GIF325
GIF325
Definition
What is Cryptography
In today’s age of computers cryptography is often associated with the process where an
ordinary plain text is converted to cipher text which is the text made such that intended receiver
of the text can only decode it and hence this process is known as encryption. The process of
conversion of cipher text to plain text this is known as decryption
1. Confidentiality:
Information can only be accessed by the person for whom it is intended and no other
person except him can access it.
2. Integrity:
3. Non-repudiation:
The creator/sender of information cannot deny his or her intention to send information at
later stage.
4. Authentication:
Types of Cryptography:
It is an encryption system where the sender and receiver of message use a single
common key to encrypt and decrypt messages. Symmetric Key Systems are faster and
simpler but the problem is that sender and receiver have to somehow exchange key in a
secure manner. The most popular symmetric key cryptography system is Data
Encryption System (DES).
2. Hash Functions:
There is no usage of any key in this algorithm. A hash value with fixed length is calculated
as per the plain text which makes it impossible for contents of plain text to be recovered.
Many operating systems use hash functions to encrypt passwords.
3. Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt information. A public key
is used for encryption and a private key is used for decryption. Public key and Private
Key are different. Even if the public key is known by everyone the intended receiver can
only decode it because he alone knows the private key.
PASSIVE ATTACKS
Passive attacks are in the nature of eavesdropping(spy) on, or monitoring of transmissions.
The goal of the opponent is to obtain information that is being transmitted. Two types of passive
attacks are the 'Release of Message Content' and 'Traffic Analysis'.
1. Release of Message
The 'release of message contents' is easily understood. A telephone conversation, an
electronic mail message, and a transferred file may contain sensitive or confidential
information. We would like to prevent an opponent from learning the contents of these
transmissions.
2. Traffic Analysis
Traffic Analysis
Here, suppose we had a way of making the contents of messages or other information
traffic so that opponents, event if they captured the message, could not extract the information
from the message. The common technique for masking contents is encryption. If we had
encryption protection in place, an opponent could determine the location and identity of
communicating hosts and could observe the frequency and length of messages being
exchanged. This information might be useful in guessing the nature of the communication that
was taking place.
ACTIVE ATTACKS
Active attacks involve some modification of the data stream or the creation of a false stream
and can be subdivided into four categories: Masquerade, Replay, Modification of Messages,
and Denial of Service.
1. Masquerade.
2. Replay.
Replay involve the passive capture of a data unit and its subsequent retransmission to
produce an authorized effect.
3. Modification of messages.
It simply means that some portion of a authorized message is altered, or that messages
are delayed or reordered, to produce an unauthorized effect. For example, a ,message meaning
"Allow Virat to read confidential file accounts" is changed to "Allow Dhoni to read confidential
file accounts".
4. Denial of Service.