Cryptography & Network Security
Cryptography & Network Security
Cryptography & Network Security
Cryptography:
Cryptography can be defined as the conversion of data into a scrambled code
that can be deciphered and sent across a public or private network.
Cryptography uses two main styles or forms of encrypting data ; symmetrical and
asymmetrical. Symmetric encryptions, or algorithms, use the same key for encryption as
they do for decryption. Other names for this type of encryption are secret-key, shared-
key, and private-key. The encryption key can be loosely related to the decryption key; it
does not necessarily need to be an exact copy.
Basic Idea:
The goal of cryptography is to make it possible that two people to exchange a message
in such a way that other people cannot understand. There is no end that number of
ways this can be done,but here we will be concerned with the methods of altering the
text in such a way that the recipient can undo the alteration and discover the original
text.
Encryption and decryption
Data that can be read and understood without any special measures is called plaintext or clear
text. The method of disguising plaintext in such a way as to hide its substance is called
encryption. Encrypting plaintext results in unreadable gibberish called cipher
text. We use encryption to make sure that information is hidden from anyone for whom it is not
intended, even those who can see the encrypted data. The process of reverting cipher text to its
original plaintext is called decryption.
Cryptographic Algorithms:
Cryptographic algorithms can implemented either hardware (for speed), or in software
(for flexibility). There are 3 classes of algorithms they are,
Digital signatures:
A major benefit of public key cryptography is that it provides a method for employing
digital signatures. Digital signatures let the recipient of information verify the authenticity of the
information’s origin, and also verify that the information was not altered while in transit. Thus,
public key digital signatures provide authentication and data integrity. A digital signature also
provides non-repudiation, which means that it prevents the sender from claiming that he or she
did not actually send the information.
Hash functions:
The system described above has some problems. It is slow, and it produces an
enormous volume of data—at least double the size of the original information. An
improvement on the above scheme is the addition of a one-way hash function in the
process. A one-way hash function takes variable-length input in this case, a message of
any length, even thousands or millions of bits—and produces a fixed-length output; say,
160 bits. The hash function ensures that, if the information is changed in any way—
even by just one bit—an entirely different output value is produced.