Cryptology
Is the science of making and breaking secret codes. The development and use of codes is called cryptography, and breaking codes is called crypt-analysis
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
3 Approved AES key lengths
128 bit
192 bit
256 bit
Triple DES / 3DES
Software-optimized Encryption Algorithm (SEAL)
Is an alternative algorithm to software based DES, 3DES, and AES
RC Algorithms
Rc algorithms are widely deployed in many networking applications because of their favorable speed and variable key-length capabilities Several Variations of RC algorithms: -RC2 -RC4 -RC5 -RC6
RC2
Variable key-size block cipher that was designed as a “drop-in” replacement for DES
RC4
RC5
a fast block cipher that has a variable block size and key size. RC5 can be used as a drop-in replacement for DES if the block size is set to 64-bit
RC6
RC6 was an AES finalist. a 128-bit to 256-bit block cipher that was designed by rivest, sidney, and yin and is based on RC5.
Bulk Data Encryption - symmentric keys
Symmetric Encryption Algorithm examples (3)
Stream Cipher
A stream cipher converts one symbol of plaintext directly to a symbol of ciphertext
Block Ciphers
Encrypt a group of plaintext symbols as one block
- most modern symmetric encryption algorithms are block ciphers
-block sizes vary, 64=des 128=aes
-Block ciphers transform a fixed-length block of plaintext into a common block of ciphertext of 64 or 128 bits
-
Stream Encryption Advantages
Stream Encryption Disadvantages
Low Diffusion: All information of plaintext symbols is contained in a single ciphertext symbol
Susceptibility to insertions/modifications: and active interceptor who breaks the algorithm might insert spurious text that looks authentic
Block Encryption Advantages
High diffusion: information from one plaintext symbol is diffused into several ciphertext symbols.
Immunity to tampering: difficult to insert symbols without detection
Block Encryption Disadvantages
Slowness of encryption: an entire block must be accumulated before encryption / decryption can begin
Error propagation: An error in one symbol may corrupt the entire block.
Message Digest 5 (MD5)
Secure Hash Algorithm (SHA1, SHA2)
The Sha hash functions are five cryptographic hash functions designed by the NSA and published by the NIST
-The five algorithms are denoted SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512
the latter 4 variants are somtimes collectivly called SHA-2
-SHA-1 produces a message digest that is 160 bits long, the number in the other 4 variants denote the bit length of the digest they produce.
-SHA-1 is employed in several widely used security applications and protocols: TLS, SSL, PGP, SSH, S/MIME, and IPsec
-considered to be the successor to MD5
SHA-3
winner of a contest IN 2007 afteR SHA-2 has vulnerability worries
- known as keccak
MD5 vs. SHA
HMAC
is a message authentication code (MAC) that is calculated using a hash function and a secret key