3 Cryptography
3 Cryptography
Ciphertext: Encrypted form of the plain text, making its meaning hidden
through encryption.
2. Key Material:
Also called the cryptographic key, it is essential for encryption and decryption
processes.
Contains information about key validity, security, classification level, and other
management details.
5. Cryptographic Operations:
Cryptography 1
Substitution: Replacing one value with another (e.g., Caesar cipher shifting
letters).
Encoding: Breaking plaintext into symbol sets and substituting them based on
a code book.
Terms to remember
1. Confidentiality:
2. Integrity:
Cryptography 2
Example: Ensuring that data is accurate and has not been tampered with.
3. Availability:
Example: Ensuring that critical systems and information are available during
business operations.
4. Nonrepudiation:
5. Authentication:
6. Privacy:
7. Safety:
#all of it is CIANA+PS
Benefits of Cryptography
1. Applications of Cryptography:
Cryptography 3
Encryption is used to protect sensitive data during storage and
communication.
3. Global Challenges:
Organizations must comply with state and federal laws, staying informed
about legislative developments.
Used for encrypting bulk data, such as backups, hard drives, portable
media, and messages in communications channels like IPsec and TLS.
Cryptography 4
2. Challenges of Symmetric Algorithms:
The key cannot be sent in the same channel as the encrypted message to
avoid interception.
3. Stream-Based Algorithms:
Cryptography 5
Basic block cipher mode.
Similar to CFB but feeds the encrypted key-stream into the shift register.
Counter, such as a 64-bit random data block, serves as the first IV.
##END##
Cryptography 6
1. Data Encryption Standard (DES):
DES key length is 64 bits, but the effective key length is 56 bits after ignoring
parity bits.
Rijndael algorithm, created by Dr. Joan Daemen and Dr. Vincent Rijmen of
Belgium, was selected.
4. Rijndael Algorithm:
Chosen as the basis for AES due to its efficiency and security.
##more information##
Rijndael Algorithm
1. Rijndael Algorithm:
Cryptography 7
Key sizes: 128, 192, or 256 bits, with varying rounds based on key size (10
rounds for 128-bit key, 12 for 192-bit, and 14 for 256-bit).
3. CAST:
CAST-128 can use keys between 40 and 128 bits with 12 to 16 rounds.
CAST-256 operates on 128-bit blocks with keys of varying lengths (128, 192,
160, 224, and 256 bits) and performs 48 rounds.
5. Blowfish:
Fast cipher, operates on variable key sizes (32 to 448 bits) and 64-bit
input/output blocks.
Uses S-boxes created from the key, making it unsuitable for frequent key
changes or applications with limited processing power.
Considered unbreakable with over 500 rounds needed to test a single key.
##END##
Cryptography 8
1. CCMP (Counter Mode with Cipher Block Chaining Message Authentication
Code Protocol):
CCMP ensures message integrity through cipher block chaining and provides
message confidentiality through counter mode.
CCMP uses AES with a 128-bit key and 128-bit block size.
Security: when used with secure key exchange systems, provide military-grade
encryption.
Key Compromise Risk: If all users use the same key, the risk of key
compromise increases. Managing unique keys for each pair of communicating
partners can be impractical.
These systems combine the efficiency of symmetric algorithms with the secure
key exchange of asymmetric algorithms.
Cryptography 9
They may not be suitable for situations requiring high levels of authentication of
sender and recipient or non-repudiation.
In symmetric encryption, the same key is used for both encryption and
decryption.
Discrete logarithms involve solving equations like x=c×bn, while prime factoring
generates keys by multiplying large prime numbers.
Cryptography 10
4. Key Pair Generation and Usage:
The private key is kept secret, known only to the key holder, while the public
key can be freely shared.
The key pairs are generated on a user's endpoint device or by an enterprise key
server.
Digital certificates associate an identity with its public key and are used for
secure communication.
CAs verify the identity of the requesting entity and issue a certificate,
establishing the binding between an identity and a public key.
PKI is a system of systems that organizes and delivers services related to key
generation, storage, and use.
PKI addresses the challenges of key distribution and provides a framework for
secure communication.
Only the recipient, who possesses the corresponding private key, can decrypt
the encrypted data.
Cryptography 11
Asymmetric Encryption for Confidentiality
xample scenario:
1. Key Generation:
Receiver shares the public key openly, perhaps by publishing it on their website.
Since the receiver possesses the private key, they can decrypt the message.
Only the receiver can decrypt the message due to the paired nature of the keys.
Cryptography 12
Example: Message Proof of Origin for Non-Repudiation
and Authentication
1. Key Generation:
Sender shares the public key openly, perhaps by publishing it on their website.
3. Verification by Recipients:
Cryptography 13
Diffie-Hellman Key Exchange Algorithm
1. Diffie-Hellman Key Exchange:
It involves two parties creating a shared secret key without exchanging any
secret information.
Large prime numbers and a generator value are used in the key generation
process.
Parties, such as Bob and Carol, choose private keys and use a trapdoor
function to calculate public keys.
Public keys are exchanged openly, and each party uses their private key to
derive the shared session key.
The shared session key is kept secret and can be used for secure
communication.
Cryptography 14
The choice of trapdoor function and control values can present exploitable
vulnerabilities.
Despite vulnerabilities, this process forms the basis of public key infrastructure.
RSA key size recommendations have increased over the years due to
advancements in attack capabilities.
As of May 2021, 2048-bit RSA keys are commonly used, and discussions
continue about moving to larger key sizes, e.g., 3072 bits.
Public and private keys are generated using points on an elliptic curve.
Cryptography 15
Draw a straight line through A, intersecting the curve at two points, B and C.
Private Key (n): The number of times the curve is dotted to reach that point.
Continue dotting the curve to generate more points, effectively mirroring the
curve.
Repeat the process a number of times (n) within a defined key space.
5. Key Space:
The key space extends from the start of the curve to the defined maximum
value.
If a line projected from the starting point goes beyond the maximum value,
eliminate that point as a possible key.
Continue the process until valid points within the key space are generated.
The unknown value representing the number of times the process is repeated
becomes the private key.
Cryptography 16
Elliptic curve cryptography (ECC) keys are substantially smaller than RSA keys
to achieve high levels of protection.
Smaller keys are particularly advantageous for devices like IoT devices (e.g.,
Google Home, Amazon Alexa), embedded systems, and smartphones.
Faster SSL/TLS handshakes with smaller keys result in quicker page loads for
websites.
Despite the smaller key sizes, ECC maintains or even improves security,
making it an attractive alternative.
Cryptography 17
Asymmetric cryptography revolutionized secure communication by enabling
secure messaging over untrusted channels without the need for prior key
exchange.
Cryptographic hygiene measures are essential for maintaining the security and
strength of cryptographic systems.
Key size alone may not accurately represent the strength or security of an
encryption system.
Cryptography 18
Prohibiting the design or implementation of custom cryptographic algorithms.
Hash functions are sensitive to changes in the input message, and even slight
alterations result in different hash values.
Cryptographic hash algorithms are global and not sponsored by a single entity.
Specific Hashes
1. Message Digest (MD) 2, 4, and 5:
MD2:
Created in 1989.
Cryptography 19
Used in certain PKI environments for generating digital certificates.
MD4:
Created in 1990.
MD5:
Vulnerable to hash collisions, and exploits for creating collisions are well-
published.
SHA-0:
First hash standard in the SHA collection, but had fundamental flaws.
SHA-1:
SHA-2:
Possible message digests are 224, 256, 384, and 512 bits in length.
SHA-224 and SHA-256 use a block length of 512 bits, while SHA-384 and
SHA-512 use a block length of 1024 bits.
SHA-3:
Cryptography 20
Uses sponge construction, offering flexibility.
3. HAVAL:
Implementer can create hashes of 128, 160, 192, 224, and 256 bits in length.
4. RIPEMD-160:
Attempts to reconstruct the original message from the hash value or find
collisions.
Cryptanalysis:
Cryptography 21
Cryptanalysis contributes to the development of rainbow tables, which
significantly reduce computational time for cracking ciphers.
The birthday paradox indicates that finding collisions for hash values might be
easier than assumed.
3. Salting in Cryptography:
Salts defend against dictionary attacks and precomputed rainbow table attacks.
Salts are linked with passwords and processed with a cryptographic hash
function for storage.
Provides assurance that the message has not been altered during transit.
DES (Data Encryption Standard) and CBC (Cipher Block Chaining) are used
together.
Cryptography 22
The last block of ciphertext is the MAC, attached to the unencrypted message.
RFC 2104 introduces HMAC, widely used in IPsec, SSL, TLS, etc.
HMAC uses a secret key with a hash algorithm and is faster than DES-based
MAC.
Works by adding a secret key value to the hash input function along with a
source message.
Hybrid Cryptography
1. Usage in Internet Security:
It allows designers and users to choose a mix of strengths that align with their
specific security needs.
Purely asymmetric approaches are impractical for large data due to runtime
penalties.
Cryptography 23
Symmetric approaches face challenges in key management, storage, and
distribution.
Standards define how certificates associate public keys with identities, and
protocols negotiate encryption suites and algorithms.
Digital signing with the sender's private key provides proof of origin, non-
repudiation, and authentication.
Example 1:
Bob decrypts the key using his private key and decrypts the message.
Example 2 (Non-repudiation):
Alice hashes the original message, encrypts it with her private key, and
appends it to the message.
Cryptography 24
Bob verifies the integrity using the decrypted message and the decrypted
message digest.
2. Symmetric Encryption:
3. Asymmetric Encryption:
Symmetric keys used for a single session and then discarded (session
keys).
5. Digital Envelope:
6. Session Keys:
Cryptography 25
Symmetric keys used for a single communication session and then
discarded.
8. Security Measures:
9. Challenges:
Cryptography 26
Considerations for collision resistance.
Cryptography 27
1. Key Distribution: Asymmetric encryption helps securely distribute encryption
keys, addressing challenges in managing shared keys.
5. Key Pair for Identity: Unique key pairs for users or devices add an extra layer
of protection, making it harder for unauthorized access.
2. Use of Certificates: The SSCP, along with IT specialists and a crypto expert,
considers using digital certificates as a security measure.
Cryptography 28
wireless access points, smart cards, IoT devices, and CCTV surveillance
systems.
4. Certificate Authority (CA): Waheed Ahmed, IMI's crypto expert, suggests that
IMI should install and be its own Certificate Authority (CA) rather than
purchasing third-party certificates.
Cryptography 29
to identify users and machines, adding an extra layer of control and
security.
Cryptography 30
8. Access Control: PKI contributes to better access control by verifying the
identity of users and organizations through certificates, allowing secure
interactions.
10. Digital Signatures: Digital signatures are a key feature of PKI, providing a
means to sign electronic documents or messages, adding a layer of authenticity
and integrity.
Cryptography 31
CSR includes necessary information like entity identification, addresses, contacts,
URL, and the public key.
10. Web of Trust: An alternative trust model is the Web of Trust, proposed by PGP
creator Phil Zimmerman. It is a decentralized model where users establish trust
between peers, forming a fault-tolerant web of competence for public keys.
11. Validation in Web of Trust: In a Web of Trust, individuals act as validators for
others. If Alex trusts Sam and Sam trusts Zack, Alex can trust Zack's public key.
This model is decentralized compared to the hierarchical trust model of PKI.
Cryptography 32
Man-in-the-middle (MITM) and phishing attacks become more likely.
Server outages can occur due to certificate and key misuse issues.
Own and manage your baseline: Enumerate and inventory information and IT
systems, prioritize risks, and create a security baseline.
Two major processes involve planned new uses of certificates and discovering
current use.
It's crucial to identify candidate process maturity metrics for certificate and key
management practices.
Cryptography 33
Process maturity metrics help organizations assess and improve their certificate
management processes.
The level of assurance and security token technologies (e.g., smart cards)
should be considered based on the organization's needs.
Efforts, such as those by organizations like NIST, aim to address the need for
guidance in certificate management.
Digital Signatures
1. Digital Signatures:
Created by encrypting a digest of a message with the private key of the sender.
In the U.S., the EU, and many other nations, digital signatures can replace
handwritten signatures on contracts and documents.
Cryptography 34
Used in various applications, document management systems, email add-ons,
and browser plugins.
Commonly used for software updates delivered via digitally signed code files.
5. Digital Certificates:
Certificate path or chain of trust maps out the tiers and shows the association
between them.
The term "key management" encompasses all activities related to safely and
securely using cryptographic materials, also referred to as cryptographic assets.
2. Principles of Cryptography:
Cryptography 35
August Kerckhoff's principle emphasizes that a cryptographic algorithm does
not need to be a secret to be secure.
4. Cryptographic Principles:
PKI provides shared key creation, key distribution, and management functions
to users.
Key pairs generation and certificate identity generation are fundamental to PKI's
key management role.
Cryptography 36
Defines protocols for distributing and registering public keys.
Consists of the XML Key Information Service Specification and the XML Key
Registration Service Specification.
XML Key Information Service allows clients to delegate tasks to a trust service,
simplifying XML Digital Signatures processing.
Client applications can delegate tasks to trust services, reducing the complexity
and syntax related to the underlying public key infrastructure.
XML Digital Signature element provides key-related data for validating the
signature.
It may include the key itself, key name, X.509 version 3 certificate, PGP key
identifier, chain of trust, revocation list info, or key agreement data.
The XML Key Management Specification shields client applications from the
complexities of the underlying public key infrastructure.
Cryptography 37
Developed to address the secure transmission of securities and funds
electronically.
2. Hierarchy of Keys:
Master key encrypting keys (KKMs) are at the top, distributed manually.
Data keys, used for encryption and decryption of messages, have short
lifespans.
3. Three-Tier Model:
In the three-tier model, master key encrypting keys encrypt key encrypting keys,
which, in turn, encrypt data keys.
Segregation of duties and splitting of knowledge are essential for effective key
management.
Session keys protecting internal data movement are critical, and compromise
could risk the company's survival.
Banks store high-value customer details, making them targets for financial
criminals.
Cryptography 38
Encryption of credit card and PII data during transfer is crucial to prevent
accounting fraud and identity theft.
Compliance regimes may require HSMs' use when certain risk thresholds are
exceeded.
HSMs assist in the segregation of duties by not allowing direct access to keys
and materials.
Key Creation
1. Considerations for Key Generation:
Cryptography 39
The number of unique keys needed across all users and systems.
Size of the required key space and the distribution of keys within that space.
Key space size is the theoretical maximum number of unique keys based on the
chosen length.
Examples include a four-digit PIN with a key space of 10,000 and a 64-bit
binary key with a key space of more than 1.8 x 10^19 possible keys.
Key space distribution refers to how key values are distributed and if they are
adjacent to each other.
4. Key Clustering:
Some key generation processes may cause key clustering, resulting in different
keys generating the same ciphertext from the same plaintext.
Cryptography 40
Programs like LastPass or NordPass can provide reliable and secure key
management for home or small office use.
The key generator should produce unpredictable results for the next key given
the current value.
8. Key Length:
The resistance to attacks is related to key length, but longer keys can be
computationally expensive.
Cryptoperiod
1. Importance of Crypto Period:
Cryptography 41
Organizations typically set a maximum usage time for keys before they must be
changed.
Short cycles enhance security but may complicate key generation, distribution,
and management.
The text refers to a table suggesting possible crypto periods based on the type
of keys.
4. Security Measures:
Caution is advised when deleting keys, as simple deletion may not completely
obliterate information.
Manual key distribution methods have human error risks, and more frequent
changes may increase exposure.
Users with different roles should have keys with lifetimes based on their
responsibilities and the applications they use.
7. Reissuing Keys:
Cryptography 42
8. Deactivation or Revocation:
Key History
1. Storage of Old Keys:
Organizations and individuals are often required to retain copies of old keys for
accessing encrypted files such as backups.
Secure storage methods are crucial to prevent compromise or loss, as the loss
of an encryption key results in potential data loss.
2. Legal Requirements:
4. Key Distribution:
Cryptography 43
Public key distribution in certificates ensures the validity and ownership of
public keys.
Key Encrypting Keys (KEKs) are long-term keys used for key distribution or
exchange.
Key wrapping involves protecting session keys with a KEK, using symmetric
ciphers for encryption.
Proper storage and periodic change of cipher keys are essential for effective
cryptography.
7. Key Expiration:
Expired keys should be replaced with newer, longer keys to enhance security.
Centrally stored data related to user keys should be signed, have a MAC for
integrity, and be encrypted if confidentiality is required.
Individual key records in a database and the entire database should have
integrity checks and encryption.
Cryptography 44
Key Recovery and Key Escrow
1. Multi-party or Split Knowledge Key Recovery:
3. Key Escrow:
Similar to key recovery but often used in an external or higher authority context.
Some nations have attempted legal requirements for placing encryption keys in
escrow with government agencies.
Such efforts have faced backlash due to concerns from businesses, security
professionals, and civil liberties watchdog organizations.
Cryptography 45
6. Standardized Key Management Specifications:
Cryptography 46
Embraced by the Internet Engineering Task Force (IETF) and defined in various
Requests for Comments (RFCs).
2. Historical Context:
Utility programs like Pretty Good Privacy provided encryption but lacked built-in
key sharing or management.
3. SMIME Functionality:
Certificates validate the validity of public keys and their association with
authenticated identities.
Mail server plays a crucial role in managing certificates and facilitating secure
email communication.
End users send secure emails through the certificate issued to the mail server.
This reliance on PKI establishes trust in cryptographic keys used for encryption
and authentication.
Cryptography 47
SMIME enhances email security by providing encryption, sender authentication,
and message integrity.
Integration with browsers and office suites makes it a practical choice for
organizations aiming to secure email correspondence.
Digital Signatures
1. Digital Signatures in Secure Multipurpose Internet Mail Extensions (S/MIME):
2. Authentication:
3. Non-repudiation:
Legal function.
4. Data Integrity:
Ensures the received message is the same as the signed and sent message.
6. Signature Operation:
7. Encryption:
Cryptography 48
8. Confidentiality in Email:
Policies and procedures need to be created due to the different security issues
addressed by encryption and digital signing.
PCI DSS does not permit the use of SSL for secure communications.
Cryptography 49
Positioned between the application protocol layer and the TCP/IP layer.
4. SSL/TLS Protocols:
5. SSL/TLS Layers:
6. Handshake Protocol:
8. Record Protocol:
9. Handshake Sub-Protocols:
Cryptography 50
Asymmetric encryption for exchanging pre-shared keys over potentially
unsecured channels.
Shared secret key is appended to the data for hashing, providing basic proof of
origin.
Both parties need two keys: one to decrypt the message and the second for
integrity checking.
Steganography
1. Definition of Steganography:
Null ciphers, invisible ink, microdots, and other secret means of communication.
3. Modern Steganography:
Often hides messages in the least significant bit of each byte of an image.
Cryptography 51
5. Combining Cryptography and Steganography:
Modern methods: covert channels, hidden text within web pages, messages
within picture or sound files, null ciphers.
Covert channels.
Null Cipher
1. Definition of Null Cipher:
Sentence: "Interesting how additional time explains better every daily task,
inspiring more expectations."
Cryptography 52
Hides a message within the first character of each word.
Message becomes clear when taking the first letter from each word.
2. Implementation:
4. NAT Transversal:
Proves the identity of the source IP address and ensures data integrity.
Cryptography 53
Thwarts replay attacks with a sequence number for each packet.
6. Transport Mode:
Four sections: ESP header (SA info, sequence number), ESP payload
(encrypted packet), ESP trailer (padding), Authentication (integrity check value).
Cryptography 54
Internet Security Association Key Management
Protocol (ISAKMP)
1. Internet Security Association Key Management Protocol (ISAKMP):
IPsec, developed in the 1980s and early 1990s, preceded the widespread
development of public key infrastructure.
ISAKMP works with IPsec to handle key exchange and authentication needs.
ISAKMP can use an IPsec key type of Domain Name System (DNS) record for
key exchange and validation.
5. Expertise in Implementation:
Cryptography 55
7. IKE Phases:
Reduces overhead using a nonce encrypted with the partner's public key.
8. Phase 2 of IKE:
Establishes peer's security associations using the secure tunnel and temporary
security association created in Phase 1.
9. Implementation of IPsec:
Usually implemented through software, where each node creates and secures
the connection.
Hardware version, like High Assurance Internet Protocol Encryptor, can also be
used.
Many markets adopting High Assurance Internet Protocol Encryptor devices for
secure communications in various applications.
Cryptography 56
May not necessarily be an encrypted tunnel but can provide secure
communication if security protocols are selected and configured.
VPN protocol running over other protocols, often used for remote access.
5. Weaknesses of PPTP:
Allows dial-up users to connect to their Internet service providers' L2TP Access
Concentrator (LAC) using Point-to-Point Protocol (PPP).
LAC encapsulates PPP packets into L2TP and forwards them to the remote
network's Layer 2 Network Server.
7. L2TP Authentication:
Cryptography 57
L2TP does not provide encryption and relies on other protocols like tunnel mode
IPSec for confidentiality.
Authentication can involve a shared secret between LAC and Layer 2 Network
Server.
8. OpenVPN:
Module 7: Cryptanalysis
Cryptanalysis
1. Cryptanalysis Focus:
2. Predictability in Cryptography:
Cryptography 58
Cryptanalysts can analyze similar ciphertext to find patterns, uncovering
operations of the cryptosystem.
Ensures that even if similar documents are encrypted using the same key, the
resulting ciphertext will be substantially different.
Three common types: brute force, dictionary, and rainbow table attacks.
2. Ciphertext-Only Attack:
Cryptography 59
3. Moore's Law and Encryption:
Attacker has access to the decryption device and attempts to discover the key
by decrypting chosen pieces of ciphertext.
Asymmetric cryptosystems, like RSA, are vulnerable but can be mitigated with
random padding.
Attacker has both ciphertext and plaintext versions of the same message.
Once the key is found, the attacker can decrypt all messages encrypted with
that key.
Attacker knows the encryption algorithm or has access to the machine used for
encryption.
Executes chosen pieces of plaintext through the algorithm to determine the key.
Cryptography 60
2. Social Engineering in Encryption Attacks:
Trying all possible keys until finding the one decrypting the ciphertext.
2. Differential Cryptanalysis:
Measures exact execution times and power to determine key and algorithm
values.
3. Linear Cryptanalysis:
Cryptography 61
Obtain bits of information about the key with sufficient plaintext-ciphertext pairs.
4. Algebraic Attacks:
5. Rainbow Table:
6. Birthday Attack:
Exploits the likelihood of finding two messages with the same hash.
7. Frequency Analysis:
8. Dictionary Attack:
Encrypts dictionary words and checks for matching hashes with stored
passwords.
9. Replay Attack:
Cryptography 62
Aims to find weaknesses in the system or gain critical information about the
algorithm.
Cryptography 63
3. Quantum Cryptography Implementation:
4. Cryptanalysis Challenges:
7. History of Cryptography:
Cryptography 64
Clipping Levels
1. Clipping Level for Incorrect Password Attempts:
Systems often have a clipping level to limit the number of incorrect password
attempts before locking the user account.
Unauthorized users with access to password files can launch offline attacks,
attempting to hash various passwords to guess the correct one.
5. Work Factor:
Stronger passwords increase the time required for an attacker to guess them.
Brute force attacks involve trying every possible password combination to gain
access.
7. Rainbow Tables:
Cryptography 65
The use of salts in password hashing mitigates the effectiveness of rainbow
tables.
Salts make it more difficult for attackers to use precomputed tables like rainbow
tables.
Cleartext - Text or data that is never intended to be encrypted, nor does it require
the protection of encryption. Not to be confused with plaintext, which is the data or
message with its meaning intact and visible.
Cryptography 66
Cryptography - The study or applications of methods to secure or protect the
meaning and content of messages, files, or other information, usually by disguise,
obscuration, or other transformations of that content and meaning.
Decoding - The reverse process from encoding, converting the encoded message
back into its plaintext format.
Encryption - The process of converting the message from its plaintext to ciphertext.
Entity - Any form of user, such as a hardware device, software daemon, task,
processing thread or human, which is attempting to use or access systems
resources. Endpoint devices, for example, are entities that human (or nonhuman)
users make use of in accessing a system. Should be subject to access control and
accounting.
Hash Function - Accepts an input message of any length and generates, through a
one-way operation, a fixed-length output called a message digest or hash.
Cryptography 67
Hardware Security Module - A device that can safely store and manage encryption
keys. This can be used in servers, data transmission, protecting log files, etc.
Initialization Vector (IV) - A non-secret binary vector used as the initializing input
algorithm for the encryption of a plaintext block sequence to increase security by
introducing additional cryptographic variance and to synchronize cryptographic
equipment.
Key - The input that controls the operation of the cryptographic algorithm. It
determines the behavior of the algorithm and permits the reliable encryption and
decryption of the message.
Key Clustering - When different encryption keys generate the same ciphertext from
the same plaintext message.
Key Pair - A matching set of one public and one private key, generally associated
with only one person, organization, or identity.
Plaintext - The message or data in its natural format and in readable form;
extremely vulnerable from a confidentiality perspective.
Private Key - One part of a matching key pair generated via asymmetric encryption
processes, which is kept secret by its possessor. Secrecy and integrity of a public-
key encryption process is entirely dependent upon protecting the value of a public
key.
Cryptography 68
Transposition - The process of reordering the plaintext to hide the message.
Substitution - The process of exchanging one letter orbit in an input plaintext (and
its alphabet) for another symbol in the output alphabet.
Cryptography 69