Network Security &: 2. What Is Cryptography
Network Security &: 2. What Is Cryptography
&
Cryptography
CSE CSE
rathansaikirantrml@gmail.com
Contents
1. Introduction
2. What is Cryptography
3. Network Security
4. Network security Needs
5. Cryptographic Process
6. Digital Signatures and Certificates
7. Cryptographic Technologies
8. Public Key Infrastructure (PKI)
9. Attacking Cryptography
10. Summary
11. References
Cryptography Terminology:
2. What is Cryptography? a) Plaintext: The original intelligible
message.
The term cryptology has its origin in Greek
kryptós lógos, which means “hidden b) Cipher text: The transformed message.
word.” Cryptography is the science of
protecting data, which provides means and c) Cipher: An algorithm for transforming an
methods of converting data into unreadable intelligible message to unintelligible by
form, so that Valid User can access transposition.
Information at the Destination.
Cryptography is the science of using d) Key: Some critical information used by
mathematics to encrypt and decrypt data. the cipher, known only to the sender &
Cryptography enables you to store sensitive receiver.
Common Security Threats your Bank account and then replay that
request over the network.
Identity interception: It means that
someone might steal your identity and use Data interception and manipulation: If
it as their own. someone can read your credit card
information while it is on the wire, they
Replay attack: They might capture your
could cause a lot of trouble for you.
request of withdrawing 1000 dollars from
Etc. It is “difficult” to get M just by knowing M'
A CSP is an independent software module Encryption Standards (DES) when they are
that performs cryptography operations, encrypted with the same key.
such as secret-key exchange, digital signing
Linear Cryptanalysis Attack: Linear
of data, and public-key authentication.
Cryptanalysis attack was invented by
Chain-building mechanism attempts to build
Mitsuru Matsui in 1993. This method is
a certification path (a certificate chain) from
based on the concept that if you XOR some
the end-entity certificate, such as a user
of the plaintext bits together, XOR some
certificate, up to a CA root certificate,
cipher text bits together, and then XOR the
9. Attacking Cryptography results, you will get a single bit that is the
XOR of some of the key bits. A large number
Cryptanalysis
of such plain/cipher texts pairs are used to
Cryptanalysis is the process of guess the values of the key bits
attempting to discover the plaintext and/ or
10. Summary
the key. The types of Cryptanalysis attacks
are
11.References:
1. Encyclopedia of Cryptography