0% found this document useful (0 votes)
12 views27 pages

Topic 8 Cryptography

The document discusses advanced cryptographic techniques and secure key management, emphasizing the importance of cryptography in protecting information through methods like symmetric and asymmetric encryption, digital signatures, and public key infrastructure (PKI). It outlines key management processes including generation, distribution, and storage, as well as the roles of certificate authorities and registration authorities in managing digital certificates. Additionally, it covers the mechanics of digital signatures and the differences between various algorithms such as RSA, DSA, and ECDSA.

Uploaded by

maxedplayer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views27 pages

Topic 8 Cryptography

The document discusses advanced cryptographic techniques and secure key management, emphasizing the importance of cryptography in protecting information through methods like symmetric and asymmetric encryption, digital signatures, and public key infrastructure (PKI). It outlines key management processes including generation, distribution, and storage, as well as the roles of certificate authorities and registration authorities in managing digital certificates. Additionally, it covers the mechanics of digital signatures and the differences between various algorithms such as RSA, DSA, and ECDSA.

Uploaded by

maxedplayer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Topic 8: Cryptography

Mr. Jonelle Angelo S. Cenita, MSIT, LPT


BAINFSMX Information Security and Management
1. Advanced Cryptographic
Techniques and Secure
Key Management
Cryptographic
• Cryptographic refers to anything related to
cryptography, which is the science of using codes and
ciphers to protect information. It ensures that data is
kept confidential, authentic, and secure from
unauthorized access.
• Encrypting a message so only the intended person can
read it is a cryptographic process.
Cryptographic Techniques
• Cryptographic techniques are the methods or tools used
to secure data through encryption, authentication, and
integrity checks. These techniques protect data during
storage or transmission by making it unreadable to
unauthorized users.
• Common Examples:
• Encryption algorithms (e.g., AES, RSA)
• Hashing (e.g., SHA-256)
• Digital signatures
Symmetric Encryption
• Symmetric encryption uses one single key to both encrypt
(lock) and decrypt (unlock) the data.
• Both the sender and the receiver must share the same key,
and it must be kept secret.
• Example:
• Algorithms:
• AES(Advanced Encryption Standard) - A fast and secure symmetric
encryption algorithm widely used for encrypting data
• DES(Data Encryption Standard) - An older symmetric encryption
algorithm, now mostly replaced by AES due to security weaknesses.
• Use Case: Encrypting files, secure database storage
Asymmetric Encryption
• Asymmetric encryption uses two keys:
• A public key to encrypt the data
• A private key to decrypt it
• The public key is shared with anyone, but the private key is kept secret by the owner.
• Like a mailbox: anyone can drop a letter using the public key (mail slot), but only the
owner with the private key can open it.
• Example:
• Algorithms:
• RSA(Rivest–Shamir–Adleman) - An asymmetric encryption algorithm named after its
inventors. Commonly used for secure data transmission and digital signatures.
• ECC(Elliptic Curve Cryptography) - A type of asymmetric encryption that uses elliptic
curves for strong security with smaller key sizes (more efficient than RSA).
• Use Case: Sending secure emails, digital signatures, SSL certificates
Block Ciphers
• A block cipher encrypts data in fixed-size blocks (like
128-bit or 64-bit chunks) at a time. If the data isn’t long
enough, it’s padded to fit the block size.
• Like sealing multiple pages into envelopes—each
envelope (block) is locked before being sent.
• Example:
• AES (Advanced Encryption Standard) is a common block
cipher.
Stream Ciphers
• A stream cipher encrypts data one bit or one byte at a
time, often by combining the data with a stream of
random-looking key bits (called a keystream).
• Like using a key to lock each word or letter as you type it,
rather than waiting to seal the whole message.
• Example:
• RC4 is a classic example of a stream cipher.
Elliptic Curve Cryptography (ECC)
• Elliptic Curve Cryptography (ECC) is a type of asymmetric encryption
that uses the mathematics of elliptic curves to create secure and
efficient cryptographic keys.
• ECC provides strong security with much smaller key sizes compared
to older methods like RSA. This makes it faster and more efficient,
especially for mobile devices and systems with limited resources.
• ECC is like using a smaller but more complex lock that is just as strong as a
big one, but easier to carry and faster to use.
• Example:
• ECC with a 256-bit key provides security similar to RSA with a 3072-bit key
Secure Key Management
• Secure key management is the process of generating, storing,
protecting, and handling cryptographic keys in a way that
prevents unauthorized access or loss. Keys are critical for
encrypting and decrypting data, so managing them safely is
essential for maintaining security.
• Key Elements Include:
• Key generation
• Key distribution
• Key storage
Key Generation
• Key generation is the process of creating cryptographic
keys that are used to encrypt and decrypt data. These
keys must be random, unique, and secure to protect
information.
• Types of Keys:
• Symmetric Key – one key for both encryption and decryption
• Asymmetric Keys – a public key and a private key
Key Distribution
• Key distribution is the process of safely sharing the
cryptographic key between the sender and receiver. If the key
is intercepted or leaked during distribution, security is
compromised.
• Common Methods:
• Manual sharing (not secure)
• Key exchange algorithms (like Diffie-Hellman)
• Public Key Infrastructure (PKI) for asymmetric keys
Key Storage
• Key storage refers to safely keeping cryptographic keys so they
are protected from unauthorized access, loss, or corruption.
2. Public Key Infrastructure
(PKI) and Digital
Signatures
Public Key Infrastructure (PKI)
• Public Key Infrastructure (PKI) is a framework of policies,
technologies, and practices that manages the creation,
distribution, and revocation of public and private keys
used in asymmetric cryptography.
• PKI ensures the security and trust of digital
communications by verifying the identity of users and
systems.
Key Components of PKI:
• Public Key – Used to encrypt data or verify a signature.
• Private Key – Used to decrypt data or create a signature (kept
secret).
• Certificate Authority (CA) – An entity that issues digital certificates
(confirms the identity of the key owner).
• Registration Authority (RA) – Acts as an intermediary between the
user and CA, verifying user identities.
• Digital Certificates – Digital documents that link a public key to an
identity (e.g., name, email address).
• Revocation Lists – A list of keys or certificates that are no longer
Digital Signatures
• A digital signature is a cryptographic technique used to
authenticate the origin and integrity of digital messages
or documents. It uses a private key to "sign" the data
and a public key to verify the signature.
Fundamentals of PKI
• 1. Certificates
• A digital certificate is a public key certificate issued by a
Certificate Authority (CA). It links a public key to a
specific identity (like a person, organization, or device)
and serves as proof that the public key belongs to the
claimed identity.
• Links a public key to an identity, verified by a CA
Fundamentals of PKI
• 1. Certificates
• Contents of a Digital Certificate:
• Public Key: The key that can be shared.
• Subject: The identity (name, email, etc.) to which the
certificate is issued.
• Issuer: The CA that issued the certificate.
• Validity Period: The start and end dates during which the
certificate is valid.
• Signature: The CA’s digital signature that confirms the
authenticity of the certificate.
Fundamentals of PKI
• 2. Certificate Authority (CA)
• A Certificate Authority (CA) is a trusted organization that
issues digital certificates. The CA verifies the identity of the
certificate requestor before issuing a certificate, and
ensures that public keys are properly authenticated.
• A trusted entity that issues, renews, and revokes certificates
• Example:
• Let’s say you're visiting a website with "https://". The CA that
issued the website's certificate is responsible for verifying the
website’s identity.
Fundamentals of PKI
• 3. Registration Authority (RA)
• The Registration Authority (RA) is a middleman
between the user and the Certificate Authority (CA). It is
responsible for verifying the identity of the certificate
requestor before the CA issues a certificate.
• Verifies the identity of users or systems requesting a
certificate
Fundamentals of PKI
• 4. Certificate Revocation List (CRL)
• A Certificate Revocation List (CRL) is a list maintained by the CA
that contains certificates that are no longer valid before their
expiration date. This can happen if the private key is
compromised, or the certificate is no longer needed.
• A list of revoked certificates, ensuring they are no longer trusted
How Digital Certificates Work
• A digital certificate is an electronic document that uses public
key cryptography to establish a secure connection and verify
the identity of an entity (such as a website, person, or
organization). It is issued by a Certificate Authority (CA) to
confirm that the public key belongs to the entity it claims to
represent.
How Digital Certificates Work
Digital Signatures: Algorithms (RSA,
DSA, ECDSA)
• A digital signature is a cryptographic mechanism used to
authenticate the identity of the sender and ensure the
integrity of the message. It involves creating a signature for a
document or message using a private key and allowing others
to verify it with the corresponding public key.
How Digital Signatures Work:
• 1. Hashing: A hash of the message is created. A hash is a fixed-
size string derived from the content of the message.
• 2. Signing: The hash is then encrypted with the private key of
the sender to create the digital signature.
• 3. Verification: The recipient decrypts the signature using the
sender's public key. If the decrypted hash matches the hash of
the received message, the signature is valid, ensuring the
message has not been altered and confirming the sender's
identity.
Key Differences between RSA, DSA,
and ECDSA:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy