Sie sind auf Seite 1von 22

Encryption is the conversion of data into a form,that cannot be easily understood by unauthorized people.

Decryption is the process of converting encrypted data back into its original form, so it can be understood.

Security

Privacy

Authentication

Integrity

Nonrepudiation

Privacy- Ensuring that no one can read the message except the intended receiver. Authentication- The process of proving one's identity. Integrity Assuring that the data must arrive at the receiver exactly as they are sent. Nonrepudiation- A mechanism to prove that the sender really sent this message.

SENDER

RECEIVER

Email

Network

Privacy Authentication Integrity

Nonrepudiation

CRYPTOGRAPHY Greek means secret writing. The term refers to the science and art of transforming messages to make them secure and immune to attacks.

SENDER

RECEIVER

Plaintext Encryption

Plaintext Ciphertext
Network

Decryption Ciphertext

The original message, before being transformed,is called Plaintext. After message is transformed, it is called Ciphertext. An Encryption algorithm transforms the Plaintext to Ciphertext. A Decryption algorithm transforms the Ciphertext back to Plaintext. The Sender uses an Encryption algorithm. The Receiver uses a Decryption algorithm.

Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption Public Key Cryptography (PKC): Uses one key for encryption and another for decryption Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information

Also called Symmetric Key Cryptography. The same key is used by the sender(for encryption) and the receiver(for decryption). The key is shared. The same key is used in both directions. Used for long messages as it takes less time to encrypt/decrypt.
Shared key Plaintext Cipertext Plaintext

Each pair of users must have a unique secret key. If N people in the world want to use this method,there needs to be N(N-1)/2 keys. Example- 1 million people to communicate, 500 billion keys are needed. Distribution of the keys between two parties can be difficult.

There are 2 keys- a Private key and a Public Key. The Public Key is used for Encryption and is available to Public The Private Key is used for Decryption and is available only to an individual.

Removes the restriction of a shared symmetric key between two entities. Each entity creates a pair of keys, the private is kept and the public is distributed. The number of keys needed is reduced tremendously. Here for 1 million users to communicate, only 2 million keys are needed, not 500 billion.

Complexity of algorithm. Converting plaintext to cipertext takes long time and vice versa Association between an entity and its public key must be verified. Sender sends the public key to receiver via email, then the receiver must be sure that it really belong to sender and nobody else.

Also called message digests and one-way

encryption.

Use no key . a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Faces the problem of Collision.

Before a message is encrypted, it is called____ a. Plaintext b. Chiphertext c. Cryptotext d. Cryptonite

After a message is decrypted, it is called_____ a. Plaintext b. Cipertext c. Cryptotext d. Cryptonite

a.
b. c. d.

cipher is ______ An encryption algorithm A decryption algorithm A private key (a) or (b)

a. b. c.

d.

In the symmetric key method of cryptography, which key is publicly known? Encryption key only Decryption key only Both None of the above

If 20 people need to communicate using symmetric key cryptography, ______symmetric keys are needed. a. 19 b. 20 c. 190 d. 200

In public-key method of cryptography, which key is publicly known? a. Encryption key only b. Decryption key only c. Both d. None of the above

In the public key method of cryptography,only receiver has possession of the________ a. Private key b. Public key c. Both keys d. None of the above

Das könnte Ihnen auch gefallen