Chapter 2_cos
Chapter 2_cos
InformatIon SeCurIty
1. Cryptography
Cryptography is the practice of protecting information by converting it
into a format that can only be deciphered by authorized users. This
transformation is achieved using encryption algorithms, which make data
unreadable to anyone without the proper key. Cryptography plays a
critical role in securing digital communication, such as emails, bank
transactions, and personal data on websites. Modern cryptographic
systems rely on mathematical concepts like prime factorization and
modular arithmetic. For instance, AES is a widely used symmetric
encryption algorithm that ensures data privacy, while RSA uses a
public/private key pair to secure online transactions, such as logging into
a bank account. Cryptographic techniques also help ensure the
authenticity of users through methods like digital signatures, which
confirm that the data came from a trusted source and hasn’t been
altered.
Features:
Integrity: Guarantees that data has not been tampered with during
transmission. This prevents attackers from modifying transaction details.
Main Areas:
Symmetric Encryption: Uses the same key for both encryption and
decryption (e.g., AES).
2. Cryptanalysis
Cryptanalysis is the process of analyzing and attempting to break
encrypted data without access to the secret key. The goal is to find
weaknesses in the encryption system and exploit them to decrypt the
message. Cryptanalysts often study the algorithm itself, searching for
flaws in the way it handles data. Some attacks are based on
mathematical properties, while others rely on patterns in the ciphertext.
For example, during WWII, cryptanalysts cracked the Enigma
machine, used by the Nazis to encrypt communications. In modern
times, techniques like brute-force attacks involve trying every possible
key until the correct one is found, while differential cryptanalysis was
used to break ciphers like DES. Cryptanalysis helps in improving
cryptographic systems by uncovering vulnerabilities before attackers can
exploit them.
Features:
Breaking Encryption: Attempts to decrypt data without the secret
key. This includes trying all possible keys (brute-force) or analyzing
encrypted data for patterns.
Main Areas:
3. Cryptology
Cryptology is the combined study of cryptography and cryptanalysis. It
is concerned with both creating secure systems to protect data and
analyzing existing ones to find vulnerabilities. Cryptologists develop
algorithms to ensure that information remains confidential, while also
testing these systems to identify weaknesses. With the rise of cyber
threats, cryptology is increasingly focusing on creating methods that
remain secure even against future technologies, like quantum
computing. For example, quantum cryptography uses principles of
quantum mechanics to create virtually unbreakable encryption systems.
Cryptology is essential not only in protecting sensitive information but
also in securing digital platforms that power everything from online
banking to communications. One major development in cryptology is the
creation of blockchain technology, which uses cryptographic
techniques to ensure the integrity and authenticity of transactions in
digital currencies like Bitcoin.
Features:
Main Areas:
Substitutional Techniques
Substitution techniques are methods used in cryptography to encrypt
plaintext by replacing each element (typically letters) with a
corresponding ciphertext element based on a specific rule or key. These
techniques are used to obscure the original message, making it difficult
for unauthorized parties to understand it without the correct decryption
key.
1. Caesar Cipher
The Caesar Cipher is a simple substitution cipher where each letter of
the plaintext is shifted by a fixed number of positions in the alphabet.
This makes it easy to understand and use, but also easy to break. The
cipher works by shifting all the letters in the message by the same
number, creating a consistent pattern that is easily spotted.
Advantages:
Disadvantages:
Advantages:
More secure than the Caesar cipher because the substitution rule
is not a simple shift.
Can be more complex, especially if a large key is used.
Disadvantages:
Advantages:
Disadvantages:
If the keyword is too short or reused too often, attackers can use
techniques like Kasiski examination to find patterns in the
ciphertext.
Both the sender and receiver must have the same keyword and
keep it secret.
4. One-Time Pad (OTP)
Advantages:
Disadvantages:
Polyalphabetic
Cipher Monoalphabetic One-Time Pad
Caesar Cipher Substitution
Technique Substitution Cipher (OTP)
Cipher
Each letter is
Each letter is Uses multiple
Each letter is substituted by a
Encryption replaced by another substitution
shifted by a random key
Process letter from a fixed alphabets based on
fixed number. letter (one-time
set. a keyword.
use).
Polyalphabetic
Cipher Monoalphabetic One-Time Pad
Caesar Cipher Substitution
Technique Substitution Cipher (OTP)
Cipher
Vulnerable to More secure; hard Perfect security
Slightly more secure
frequency to break due to when the key is
Security than Caesar but still
analysis; easy to varying random and
vulnerable.
break. substitutions. used once.
A keyword Key must be as
A single number A full alphabet (word/phrase) that long as the
Key Size
(shift value). substitution key. is repeated over the message and
message. used only once.
Requires the
Shift letters back Requires knowledge Requires the same
exact key used
Decryption by the same of the exact keyword to reverse
for encryption to
number. substitution rule. the shifts.
decrypt.
Cannot be
Easily cracked Can be broken if
Susceptible to cracked unless
Vulnerability by modern the keyword is
frequency analysis. the key is reused
cryptanalysis. short or reused.
or non-random.
Difficult to
Key is simple to Requires secure Requires secure manage; key
Key
manage (just a sharing of a fixed sharing of the must be securely
Management
shift value). substitution key. keyword. exchanged and
stored.
"HELLO"
"HELLO" "HELLO" becomes encrypted with
Using keyword
becomes "MFCCZ" with random key
Examples "KEY", "HELLO"
"KHOOR" with random "XMCKL"
becomes "RIJVS".
a shift of 3. substitutions. becomes
"EQNVZ".
Much harder to Provides
More complex,
Main Simple and easy crack due to perfect security
harder to predict
Advantage to implement. multiple shifting with random
than Caesar Cipher.
alphabets. keys.
Vulnerable to
Still vulnerable to Can be broken if Infeasible for
Main frequency
frequency analysis the keyword is large messages
Disadvantage analysis and easy
and key exposure. short or reused. due to key size.
to guess.
Transposition Techniques
Encryption Example:
H...O...R...D
.E.L.W.L.O..
2. Columnar Transposition
Encryption Example:
Write the plaintext into a grid (usually filling the columns with the
plaintext in order):
HELLO
WORLD
Key: KEY
Column order: 3, 1, 2
Steganography
Encryption Example:
Hashing
Example:
o Input: "HELLO"
2cf24dba5fb0a30e26e83b2ac5b9e29e1b168c7f33b64f7c71cc89c4f38e3
c0c
Symmetric Cryptography
Key Points:
Advantages:
Disadvantages:
Key Management: The need to share and manage the same key
between both parties securely can be difficult. If the key is
exposed, the entire encryption system is compromised.
Asymmetric Cryptography
Asymmetric cryptography (also known as public-key cryptography)
uses two separate keys: a public key (for encryption) and a private key
(for decryption). The public key is shared openly, while the private key is
kept secret. Only the corresponding private key can decrypt the data that
was encrypted with the public key.
Key Points:
Advantages:
Disadvantages:
Symmetric
Feature Asymmetric Cryptography
Cryptography
Key Points:
Key Size: DES uses a 56-bit key for encryption and decryption,
although the original key is 64 bits long, with 8 bits used for parity
(error checking).
Example:
Plaintext: HELLO123
Advantages of DES:
Disadvantages of DES:
1. Signing Process:
2. Verification Process:
o If the hash values don’t match, the receiver knows that the
message has been tampered with or the signature is not
valid.
Example:
The sender hashes this message and encrypts the hash with their
private key to create a digital signature.
Key Uses the same key for Uses a private key for signing
Usage encryption and decryption and a public key for verification
Key Features:
Strict Chain of Command: All entities must trust the root CA.
Certificate Revocation: If a certificate is revoked, it is added to a
Certificate Revocation List (CRL) or checked via Online
Certificate Status Protocol (OCSP).
Advantages:
Disadvantages:
Key Features:
Advantages:
No Single Point of Failure: If one user’s key is compromised,
others are unaffected.
Disadvantages:
Key Features:
Advantages:
Disadvantages: