Cryptology
Cryptology
Cryptology
information, while protecting and maintain its verification. Encryption is the process that
occurs when data is passed through a mathematical operation resulting in an alternative
form of the original message (Whiteman and Mattord). This mathematical operation is known
as an algorithm; a programmatic process in which an unencrypted message is converted
into an encrypted sequence of bits, representing the original message. Encryption is also
known as cryptology and involves two processes.
1. Cryptography
- This process involves the use of keys or codes to ensure a secure method of
information
- A key can be described as a bit string consisting of a variable amount of bits.
When used in conjunction with an algorithm a message can be either encrypted
or decrypted.
- A key can be either a bit or a passphrase used by humans, which in turn is
converted into the series of bits understood by the computer program.
2. Cryptanalysis
Involves translating the cipher-text (encrypted) back to its plain-text (original
message), regardless of the algorithms or keys used to encrypt the message.
The value that information offers to a company relies on the characteristics that it possesses.
For Blue Steel, their main concern is the confidentiality and integrity of the information
passed through their communication channels.
-
Confidentiality
o Information is said to have confidentiality either when it has not been
disclosed to unauthorized individuals, while in transmission or when in
storage.
Integrity
o Information is described to have integrity when it is whole, uncorrupted
and complete. Integrity is compromised when there is a disruption to its
authentic state. When users cannot verify the integrity of information, then
that information becomes useless or has no value, sine information
integrity forms the cornerstone of all information systems.
In addition, there is another technique that is often incorporated into encryption process is
the hash function. This refers to a mathematical algorithm, which creates a fingerprint, or
message summary confirming the identity of a specific message and that there has been no
changes to the message during the transmission. Although no cipher-text is created, a hash
function ensures both integrity and message identity of the information.
Cryptographic Algorithms
There are two broad categories exist, namely symmetric and asymmetric algorithms. The
key types used for encryption and decryption distinguish both methods.
private key. As result, this is the primary difference between symmetric and asymmetric
encryption.
Symmetric
Functionality
Computational
Asymmetric
Efficiency
Key Size
Hardware
Security
Reference List
Aladdin (2000), The Enduring Value of Symmetric Encryption. www.eAladdin.com (white
paper)
Bauchle, Robert, 19 May 2010, What is Encryption?
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212062,00.html
Accessed: 30 August 2010
Bellare, Mihir and Rogaway, Phillip (2005) Introduction to Modern Cryptography. California,
University of California
Cobb, Michael, 30 March 2010, What are the differences between symmetric and
asymmetric encryption algorithms?
http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci1516
979,00.html
Accessed: 27 August 2010
Eisenbarth, T., Paar, C., Poshmann, A., Kumar, S., Uhsadel, L., (2007). A survey of
lightweight cryptography implementations, IEEE Design and Test for Computers, Vol. 11/12
(www.computer.org.csdl)
Hazen, Fred, May 2007, Encryption
http://www.cs.umbc.edu/~wyvern/ta/encryption.html
Accessed: 30 August 2010
KetuFile
White
Paper
(www.scholar.google.co.za)
(2004),
Symmetric
vs.
Asymmetric
Encryption