Sie sind auf Seite 1von 16

CRYPTOGRAPHY

Encryption is the process of transforming


information (referred to as plaintext)
using an algorithm (called cipher) to
make it unreadable to anyone except
those possessing special knowledge,
usually referred to as a key. The result of
the process is encrypted information (in
cryptography, referred to as cipher text).
In many contexts, the word encryption
also implicitly refers to the reverse
process, decryption (e.g. “software for
encryption” can typically also perform
decryption), to make the encrypted
information readable again (i.e. to make it
unencrypted).
CRYPTOGRAPHY

• Encryption can be used to protect data "at


rest", such as files on computers and
storage devices (e.g.USB flash drives). In
recent years there have been numerous
reports of confidential data such as
customers' personal records being exposed
through loss or theft of laptops or backup
drives. Encrypting such files at rest helps
protect them should physical security
measures fail.
• Digital rights management systems which
prevent unauthorized use or reproduction of
copyrighted material and protect software
against reverse engineering are another
somewhat different example of using
encryption on data at rest.
CRYPTOGRAPHY
• Encryption is also used to protect
data in transit, for example data
being transferred via networks (e.g.
the internet, e-commerce), mobile
telephones, wireless microphones,
wireless intercom systems,
Bluetooth devices and bank
automatic teller machines. There
have been numerous reports of
data in transit being intercepted in
recent years. Encrypting data in
transit also helps to secure it as it is
often difficult to physically secure
CRYPTOGRAPHY
• Encryption, by itself, can protect the
confidentiality of messages, but other
techniques are still needed to protect
the integrity and authenticity of a
message; for example, verification of
a message authentication code (MAC)
or a digital signature.
• Standards and cryptographic software
and hardware to perform encryption
are widely available, but successfully
using encryption to ensure security
may be a challenging problem. A
single slip-up in system design or
execution can allow successful
CRYPTOGRAPHY
 CRYPTOGRAPHY TECHNIQUES

• Cryptography relies on two basic components; an


algorithm (or cryptographic methodology) and a
key. Cryptographic algorithms are the basic
building blocks of cryptographic applications and
protocols.
• Algorithm is the method used to encrypt the message,
and key is the object used to decrypt the message.
• In modern cryptographic systems, the algorithms are
complex mathematical formulae, and keys are
strings of bits. If two parties want to communicate,
they must use the same algorithm. In some cases,
they must also use the same key.
• Many cryptographic keys must be kept secret.
Sometimes algorithms are also kept secret, as the
method of encryption may hold the very method
used to decrypt the message.
CRYPTOGRAPHY
• Cryptosystems are being increasingly
used in encryption, authentication,
integrity, non repudiation, and
management of other crypto systems
like key management. A crypto
system is a mathematical function for
processing data and there is nothing
secret about the function except the
key.
• There are several examples of
Examples of Encryption techniques
such as Caesar’s method, Letter
pairing, RSA, DES(Data Encryption
Standard) and AES(Advanced
Encryption Standards)
CRYPTOGRAPHY
• The RSA cryptosystem is a public-key cryptosystem
that offers both encryption and digital signatures
(authentication). Ronald Rivest, Adi Shamir, and
Leonard Adleman developed the RSA system in
1977 RSA stands for the first letter in each of its
inventors' last names. Today, it is used in Web
browsers, email programs, mobile phones, virtual
private networks, secure shells, and many other
places.
• The RSA algorithm works as follows: With sufficiently
large keys, you can be confident of foiling the vast
majority of attackers as the large numbers are
extremely difficult to factorize. Only, the person
who wants to decrypt the message should know
these. Using these, mathematical algorithm is
developed which produces a public key. Anyone
who wants to encrypt a message uses this
algorithm. For example, if we take the product of
two arbitrarily large(but secret) prime number of
say, 50 digits each and multiply them, then using
the most current supercomputing technology it
Digital Signature
• Public key and private key

User A is depicted above and has two keys a public key,


this key is available to the public for download, and a
private key, this key is not available to the public.  All
keys are used to lock the information in an encrypted
mode.  The same keys are required to decrypt the data
Digital Signature
• Public key and private key

Another user can encrypt the data using users A’s Public Key.
User A will use the Private Key to decrypt the message. Without
user A’s Private Key the data can not be decrypted.   The above
figure depicts the encryption method and decryption method and
which keys are used.
CRYPTOGRAP
HY
• Encryption and authentication take
place without any sharing of
private keys: each person uses
only another's public key or their
own private key. Anyone can send
an encrypted message or verify a
signed message, but only
someone in possession of the
correct private key can decrypt or
sign a message.

CRYPTOGRAPHY

• Symmetric Key Crypto Systems:


• Historically known as Secret Key
System, the key for the underlying
mathematical function can be used to
reverse this mathematical function
(hence ‘symmetric’). There are two
types of symmetric key crypto
systems, viz.
• Stream ciphers - used in mobile
communication
• Block ciphers – used for encryption /
CRYPTOGRAPHY
• Symmetric-key algorithms,, use a
single secret key shared by sender
and receiver (which must also be
kept private, thus accounting for
the ambiguity of the common
terminology) for both encryption
and decryption. To use a symmetric
encryption scheme, the sender and
receiver must securely share a key
in advance.

CRYPTOGRAPHY

• Asymmetric Key Crypto Systems


• This is also known asPublic Key System. They
key for the underlying mathematical function
cannot be easily used to reverse the
mathematical function. A separate key is
required to do this (hence the name
“asymmetric”). Participants in such a system
will have a key pair – Public and Private key.
• This system is based on a one-way mathematical
function – easy in one direction but very
difficult to reverse, as for example, multiplying
two large numbers is easy but factorizing this
product can be very difficult. Eg. RSA.
Asymmetric key crypto systems are flexible to
implement as compared to secret key systems,
but are much slower to execute. This system is
widely used in digital signature, key
CRYPTOGRAPHY

• Private and Public key


• The message encrypted with the public
key is decrypted with the private key.
• For asymmetric key crypto systems, the
difficulty is finding an unknown
private key that depends upon the
difficulty of some well-known
mathematical problems. The problem
of finding an RSA private key is
believed to be equivalent to
factorizing a large number that is the
product of two large primes.
CRYPTOGRAPHY
• The distinguishing technique used in public
key-private key cryptography is use of
asymmetric key algorithms because
the key used to encrypt a message is not
the same as the key used to decrypt it.
Each user has a pair of cryptographic keys
— a public key and a private key. The
private key is kept secret, whilst the
public key may be widely distributed.
Messages are encrypted with the
recipient's public key and can only be
decrypted with the corresponding private
key. The keys are related mathematically,
but the private key cannot be feasibly
(i.e., in actual or projected practice)
derived from the public key. It was the
discovery of such algorithms which
CRYPTOGRAPHY
• The two main branches of public key
cryptography are:
• Public key encryption — a message
encrypted with a recipient's public key
cannot be decrypted by anyone except a
possessor of the matching private key --
presumably, this will be the owner of that
key and the person associated with the
public key used. This is used for
confidentiality.
• Digital Signatures — a message signed
with a sender's private key can be verified
by anyone who has access to the sender's
public key, thereby proving that the
sender had access to the private key (and
therefore is likely to be the person
associated with the public key used), and

Das könnte Ihnen auch gefallen