cryptography
cryptography
Chapter 6
Cryptography
Cybersecurity
Learning outcome:
• Definition of Cryptography
• Symmetric and asymmetric encryptions
• Hash functions
• Cryptography protocols: in-transit, SSL/TLS, HTTPS, VPNs
Introduction
Cryptography is the practice and study of techniques for secure
communication in the presence of adversaries. It involves converting
plaintext into cipher text to ensure confidentiality, integrity,
authentication, and non-repudiation.
Cryptographic Keys
• Secret values used to control the encryption and decryption
processes.
• Symmetric vs. Asymmetric keys.
Types of Cryptography
Symmetric Encryption: Involves the use of a single key for both
encryption and decryption. Examples include AES (Advanced
Encryption Standard) and DES (Data Encryption Standard).
Key Management
• Key management is a critical aspect of symmetric encryption. The
security of the encrypted data relies on the secrecy of the shared
key. Secure key distribution methods are essential to prevent
unauthorized access to the key.
• Key management involves securely generating, distributing, storing,
and revoking encryption keys. Techniques such as key exchange
protocols, key rotation, and key escrow are used to manage
symmetric keys securely.
Symmetric Encryption
• Symmetric encryption provides confidentiality but lacks features
like key exchange and digital signatures. It is vulnerable to key
compromise, as anyone who gains access to the key can decrypt the
encrypted data.
• Applications
• Password hashing: Hash functions are used to securely store passwords in
databases. Instead of storing plaintext passwords, only their hash values are
stored. This protects passwords in case of a data breach.
• Data integrity verification: Hash functions are used to generate checksums or
digital signatures for verifying the integrity of transmitted or stored data. Any
change to the data will result in a different hash value, alerting the recipient to
potential tampering.
Hash vs Symmetric vs Asymmetric
Hash Functions Symmetric Asymmetric
Purpose Data integrity Confidentiality Confidentiality,
verification authentication, digital
signatures
Operation One-way function, Reversible process with Reversible process with public
irreversible decryption and private keys
Keys No keys required Single secret key Public-private key pair
Output Fixed-length hash Variable-length Variable-length cipher-text
value cipher-text
Security Properties Pre-image Requires secure key Public key can be freely
resistance, collision distribution, vulnerable distributed, private key must
resistance to key compromise be kept secret
Applications Password storage, Secure data Secure key exchange, digital
data integrity transmission, file signatures
verification encryption
In-Transit Encryption
In-Transit Encryption
In-transit encryption protects data while it is being transmitted over a
network.
It encrypts data transmitted between the user's device and the VPN
server, ensuring privacy and security.