0% found this document useful (0 votes)
10 views3 pages

Cryptography Summary

The document provides an overview of cryptography, emphasizing its role in cybersecurity through confidentiality, integrity, authentication, and non-repudiation. It discusses recent advancements in lattice-based cryptography aimed at resisting quantum attacks and presents practical implementations of cryptographic techniques using OpenSSL. Key takeaways highlight the importance of choosing appropriate encryption methods based on context and data sensitivity.

Uploaded by

wsycqtygc7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Cryptography Summary

The document provides an overview of cryptography, emphasizing its role in cybersecurity through confidentiality, integrity, authentication, and non-repudiation. It discusses recent advancements in lattice-based cryptography aimed at resisting quantum attacks and presents practical implementations of cryptographic techniques using OpenSSL. Key takeaways highlight the importance of choosing appropriate encryption methods based on context and data sensitivity.

Uploaded by

wsycqtygc7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cryptography Overview

Introduction to Cryptography

Cybersecurity:
Cybersecurity is the practice of protecting systems, networks, and digital data from
unauthorized access, cyberattacks, and damage. It is vital for individuals, organizations, and
governments to prevent breaches and threats.

Cryptography:
Cryptography is the science of encoding and decoding information to keep it secure. It
transforms readable data (plaintext) into unreadable ciphertext using encryption
algorithms and keys. Only authorized users with the correct key can decrypt the data.

Importance of Cryptography:
Cryptography achieves four key security goals:
1. Confidentiality – Prevents unauthorized access to information.
2. Integrity – Ensures information is not altered in transit.
3. Authentication – Verifies the identity of users and devices.
4. Non-repudiation – Ensures actions cannot be denied by the involved parties.

Origins:
From ancient methods like Caesar and Vigenère ciphers to modern algorithms like RSA,
AES, and Diffie-Hellman, cryptography has evolved into a cornerstone of digital security.

Overview of Related Works

All referenced papers focus on lattice-based cryptography, which is designed to resist


quantum computer attacks. Here’s a summary of each:

1. Regev (2024)
- Introduces the Learning With Errors (LWE) problem.
- Links it to hard lattice problems (e.g., GapSVP, SIVP).
- Develops a quantum-secure public-key cryptosystem with improved efficiency and smaller
key sizes.

2. Chen (2025)
- Proposes a homomorphic encryption (HE) scheme using LWE/RLWE.
- Enables computations on encrypted data—ideal for AI, cloud, and privacy-preserving
applications.
- Balances efficiency and post-quantum security.

3. Peet-Pare (2025)
- Reviews the security of the NTRU cryptosystem.
- Finds that it lacks IND-CPA security in its base form.
- Recommends using padding and the Random Oracle Model to achieve IND-CCA2.

4. Gajland et al. (2023)


- Presents Swoosh, a non-interactive key exchange (NIKE) protocol.
- Efficient, quantum-safe, and easy to deploy in real-world settings like IoT and secure
messaging.
- Achieves low computational cost and strong security guarantees.

Proposed Scheme

This section demonstrates real-world implementation of cryptographic techniques using


OpenSSL on Kali Linux.

1. AES Symmetric Key Generation


- Used OpenSSL to generate a 256-bit AES key.
- Included a salt value to protect against rainbow table attacks.

2. File Encryption & Decryption


- ECB Mode: Fast and simple but insecure—reveals patterns in the data.
- CBC Mode: Introduces randomness through XOR chaining, ensuring secure encryption
even for repetitive data.

3. Base64 Encoding
- Encrypted files were further encoded using Base64.
- This step ensures encrypted binary data can be safely transferred over protocols that
support only text (e.g., email).

4. Hashing Algorithms
- Demonstrated hashing using MD5, SHA-1, and SHA2-256.
- MD5: Fast, but weak security.
- SHA-1: Better, but largely deprecated.
- SHA-2: Strongest and widely used today for ensuring data integrity.

5. Digital Forensics using NSRL


- Showed how the National Software Reference Library (NSRL) is used in investigations.
- Forensic experts hash disk contents and match them with NSRL’s database to identify
known software or detect anomalies.

6. Image Encryption: ECB vs CBC


- Encrypted a bitmap image using both ECB and CBC modes.
- ECB: Revealed original image patterns—visually insecure.
- CBC: Obscured patterns completely—demonstrated superior security.

Conclusion

Cryptography is essential in ensuring secure communication, data integrity, and


authentication in modern digital systems.

Key Takeaways:
- Both symmetric and asymmetric encryption techniques have important roles.
- Hashing provides verification and prevents tampering.
- CBC mode proved significantly more secure than ECB in practice.
- Real-world demonstrations using OpenSSL enhanced understanding of algorithm
strengths and weaknesses.

Ultimately, choosing the right cryptographic method depends on the context, data
sensitivity, and performance requirements of the system.

You might also like