Cryptography & Network Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CRYPTOGRAPHY & NETWORK SECURITY

Cryptography:
Cryptography can be defined as the conversion of data into a scrambled code
that can be deciphered and sent across a public or private network.

Cryptography uses two main styles or forms of encrypting data ; symmetrical and
asymmetrical. Symmetric encryptions, or algorithms, use the same key for encryption as
they do for decryption. Other names for this type of encryption are secret-key, shared-
key, and private-key. The encryption key can be loosely related to the decryption key; it
does not necessarily need to be an exact copy.

Symmetric cryptography is susceptible to plain text attacks and linear cryptanalysis


meaning that they are hackable and at times simple to decode. With careful planning of
the coding and functions of the cryptographic process these threats can be greatly
reduced. Asymmetric cryptography uses different encryption keys for encryption and
decryption. In this case an end user on a network, public or private, has a pair of keys;
one for encryption and one for decryption. These keys are labeled or known as a public
and a private key; in this instance the private key cannot be derived from the public key.

The asymmetrical cryptography method has been proven to be secure against


computationally limited intruders. The security is a mathematical definition based upon
the application of said encryption. Essentially, asymmetric encryption is as good as its
applied use; this is defined by the method in which the data is encrypted and for what
use. The most common form of asymmetrical encryption is in the application of sending
messages where the sender encodes and the receiving party decodes the message by
using a random key generated by the public key of the sender.

Basic Idea:
The goal of cryptography is to make it possible that two people to exchange a message
in such a way that other people cannot understand. There is no end that number of
ways this can be done,but here we will be concerned with the methods of altering the
text in such a way that the recipient can undo the alteration and discover the original
text.
Encryption and decryption
Data that can be read and understood without any special measures is called plaintext or clear
text. The method of disguising plaintext in such a way as to hide its substance is called
encryption. Encrypting plaintext results in unreadable gibberish called cipher
text. We use encryption to make sure that information is hidden from anyone for whom it is not
intended, even those who can see the encrypted data. The process of reverting cipher text to its
original plaintext is called decryption.

How does cryptography work?


A cryptographic algorithm, or cipher, is a mathematical function used in the encryption
and decryption process. A cryptographic algorithm works in Combination with a key—a
word, number, or phrase—to encrypt the plaintext. The same plaintext encrypts to
different cipher text with different keys. The security of encrypted data is entirely
dependent on two things: the strength of the cryptographic algorithm and the secrecy of
the key. A cryptographic algorithm, plus all possible keys and all the protocols that make
it work, comprise a cryptosystem.

Cryptographic Algorithms:
Cryptographic algorithms can implemented either hardware (for speed), or in software
(for flexibility). There are 3 classes of algorithms they are,

1. Conventional Cryptography (Symmetric algorithms , Private keys)

2. Public key Cryptography (Asymmetric algorithms , public keys)

3. Hash function algorithm.


Conventional cryptography:
In conventional cryptography, also called secret-key or symmetric-key encryption, one
key is used both for encryption and decryption. The Data Encryption Standard (DES) is
an example of a conventional cryptosystem that is widely employed by the U.S.
government.
Public key cryptography:
The problems of key distribution are solved by public key cryptography. Public key
cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public
key, which encrypts data, and a corresponding private key (secret key) for decryption.
It is computationally infeasible to deduce the private key from the public key. Anyone
who has a public key can encrypt information but cannot decrypt it. Only the person who
has the corresponding private key can decrypt the information.

Digital signatures:
A major benefit of public key cryptography is that it provides a method for employing
digital signatures. Digital signatures let the recipient of information verify the authenticity of the
information’s origin, and also verify that the information was not altered while in transit. Thus,
public key digital signatures provide authentication and data integrity. A digital signature also
provides non-repudiation, which means that it prevents the sender from claiming that he or she
did not actually send the information.
Hash functions:
The system described above has some problems. It is slow, and it produces an
enormous volume of data—at least double the size of the original information. An
improvement on the above scheme is the addition of a one-way hash function in the
process. A one-way hash function takes variable-length input in this case, a message of
any length, even thousands or millions of bits—and produces a fixed-length output; say,
160 bits. The hash function ensures that, if the information is changed in any way—
even by just one bit—an entirely different output value is produced.

You might also like