Encryption is…
A method of transforming readable data, called plaintext, into a form that appears to be random and unreadable, which is called ciphertext. It can be created through hardware components or program code in an application
Cryptosystem is
A system or product that provides encryption and decryption.
Algorithm
The set of rules also known as Ciphers, dictates how enciphering and deciphering take place.
In Encryption, the Key also known as cryptovariable
Is a value that comprises a large sequence of random bits.
Algorithm contains keyspace, which
Is a range of values that can be used to construct a key.
When algorithm need to generate a new key, it uses random value from the keyspace
Cryptosystem encompasses all the necessary components for encryption and decryption to take place. A Cryptosystem is made up of at least the following:
Example of a Cryptosystem
Pretty Good Privacy (PGP)
Crytosystems can provide the following services:
Cryptography is
Practice of storing and transmitting information in a form that only authorized parties can understand
Kerckhoff’s Principle:
August Kerckhoffs published a paper in 1883
Stating that the only secrecy involved with a cryptography should be the key. He claimed that the algorithm should be publicly exploit.
The strength of an encryption method comes from:
Breaking Cryptosystem can be accomplished by a….
Brute-force attack
Another name for cryptography strength is_____
Workfactor (work function), which is an estimate of the effort and resources it would take an attacker to penetrate a cryptosystem
(Time and effort to break a protective measure)
One-Time Pad, which is invented by Gilbert Vernam in 1917 (aka Vernam Cipher) is a ______
Perfect encryption scheme because it is considered unbreakable if implemented properly
One-Time pad is made up of random bits. This encryption process uses a binary mathematic function called…..
Exclusive-OR (XOR)
XOR (exclusive-OR) is an operation that is applied to 2 bits. When combing the bits: if both values are same the result is ____. If the bits are different from each other, the result is ____.
1 XOR 1 = 0
1 XOR 0 = 1
One-Time pad Requirements. (To be successful)
The Cryptographic life cycle is the….
Ongoing process of identifying your cryptography needs, selecting the right algorithms, provisioning the needed capabilities and services, and managing keys.
Cryptographic methods
Symmetric Key Cryptography:
Advantages Symmetric Key
Block Ciphers
A strong Cipher contains right level of 2 main attributes: Confusion and Diffusion….
More on Confusion and Diffusion:
In algorithms,
- diffusion takes place as individual bits of a block are scrambled, or diffused, throughout that block.
- Confusion is provided by carrying out complex substitution functions so the eavesdropper cannot figure out how substitute the right values and come up with the plaintext.