
turn ensuring that no one but you can send messages using

You might also like