Cryptography
Cryptography
Hiral Patel
@gisacouncil
Introduction
Crypto means “secret” and cryptography means “art of writing
data into secret text”.
Cryptography provides confidentiality, integrity, authentication
and non-repudiation for sensitive information while it is stored
(at rest), travelling across a network( in transit/in motion), and
existing in memory (in use/ in processing).
Terminology related to Cryptography
1. Plaintext
Plaintext refers to the original, unencrypted data that is readable
by humans or computers. It is the input to an encryption
algorithm before any transformation has been applied.
Example:
Message: "Hello, how are you?"
Password stored as plaintext: "mypassword123"
2. Cyphertext
Ciphertext is the result of applying an encryption algorithm to
plaintext. It is unreadable or scrambled data, which requires a
decryption key to convert it back into the original readable form.
Example:
Plaintext message: "Hello, how are you?"
After encryption: "Jk91Loxz98&%@!"
3. Encryption
Encryption is the process of converting plaintext or data into a ciphertext
using an algorithm and a key. This process makes the original data
unreadable to anyone who doesn't have the corresponding decryption key.
Data can be encrypted "at rest," when it is stored, or "in transit," while it is
being transmitted somewhere else.
Example
4. Decryption
Decryption, on the other hand, is the process of converting the ciphertext back
into its original plaintext form using the appropriate decryption key. Decryption
reverses the encryption process, allowing authorized parties to access and read
the original data.
5. Confidentiality
Confidentiality in information security refers to the practice of ensuring that
sensitive data is accessible only to authorized individuals, and preventing
unauthorized parties from accessing or disclosing that information. It is one of
the core principles of the CIA triad (Confidentiality, Integrity, and Availability),
which forms the foundation of information security.
6. Integrity
Integrity in information security refers to the assurance that
data remains accurate, complete, and unaltered during storage,
transmission, or processing. It ensures that information
is trustworthy and has not been tampered with by unauthorized
individuals or systems.
7. Authentication
Authentication in information security refers to the process of verifying the identity
of a user, device, or system before granting access to resources or services. It
ensures that only legitimate users or entities are allowed to access data, applications,
or systems, protecting them from unauthorized access. Authentication Factors:
Methods used to authenticate a user.
These are generally classified into three categories:
• Something You Know: A password, PIN, or answer to a security question.
• Something You Have: A physical object like a smart card, security token, or mobile device.
• Something You Are: Biometric information such as a fingerprint, facial recognition, or iris scan.
8. Non-Repudiation
Non-repudiation is an essential concept in information security that ensures the
sender of a message, the signer of a document, or the originator of a transaction
cannot later deny their involvement in the communication or action. It provides proof
of the origin and integrity of the message or transaction, thereby preventing someone
from denying that they participated.
Types of Encryptions
There are Mainly 2 types of Encryptions
If Mr. A want to confirm the integrity of the message not confidentiality then Mr. A
will use hash function upon data and create a message digest. Then that message
digest will be encrypted by using Mr. A’s private key. Mr. A will share that Data +
encrypted Message digest with Mr. B. Now Mr. B will first decrypt the encrypted
message digest with Mr. A’s public key and will get the original message digest. Mr.
B then will apply the hash function on data and will create a message digest on
his/her end and then will compare both message digests created by at B’s end
and supplied by Mr. A. If both are matching then Mr. B can confirm that the
message is not being altered by anyone and can confirm the integrity of the
message.
Hashing
Digital Signature
Digital signature is the process to attach a digital code to the document to
verify its content and sender’s identity. As an paper document, we take the
signature of a person to verify that the document is shared by that person and
validate the message from him. Same way, this can also be verified for
electronic document using digital signature. Hashing technique is used to
create a digital code. Digital signatures use public key cryptography
(asymmetric encryption), which involves two keys:
Private Key: Known only to the signer, used to create the signature.
Public Key: Available to anyone, used to verify the signature.
Digital Signature
Digital Signature
Steps in Creating a Digital Signature:
CONTACT INFO
+91 960-110-3255
HIRALAPATEL