Skip to main content

Basic Cryptographic Operation

Basic Cryptographic Operation


In this post, We will learn some terminologies that used in computer security.

Basic Terms in Cryptography

  • Encryption: Encryption is a process to translate a plaintext to a cipher.
  • Decryption: Decryption is a process to translate a cipher to plaintext as it was before encryption.
  • Plaintext: This is a message, a string that we want send securely like an email, a text message etc.
  • Cipher: Cipher is a secure message that produces as a result of encryption.
  • Initialization vector (IV): IV provides semantic security to the cipher. It means that same message should have a different cipher.
  • Padding: Padding is a way to take data that may or may not be a multiple of the block size for a cipher and extend it out so that it is. Padding required of may many cipher mode because data to be encrypted to the exact multiple of block size.
  • Key: In cryptography, a key is a value that is applied using an algorithm to a string or block of unencrypted plaintext to produce encrypted text, or to decrypt encrypted text. There are two type of key
    • Public Key: The public keys are shared over the network. it uses to encrypt plain text.
    • Private Key: The private keys are stored securely and only respective know his private key. A key encrypted by the public key is decrypted by the private key
  • Mode: Direct use of cipher is not advisable because an enemy can build a codebook equivalent to plaintext or ciphertext. There are five standard modes of operation.
    • Electronic Code Book (ECB)
    • Cipher Block Chaining (CBC)
    • Cipher Feedback  (CFB)
    • Output Feedback (OFB)
    • Counter (CTR) 

Cryptography Model

  • There are two type of encryption and decryption models that widely used in the security domain to secure sensitive information
    • Symmetric Key Model
    • Asymmetric Key Model

Symmetric Key Model

In symmetric key encryption, we use the same key to encrypt as well as decrypt.

Above image representing an example of symmetric encryption. You can clearly see all those in some scenarios a hacker able to get cipher but he/she can not read data because he does not have the key. But there is a problem here because both parties are using same how do they share this key? We use key wrapping and unwrapping technique to protect key.

Key Wrapping and Unwrapping

  • Key Wrapping: Key wrapping is a technique to encrypt a symmetric key material. It is used to protect keys at rest or transmit them over insecure networks
  • Key Unwrapping: Key unwrapping is a technique used to decrypt a key material.

Asymmetric Key Model

 Asymmetric cryptographic systems use one key to encrypt data and the different key to decrypt. These keys are known as public and private key

In the asymmetric algorithm, the public key of the recipient is share across the channel. The sender encrypts the message with the public key of recipient and recipient decrypt with his private key which is securely stored.

Symmetric Key Algorithms 

There is a set of the symmetric key algorithm which use to encrypt a plaintext. We will discuss some of them here
  1. Advanced Encryption Standard (AES)
  2. Data Encryption Standard (DES)
  3. Triple Data Encryption Algorithm (3DES)

Asymmetric Key Algorithms

There is a set of an asymmetric key algorithm which use to encrypt a plaintext. We will discuss some of them here
  1.  Rivest Shamir Adleman (RSA)

Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.

Comments

  1. I gathered many useful informations about this topic. Really very useful for learning the skills and will continue your blog reading in the future.
    Blue Prism Training in Anna nagar
    Blue Prism Training in Chennai
    Blue Prism training chennai
    RPA Training in Anna nagar
    RPA Training in Adyar
    Data Science course in Anna nagar

    ReplyDelete

Post a Comment

Popular posts from this blog

OFFSET in Computer Science

OFFSET in Computer Science In the post, We will understand what is the meaning of OFFSET in computer science with an example. In computer science offset comes picture at may place like packing a data structure, encoding the data etc in some standard protocol so that other parties can deserialise it and understand the data. We will understand its important how does it work with example. suppose we have a data structure for a student like { name:string[20] roll: int[4] course: string[25] batch: int[4] } We want to serialise below student data  { name:"Amit Gupta" roll: 1234 course:Computer Science" batch: 2018 } Our protocol follow the rule that we will insert a value and if space will remain empty we will fill it with $ for example length of "Amit Gupta" is 10 but standard size is 20 so will fill 10 $ after "Amit Gupta". So serialisation of above data will be Amit Gupta$$$$$$$$$$1234Computer Sc...

Variable In C

Variable Like any other programming language in C programming language, we use a variable to store value, a value is any data like a number a or a character. In this post, we will learn about datatype of C programming language. Type Of Variable In C In this section, we will discuss how to store the following type of variable in C How to store an integer in C? How to store a float in C? How to store a double in C? How to store a long in C? How to store a character in C? As we already discussed that variable used to store data so that we can use it of other computation, for example, suppose we want to calculate the sum of two number then we have to store these two numbers first only after that we can use these two stored value to compute the sum. The entity that used to store a value called variable. What does it mean is suppose we tell a variable to store a number whose value is 5, the variable will place this number 5 in memory and we can variable in...

Clique in Graph

Clique in Graph In this tutorial, we will learn about the clique in the graph theory. Clique In graph theory, a clique is a subset of vertices of an undirected graph such that every two distinct vertices in the clique are adjacent. Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.

Supplementary angles

Supplementary angles Supplementary angles  are two angles with a sum of  180 ^\circ 1 8 0 ∘ 180, degree . A common case is when they lie on the same side of a straight line.