Authentication
Assurane that communicating entity is the one claimed
Access Control
prevention of the unauthorised use of resource
Data Confidentiality
Protection of data from unauthorised disclosure
Data Integrity
Assurance that data received is as sent by an authorised entity
Non-Repudiation
Protection against denial by one of the parties in a communication
Availability
resource accessible
Problems without Cryptography (4)
Solutions to lack of Cryptography (4)
Ciphertext
Encrypted Plaintext
Plaintext
Decrypted CipherText
Symmetric Encryption
Encryption where the same key is used for encryption and decryption
Asymmetric Cryptography
Use of public key cryptography
Hash
A “fingerprint” of a piece of text that will show if it has been altered
Digital Signature
A “fingerprint” that is produced with a private key of a pub/priv key pair
Ceaser Cipher Method
Each letter in the original message is replaced w/ a letter corresponding to a certain number of letters up/down the alphabet.
Mono alphabetic Substitution
uses fixed substitution one the entire message vs poly alphabetic substitution cipher which uses a number of substitutions at different positions in the message
One-Time Pad (3)
Types of Symmetric Cryptography
AES
Key Exchange Method (6)
Diffie-Hellman Key Exchange
Public Key Cryptography (3)
RSA Pub/Priv Key Gen
PUB - prime num p & q - n=p*q - z = (p-1)*(q-1) - k = prime number that is co-prime to z (not divisible by k) - k, n are pub keys PRIV - k*j = 1 (mod z) - j,n are priv keys
Hash Function (2)
Properties of Hash Function (5)