Cryptography Summary
Cryptography Summary
Introduction to Cryptography
Cybersecurity:
Cybersecurity is the practice of protecting systems, networks, and digital data from
unauthorized access, cyberattacks, and damage. It is vital for individuals, organizations, and
governments to prevent breaches and threats.
Cryptography:
Cryptography is the science of encoding and decoding information to keep it secure. It
transforms readable data (plaintext) into unreadable ciphertext using encryption
algorithms and keys. Only authorized users with the correct key can decrypt the data.
Importance of Cryptography:
Cryptography achieves four key security goals:
1. Confidentiality – Prevents unauthorized access to information.
2. Integrity – Ensures information is not altered in transit.
3. Authentication – Verifies the identity of users and devices.
4. Non-repudiation – Ensures actions cannot be denied by the involved parties.
Origins:
From ancient methods like Caesar and Vigenère ciphers to modern algorithms like RSA,
AES, and Diffie-Hellman, cryptography has evolved into a cornerstone of digital security.
1. Regev (2024)
- Introduces the Learning With Errors (LWE) problem.
- Links it to hard lattice problems (e.g., GapSVP, SIVP).
- Develops a quantum-secure public-key cryptosystem with improved efficiency and smaller
key sizes.
2. Chen (2025)
- Proposes a homomorphic encryption (HE) scheme using LWE/RLWE.
- Enables computations on encrypted data—ideal for AI, cloud, and privacy-preserving
applications.
- Balances efficiency and post-quantum security.
3. Peet-Pare (2025)
- Reviews the security of the NTRU cryptosystem.
- Finds that it lacks IND-CPA security in its base form.
- Recommends using padding and the Random Oracle Model to achieve IND-CCA2.
Proposed Scheme
3. Base64 Encoding
- Encrypted files were further encoded using Base64.
- This step ensures encrypted binary data can be safely transferred over protocols that
support only text (e.g., email).
4. Hashing Algorithms
- Demonstrated hashing using MD5, SHA-1, and SHA2-256.
- MD5: Fast, but weak security.
- SHA-1: Better, but largely deprecated.
- SHA-2: Strongest and widely used today for ensuring data integrity.
Conclusion
Key Takeaways:
- Both symmetric and asymmetric encryption techniques have important roles.
- Hashing provides verification and prevents tampering.
- CBC mode proved significantly more secure than ECB in practice.
- Real-world demonstrations using OpenSSL enhanced understanding of algorithm
strengths and weaknesses.
Ultimately, choosing the right cryptographic method depends on the context, data
sensitivity, and performance requirements of the system.