Introduction to Cryptography C3A Flashcards
Secure Systems
- Security Policy
- Security Environment
- Security Mechanisms
- Monitoring and auditing procedures
What is Encryption?
Encryption is a mechanism that can be incorporated into security protocols
- The conversion into a form is called a ciphertext, which is not meant not to be read easily
What is Decryption?
The process of converting encrypted data back into its original form
Cryptographic Techniques
-Encryption
-Algorithm
-Key
= The algorithm is used to transform plaintext into a ciphertext
Classes of algorithms:
Reversible, symmetric (Conventional)
Reversible, asymmetric (Public key)
One-Way (Hash)
Properties of Algorithms
Reversible: can transform ciphertext back to plaintext
Symmetric: uses one key for both encryption and decryption
Asymmetric: uses different keys for encryption / decryption
What is Symmetric Key
Also called private or secret key cryptography
- The same key is used to encrypt and decrypt data
Asymmetric, Reversibile
Uses a key pair
- Either key can be used to encrypt a message - the other is then used to decrypt it (public and private key)
- One key is published and another is kept secret
Symmetric vs Asymmetric Key
SYMMETRIC
- both share same key
- typically faster x100
ASYMMETRIC
- Two separate key: public and private key
- Typically slower
One-Way (Hash)
- Create a message digest or “fingerprint”.
- Plaintext message can not be deduced from its hash
- Used for passwords by OS
Brute Force Attack
- Trying out all possible values of a password to get through.
Passwords Cracking
Using “password recovery” tool.