0% found this document useful (0 votes)
2 views

Unit 4 Introduction to Cryptography

Cryptography is the art and science of securing information through transformation into unreadable formats for unauthorized users, ensuring confidentiality, integrity, authentication, and non-repudiation. It has evolved from ancient methods to modern algorithms, including symmetric and asymmetric encryption, hash functions, and digital signatures, each with specific applications and security considerations. Future developments in cryptography, such as quantum cryptography, aim to enhance security against emerging threats.

Uploaded by

emmettsteveson2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Unit 4 Introduction to Cryptography

Cryptography is the art and science of securing information through transformation into unreadable formats for unauthorized users, ensuring confidentiality, integrity, authentication, and non-repudiation. It has evolved from ancient methods to modern algorithms, including symmetric and asymmetric encryption, hash functions, and digital signatures, each with specific applications and security considerations. Future developments in cryptography, such as quantum cryptography, aim to enhance security against emerging threats.

Uploaded by

emmettsteveson2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Introduction to Cryptography

1. What is Cryptography?
Cryptography is the art and science of protecting information by transforming it into an
unreadable format for unauthorized users. It ensures that only intended recipients can access
and understand the original message. This process involves algorithms, protocols, and
techniques to secure data from malicious attacks or unauthorized access.
Objectives of Cryptography:
 Confidentiality: Ensures that information is only accessible to those who have the
proper authorization.
 Integrity: Protects data from being altered during transmission or storage.
 Authentication: Confirms the identities of the communicating parties.
 Non-repudiation: Ensures that actions cannot be denied or revoked after they have
been performed, providing proof of origin and integrity.
2. Historical Background
Cryptography has a long history, dating back thousands of years:
 Ancient Methods: Early civilizations used substitution and transposition ciphers,
such as the Caesar Cipher, which shifted letters by a fixed number of positions.
 Medieval Period: Arab scholars made significant advancements in frequency
analysis, weakening substitution ciphers.
 Modern Era: The Enigma machine used by Germany during World War II
introduced complex mechanical encryption. The advent of computers led to digital
encryption algorithms, enhancing security.

3. Core Concepts in Cryptography


Cryptography is based on several core concepts that form the foundation of secure
communication. Let’s dive into each concept in detail:
 Plaintext: This is the original, unencrypted data that needs protection. It could be a
message, file, or any piece of sensitive information that is meant to be secured.
o Example: In an email, the actual message before encryption is the plaintext.
 Ciphertext: The result of encrypting plaintext. Ciphertext is unintelligible without the
decryption key, ensuring confidentiality.
o Example: After encryption, "Hello" might become "XyZb12$".
 Encryption: The process of converting plaintext into ciphertext using an encryption
algorithm and a key. Encryption ensures that unauthorized parties cannot read the
data.
o Types:
 Symmetric Encryption: Same key is used for both encryption and
decryption.
 Asymmetric Encryption: Uses a pair of keys – a public key for
encryption and a private key for decryption.
 Decryption: The reverse of encryption. It converts ciphertext back into plaintext
using a decryption algorithm and the appropriate key.
o Example: Decrypting "XyZb12$" back into "Hello" using the correct key.
 Key: A piece of information that controls the encryption and decryption processes.
The security of cryptographic systems relies heavily on the secrecy and strength of the
key.
o Key Length: Longer keys provide stronger security. For example, AES-256 is
stronger than AES-128 because of its longer key length.
 Algorithm: A well-defined procedure or set of rules used to perform encryption and
decryption. Algorithms define the logic for transforming plaintext into ciphertext and
vice versa.
o Example: AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-
Adleman) are popular encryption algorithms.
 Key Management: Refers to the processes involved in generating, exchanging,
storing, and retiring cryptographic keys securely. Poor key management can lead to
compromised security.
 Authentication: Ensures that the sender and receiver of information are who they
claim to be. Authentication prevents impersonation and guarantees the integrity of
communication.
o Methods: Passwords, biometrics, and digital certificates.
 Non-Repudiation: Ensures that a sender cannot deny sending a message. Digital
signatures are commonly used to provide non-repudiation.
 Integrity: Ensures that data has not been altered during transmission. Hash functions
like SHA-256 help verify the integrity of messages by producing unique hash values.
Understanding these core concepts is crucial for implementing secure systems and protecting
sensitive information from unauthorized access and malicious activities.
4. Types of Cryptography
4.1 Symmetric Key Cryptography
Symmetric key cryptography is a method of encryption where the same key is used for both
encrypting and decrypting information. The sender and receiver must share this secret key
beforehand to establish secure communication.
 Process:
1. The sender encrypts the plaintext using the secret key and an encryption
algorithm.
2. The resulting ciphertext is sent to the receiver.
3. The receiver uses the same secret key and algorithm to decrypt the ciphertext
back into plaintext.
 Examples: DES (Data Encryption Standard), AES (Advanced Encryption Standard),
and Blowfish.
 Pros: Faster and requires fewer computational resources than asymmetric
cryptography.
 Cons: Key distribution is challenging because the secret key must be securely shared
between communicating parties.
4.2 Asymmetric Key Cryptography
Asymmetric key cryptography, also known as public-key cryptography, uses a pair of keys —
a public key and a private key — to secure communications. One key encrypts the message,
while the other decrypts it.
 Process:
1. The sender encrypts the plaintext using the receiver's public key.
2. The resulting ciphertext is sent to the receiver.
3. The receiver decrypts the ciphertext using their private key.
 Examples: RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography).
 Pros: Solves the key distribution problem by making the public key widely available.
 Cons: Slower than symmetric encryption due to more complex algorithms.
4.3 Hash Functions
A hash function is a mathematical algorithm that transforms input data into a fixed-length
hash value or digest, which uniquely represents the original data.
 Process:
1. The input data is processed through the hash function.
2. A fixed-length hash value is generated.
3. Even the slightest change in input data results in a drastically different hash.
 Examples: SHA (Secure Hash Algorithm), MD5 (Message Digest Algorithm 5).
 Purpose: Ensures data integrity by verifying that the original data has not been
altered. Hash functions are also used in digital signatures and password storage.
5. Cryptographic Algorithms
5.1 Symmetric Algorithms:
 DES (Data Encryption Standard): Employs a 56-bit key; now considered insecure
due to vulnerability to brute-force attacks.
 AES (Advanced Encryption Standard): Uses key sizes of 128, 192, or 256 bits;
widely adopted due to its strength and efficiency.
5.2 Asymmetric Algorithms:
 RSA (Rivest-Shamir-Adleman): Based on the difficulty of factoring large prime
numbers.
 ECC (Elliptic Curve Cryptography): Provides strong security with smaller key
sizes, making it ideal for constrained environments.
5.3 Hashing Algorithms:
 SHA (Secure Hash Algorithm): Produces unique digests, ensuring data integrity.
 MD5 (Message Digest Algorithm 5): Fast but susceptible to collision attacks,
making it unsuitable for high-security applications.
6. Digital Signatures
Digital signatures authenticate the identity of the sender and ensure message integrity.
 Process: The sender hashes the message and encrypts the hash with their private key,
creating a digital signature. The receiver decrypts the signature with the sender's
public key and compares it with a newly generated hash from the received message to
verify authenticity.
7. Key Management
Proper key management is crucial to cryptography's effectiveness.
 Key Generation: Secure algorithms create unpredictable keys.
 Key Distribution: Secure transmission channels prevent key interception.
 Key Storage: Protecting keys from unauthorized access ensures system security.
8. Applications of Cryptography
 Secure Communication: Encrypting messages in applications like WhatsApp or
Signal.
 Data Protection: Protecting sensitive information such as credit card numbers.
 Authentication: Verifying identities through passwords or biometrics.
 Blockchain: Secures transactions and ensures integrity in decentralized networks.
9. Attacks on Cryptographic Systems
Cryptographic systems face various threats:
 Brute Force Attack: Attempting every possible key until the correct one is found.
 Man-in-the-Middle Attack: Intercepting communication between two parties.
 Replay Attack: Capturing and reusing data packets to deceive the system.
 Side-Channel Attack: Exploiting physical characteristics (e.g., power consumption)
to extract keys.
10. Future of Cryptography
 Quantum Cryptography: Uses principles of quantum mechanics for unbreakable
security.
 Post-Quantum Cryptography: Develops algorithms that resist quantum computer-
based attacks, ensuring long-term security.
11. Conclusion
Cryptography is a cornerstone of digital security, providing confidentiality, integrity,
authentication, and non-repudiation. As technology evolves, so do cryptographic methods,
ensuring robust protection against emerging threats

You might also like