Академический Документы
Профессиональный Документы
Культура Документы
We need an efficient and simple way of securing the electronic documents from being read or used by people other than who are authorized to do it. Cryptography is a standard way of securing the electronic documents.
WHAT IS CRYPTOGRAPHY?
The art of secret writing The art of protection using information The science of encrypting or hiding secrets Needed for confidentiality
CRYPTOLOGY
CRYPTOGRAPHY
CRYPTANALYSIS
Public Key
Block Cipher
Stream Cipher
Integer Factorization
Discrete Logarithm
plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext without knowing key cryptology - the field of both cryptography and cryptanalysis
NEED OF CRYPTOGRAPHY
2) Data integrity
3) Authentication 4) Non-repudation
Ever encryption and decryption has two aspects: the ALGORITHM and the KEY used for encryption and decryption.
Algorithm
Key
Cryptographic Algorithms:
A cryptographic algorithms works in combination with a key (a number, word or phrase), to encrypt the plain text. Same plain text encrypts to different cipher texts for different keys. Strength of a cryptosystems depends on the strength of the algorithm and the secrecy of the key.
KEYS:
A key is a value that works with a cryptographic algorithm to produce a specific ciphertext. Keys are basically really, really, big numbers . In public-key cryptography, the bigger the key, the more secure the ciphertext. NOTE: The algorithm is usually known to everybody. The key makes the process secure.
Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message. Symmetric cryptosystems are also called as private key cryptosystems.
STREAM CIPHERS: Stream ciphers operate on a single bit (byte or computer word) at a time, and implement some form of feedback mechanism so that the key is constantly changing. BLOCK CIPHERS : The scheme encrypts one block of data at a time using the same key on each block.
PUBLIC KEY CRYPTOGRAPHIC ALGORITHMS: The Asymmetric(public key) key cryptographic algorithms are as follow:a) RSA
b) Diffie-Hellman
c) Elliptic curve
Brief Introduction Of RC4 RC4 is a stream cipher designed by Rivest for RSA Data Security (now RSA Security). It is a variable key-size stream cipher with byte-oriented operations. The algorithm is based on the use of a random permutation. Analysis shows that the period of the cipher is overwhelmingly likely to be greater than 10100. Eight to sixteen machine operations are required per output byte, and the cipher can be expected to run very quickly in software. Independent analysts have scrutinized the algorithm and it is considered secure.
Advantages of symmeric key - Simple: - Encrypt and decrypt your own files - Fast. - Uses less computer resources - Prevents widespread message security compromise Disadvantages of Symmetric key - Need for secure channel for secret key exchange: - Too many keys - Origin and authenticity of message cannot be guaranteed
Advantage of Asymmetric key - Convenience - Provides for message authentication: - Detection of tampering: - Provide for non-repudiation: Disadvantage of Asymmetric key - Public keys should/must be authenticated - Slow - Uses up more computer resources - Widespread security compromise is possible - Loss of private key may be irreparable
As for which of them is more secure, there are differing views. Some experts consider symmetric key encryption to be more secure and others think the public key encryption method is better. Ideally, both of them are employed together to take advantage of their benefits.