Secure Application Development - 02 (1)
Secure Application Development - 02 (1)
- 02
Cryptography
Chapter Objectives
● Explain the basic operation of symmetric block encryption
algorithms.
● Compare and contrast block encryption and stream encryption.
● Discuss the use of secure hash functions for message
authentication.
● Explain the basic operation of asymmetric block encryption
algorithms.
● Present an overview of the digital signature mechanism.
Symmetric Encryption
Similar keys, similar encryption/decryption algorithms, transparent
a;gorithm (known to everyone)
Symmetric Encryption (cont.)
● Plaintext: This is the original message or data that is fed into the algorithm as
input.
● Encryption algorithm: The encryption algorithm performs various substitutions
and transformations on the plaintext.
● Secret key: The secret key is also input to the encryption algorithm. The exact
substitutions and transformations performed by the algorithm depend on the key.
● Ciphertext: This is the scrambled message produced as output. It depends on
the plaintext and the secret key. For a given message, two different keys will
produce two different ciphertexts.
● Decryption algorithm: This is essentially the encryption algorithm run in
reverse. It takes the ciphertext and the secret key and produces the original
plaintext.
Symmetric Encryption Requirements
There are two requirements for secure use of symmetric encryption: