CH03-Introduction To Cryptography 9.18.38 PM
CH03-Introduction To Cryptography 9.18.38 PM
Introduction to Cryptography
Outline
Topics Objectives
Integrity and Authenticity Explain the role of cryptography in ensuring the integrity
and authenticity of data.
Explain how cryptographic approaches enhance data
Confidentiality confidentiality.
Public Key Cryptography Explain public key cryptography.
Digital Certificates and Digital Signatures Explain the role of digital certificates.
Applications and Impacts of Cryptography Explain how the use of cryptography affects
cybersecurity operations.
Integrity and Authenticity
Creating a hash
What is A Cryptographic Hash Functions
Hashing Formula
A simple Hash Function
• Input: a number consisting of several digits
• Output: a number consisting of 2 digits and is less than 32.
• Computation: Repeatedly Add the digits of the number until the results
becomes less than 32.
• Hash: The result/output is hash value
For example:
Number: 84139784
Computation: 8+4+1+3+9+7+8+4 =44
4+4=8
Hash: 08
How Do Hash Algorithms Work?
Uses of Cryptographic Hash Functions -
Origin Authentication
Origin Authentication
• To add origin authentication
and integrity assurance, use a
keyed-hash message
authentication code (HMAC).
Step 1
Asymmetric Encryption –
Confidentiality
Step 2: Alice uses Bob’s public key to encrypt a message using an agreed-
upon algorithm. Alice sends the encrypted message to Bob.
Step 2
Asymmetric Encryption – Confidentiality
Step 3: Bob then uses his private key to decrypt the message. Since
Bob is the only one with the private key, Alice's message can only be
decrypted by Bob and thus confidentiality is achieved.
Step 3
Uses of Cryptographic Hash Functions - Data Integrity
Step 1
Digital Envelop - 2
Step 3
Digital Envelop - 4
Step 4: Bob uses his private key to decipher the message.
Step 4
Digital Signatures
Digital signatures are a mathematical technique used to provide
authenticity, integrity, and nonrepudiation. Digital signatures have
specific properties that enable entity authentication and data
integrity. In addition, digital signatures provide nonrepudiation of the
transaction. In other words.
Properties of digital signatures
The signature cannot be forged and provides proof that
Authentic
the signer, and no one else, signed the document.