Cryptography
Cryptography
Introduction
Upon reception, the ciphertext can be transformed back to the original plaintext by using decryption algorithm
and the same key was used for encryption
Category of algorithm
Cryptosystem that
makes use of
symmetric key
distribution use same
key for encryption
and decryption.
• Example of symmetric key algorithm are DES,
3DES and AES
• The most popular symmetric key system is
Data encryption standard (DES)
Asymmetric key cryptography
• The initial alphabets in the key square are the unique alphabets
of the key in the order in which they appear followed by the
remaining letters of the alphabet in order.
Playfair cipher
• If both letter are in the same column, take the letter below each
one.
Encryption and decryption in playfair cipher
• If both letter are in the same row: take the letter to the right of
each one (going back to the leftmost of at the rightmost position)
Encryption and decryption in playfair cipher
• If neither of the above rules is true: Form a rectangle with the two
letters and take the letters on the horizontal opposite corner of
the rectangle.
Encryption and decryption in playfair cipher
Playfair cipher
Vigenere cipher
In university setting, this technology can be used to keep track of student record,
certificates and academic achievements.
• Create student records: When student enrols in a university, their information is
recorded
• Digital certificates: when student completes a course or graduates, the
university issues a digital certificates.
• Certificate on the Blockchain: Instead of storing these certificates in traditional
systems, the university adds them to a blockchain. Each certificate is
represented as a unique digital "block.”
Example on block chain used in university
Hashing and Security: Before adding a certificate to the blockchain, the university creates a
unique code (hash) based on the certificate's information. This hash is like a digital fingerprint
and is used to verify the certificate's authenticity.
Verification: Whenever a student needs to prove their credentials, employers or other institutions
can use the blockchain to verify the certificate's details. They compare the certificate's hash with
the one on the blockchain. If they match, the certificate is legitimate.
Decentralization: Unlike traditional systems that might be controlled by a single entity, the
blockchain is decentralized. Many computers (nodes) participate in maintaining and verifying the
blockchain. This reduces the risk of tampering or fraud.
Example on block chain used in university
Transparency: Students, employers, and institutions with permission can access the
blockchain to view and verify certificates. This transparency ensures trust in the
educational credentials.
Security and Integrity: Once information is added to the blockchain, it cannot be easily
changed or deleted. This ensures that student records and certificates remain accurate
and secure over time.
Decentralization:
• No central authority; data is stored across a network of nodes.
• Redundancy: Copies of the ledger on multiple nodes ensure data
availability.
Security:
• Cryptographic hashing and digital signatures secure data integrity.
• Immutable nature prevents unauthorized changes.
• Difficulty in altering historical transactions ensures trust.
Use cases of blockchain
Scalability Solutions:
• Sharding: Splitting the network into smaller parts for faster processing.
Confidentiality:
Cryptography ensures that only authorized parties can access and read the information. Encryption transforms the
original data into an unreadable format using a key. Without the proper key, even if an attacker gains access to the
encrypted data, they won't be able to decipher it.
Integrity:
Cryptographic techniques, like digital signatures and message authentication codes (MACs), verify the integrity of data.
Digital signatures ensure that the sender's identity is verified and that the content hasn't been tampered with. MACs
provide a way to detect any unauthorized changes to the data during transmission.
Authentication:
Cryptography allows entities to verify the identities of each other. This is crucial to prevent unauthorized access.
Public key infrastructure (PKI) is often used to facilitate authentication through digital certificates and public/private
key pairs.
Reduce security vulnerabilities
Non-Repudiation:
Cryptographic techniques can provide evidence that a particular message was sent or received by a specific entity. This
prevents parties from denying their involvement in a transaction or communication.
Access Control:
Cryptography can be used to control access to resources, systems, or data. Encrypted authentication credentials and
access tokens can help prevent unauthorized access to systems and networks.
Secure Communication:
Cryptography secures data during transmission over networks. Secure protocols like SSL/TLS encrypt data exchanged
between a user's browser and a web server, protecting against eavesdropping and man-in-the-middle attacks.
Reduce security vulnerabilities
Data Protection:
Cryptography is essential for safeguarding data at rest, such as on disk drives or
databases. Encryption ensures that even if physical access to the storage medium
is obtained, the data remains unreadable without the appropriate decryption key.