Cryptography
Cryptography
Cryptography
TECHNOLOGY
DECENTRALIZATION AND ENCRYPTION
CRYTPOGRAPHY NEED
CLASS PARTICIPATION:
CRYTPOGRAPHY
• Cryptography is the science of making information secure in the presence of
adversaries.
• Ciphers are used to encrypt data so that if intercepted by an adversary, the data is
meaningless to them without decryption, which requires the secret key.
• Traditionally, users are issued a username and password, which are used to gain access to
the platforms they are using- SINGLE FACTOR AUTHENTICATION (as there is only one
factor, namely something you know, that is, the password and username.)
• This type of authentication is not very secure due to various reasons, such as password
leakage; therefore, additional factors are now commonly used to provide better security.
1.The first factor is something you have, such as a hardware token or smart card. In
this case, a user can use a hardware token in addition to login credentials to gain access
to a system. This provides protection by requiring two factors of authentication. A user
who has access to the hardware token and knows the log-on credentials will be able to
access the system. Both factors should be available in order to gain access to the
system, thus making this method a two-factor authentication mechanism.
2.The second factor is something you are, which uses biometric features in order
to identify the user. In this method, a user uses fingerprint, retina, iris, or hand
geometry to provide an additional factor for authentication. This way, it can be ensured
that a user was indeed present during the authentication mechanism as biometric
features are unique to an individual. However, careful implementation is required in
order to ensure a high level of security as some research has suggested that biometric
systems can be circumvented in certain scenarios.
DATA ORIGIN
AUTHENTICATION
• Also known as message authentication, this is an assurance that the source of information
is verified.
• Data origin authentication implies data integrity because if a source is corroborated, then
data must not have been altered.
• Various methods, such as Message Authentication Codes (MACs) and digital signatures are
most commonly used.
Cryptographic primitives
• Cryptographic primitives are the basic building blocks of a security
protocol or system.
• cryptographic algorithms that are essential for the building of
secure protocols and systems.
• A security protocol is a set of steps taken in order to achieve
required security goals by utilizing appropriate security
mechanisms.
A generic cryptography model
• In the preceding diagram, P, E, C, and D represents Plain text, Encryption,
Cipher text, and Decryption, respectively. Entity: It is either a person or a
system that sends, receives, or performs operations on data.
• Sender: Sender is an entity that transmits the data.