Unit 4. Cryptography and Network Security: Introduction To Cryptography
Unit 4. Cryptography and Network Security: Introduction To Cryptography
Unit 4. Cryptography and Network Security: Introduction To Cryptography
Introduction to Cryptography
Data Encryption
Data encryption translates data into another form, or code, so that only
people with access to a secret key (formally called a decryption key) or
password can read it. Encrypted data is commonly referred to as cipher
text, while unencrypted data is called plain text.
ENCRYPTION
Encryption is the process in which a sender converts the original
information to another form
The sender requires an encryption algorithm and a key to transform the
plaintext (original message) into a ciphertext (encrypted message)
DECRYPTION
Decryption inverts the encryption process in order to convert the
message back to its real form.
TYPES OF CRYPTOGRAPHY
1. Symmetric key
2. Asymmetric key
The cipher text is sent to the receiver over the communication channel.
At receiver side,
Receiver decrypts the cipher text using his private key.
The private key of the receiver is known only to the receiver.
Using the public key, it is not possible for anyone to determine the
receiver’s private key.
After decryption, cipher text converts back into a readable format.
Advantages-
The advantages of public key cryptography are-
It is more robust.
It is less susceptible to third-party security breach attempts.
Message Authentication
Message authentication can be provided using the cryptographic
techniques that use secret keys as done in case of encryption.
• The service used to provide message authentication is a Message
Authentication Code (MAC).
The sender uses some publicly known MAC algorithm, inputs the
message and the secret key K and produces a MAC value.
Similar to hash, MAC function also compresses an arbitrary long
input into a fixed length output. The major difference between hash
and MAC is that MAC uses secret key during the compression.
The sender forwards the message along with the MAC. Here, we
assume that the message is sent in the clear, as we are concerned of
providing message origin authentication, not confidentiality. If
confidentiality is required, then the message needs encryption.
On receipt of the message and the MAC, the receiver feeds the
received message and the shared secret key K into the MAC
algorithm and re-computes the MAC value.
The receiver now checks equality of freshly computed MAC with the
MAC received from the sender. If they match, then the receiver
accepts the message and assures himself that the message has been
sent by the intended sender.
If the computed MAC does not match the MAC sent by the sender,
the receiver cannot determine whether it is the message that has been
altered or it is the origin that has been falsified. As a bottom-line, a
receiver safely assumes that the message is not the genuine.
Digital Signatures
A digital signature is a mathematical technique used to validate the
authenticity and integrity of a message, software or digital document.
A digital signature is basically a way to ensure that an electronic
document (e-mail, spread sheet, text file, etc.) is authentic
Authentic means that you know who created the document and you know
that it has not been altered in any way since that person created it.
Digital signatures use a certificate-based digital ID issued by an
accredited Certificate Authority (CA) or Trust Service Provider (TSP) so
when you digitally sign a document, your identity is uniquely linked to
you.
The signature is bound to the document with encryption, and everything
can be verified using underlying technology known as Public Key
Infrastructure (PKI).
Applications of Cryptography
Digital Currency: A much-known application of cryptography is digital
currency wherein cryptocurrencies are traded over the internet. Top
cryptocurrencies like Bitcoin, Ethereum, and Ripple have been
developed and traded over time.
Unregulated by any government or banks, cryptocurrencies are our
upcoming future.
E-commerce:
Ecommerce helps us to shop online and to do online payments.
These transactions are encrypted and perhaps cannot be altered by
any third party. Moreover, the passwords we set for such sites are
also protected under keys to ensure that no hacker gets access to our
e-commerce details for harmful purposes.
Military operations: cryptography Used for encrypting military
communication channels, military encryption devices convert the
real communication characters so that the enemies cannot come to
know about their upcoming plans.
On the large scale, it can be widely used for declaring wars and
sending crucial messages without the involvement of a messenger.
Secure communications: The most obvious use of cryptography, and the
one that all of us use frequently, is encrypting communications between
us and another system.
To make the internet more secure, most communication protocols have
adopted encryption. Many older protocols have been dropped in favour of
newer, encrypted replacements.
Storing Data: We all store a large amount of data, and any data is
valuable to at least the person who generated it. Every operating system
uses encryption in some of the core components to keep passwords secret,
conceal some parts of the system, and make sure that updates and patches
are really from the maker of the system.
FIRE WALL.
A firewall is a network security device, either hardware or software-
based, which monitors all incoming and outgoing traffic and based on a
defined set of security rules it accepts, rejects or drops that specific
traffic.
Accept : allow the traffic
Reject : block the traffic but reply with an “unreachable error”
Drop : block the traffic with no reply
History and Need for Firewall
•Before Firewalls, network security was performed by Access Control Lists
(ACLs) residing on routers.
•ACLs are rules that determine whether network access should be granted or
denied to specific IP address.
•ACL cannot determine the nature of the packet it is blocking .
• ACL alone does not have the capacity to keep threats out of the network