0% found this document useful (0 votes)
2 views

Cryptography Godwin

The document provides an overview of various cryptographic algorithms and standards, including symmetric and asymmetric encryption methods, hash functions, and key exchange protocols. It discusses the evolution of these technologies, highlighting their applications, strengths, and vulnerabilities, particularly focusing on DES, AES, RSA, ECC, and SHA families. The document emphasizes the shift towards more secure and efficient algorithms in response to emerging security threats.

Uploaded by

jquismorio01282
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Cryptography Godwin

The document provides an overview of various cryptographic algorithms and standards, including symmetric and asymmetric encryption methods, hash functions, and key exchange protocols. It discusses the evolution of these technologies, highlighting their applications, strengths, and vulnerabilities, particularly focusing on DES, AES, RSA, ECC, and SHA families. The document emphasizes the shift towards more secure and efficient algorithms in response to emerging security threats.

Uploaded by

jquismorio01282
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Cryptography

- Uses a single, shared secret key for


encryption and decryption. Key exchange
challenges. Efficiency and speed.
- An older block cipher standard.
- Developed in the 1970s by IBM, adopted as a US federal standard in 1977.
- IBM, with modifications by the National Security Agency (NSA).
- Early banking systems, government communications.
- Early data protection, electronic funds transfer.
- Largely obsolete due to its short key length (56 bits), making it vulnerable to brute-force
attacks.
- Insecure, too easy to crack.
- Developed as a temporary solution to DES vulnerabilities.
- Developed as an enhancement of DES.
- Some fi nancial systems, legacy applications.
- Secure fi nancial transactions, backward compatibility.
- Becoming less common due to performance overhead and the availability of more
secure alternatives like AES.
- slower than AES, and AES is more secure.
- A widely used, strong block cipher.
- Selected by NIST as the successor to DES in 2001.
- Developed by Vincent Rijmen and Joan Daemen (Rijndael algorithm).
- Wi-Fi security (WPA2/3), VPNs, file encryption, SSL/TLS.
- Wireless security, web encryption, data storage.
- The current standard for symmetric encryption. Widely used and considered
secure.
- Blowfis h is a fast cipher, Twofis h is an AES competitor.
- Blowfish was intended as a fast alternative to DES. Twofish was submitted to the AES competition.
- Bruce Schneier.
- Password managers, file encryption.
- General purpose encryption.
- Still used in some applications, but AES is more prevalent.
- Uses public and private key pairs.
Public key for encryption, private key for
decryption. Key distribution advantages.
- A foundational public-key algorithm.
- Published in 1977.
- Ron Rivest, Adi Shamir, and Leonard Adleman.
- SSL/TLS, digital signatures, secure email.
- Secure online transactions, digital certificates.
- Still widely used, though ECC is gaining popularity.
- An efficient public-key algorithm with smaller key sizes.
- Developed in the mid-1980s, gaining popularity in the 2000s.
- Neal Koblitz and Victor S. Miller.
- Mobile devices, embedded systems, blockchain (ECDSA).
- Mobile security, IoT, cryptocurrencies.
- Increasingly used due to its efficiency and strong security.
- A key exchange protocol.
- Published in 1976.
- Whitfield Diffie and Martin Hellman.
- VPNs, secure communication protocols.
- Secure key establishment.
- Still used for key exchange, often combined with other asymmetric algorithms.
- One-way functions that produce fixed-size hash values.
- Data integrity, password storage, digital fingerprints.
- An older hash function.
- Developed in 1992.
- Ronald Rivest.
- File integrity checks.
- File verification.
- Considered insecure due to collision vulnerabilities.
- Collision attacks make it unsuitable for security-sensitive applications.
- Another older hash function.
- Developed in 1995.
- NSA.
- Digital signatures, file integrity.
- Digital certification.
- Considered insecure due to collision vulnerabilities.
- Collision attacks make it unsuitable for security-sensitive applications.
- A secure hash function from the SHA-2 family.
- Developed in 2001.
- NSA.
- Blockchain, digital signatures, file integrity.
- Cryptocurrencies, secure communication.
- Widely used and considered secure.
- A keyed hash function for message authentication.
- Used within many security protocols.
- Mih ir Bellare, Ran Canetti, and Hugo Krawczyk.
- Network protocols, authentication systems.
- Message authentication.
Widely used for message integrity and authentication.

You might also like