Skip to main content

Basic Cryptographic Operation

Basic Cryptographic Operation


In this post, We will learn some terminologies that used in computer security.

Basic Terms in Cryptography

  • Encryption: Encryption is a process to translate a plaintext to a cipher.
  • Decryption: Decryption is a process to translate a cipher to plaintext as it was before encryption.
  • Plaintext: This is a message, a string that we want send securely like an email, a text message etc.
  • Cipher: Cipher is a secure message that produces as a result of encryption.
  • Initialization vector (IV): IV provides semantic security to the cipher. It means that same message should have a different cipher.
  • Padding: Padding is a way to take data that may or may not be a multiple of the block size for a cipher and extend it out so that it is. Padding required of may many cipher mode because data to be encrypted to the exact multiple of block size.
  • Key: In cryptography, a key is a value that is applied using an algorithm to a string or block of unencrypted plaintext to produce encrypted text, or to decrypt encrypted text. There are two type of key
    • Public Key: The public keys are shared over the network. it uses to encrypt plain text.
    • Private Key: The private keys are stored securely and only respective know his private key. A key encrypted by the public key is decrypted by the private key
  • Mode: Direct use of cipher is not advisable because an enemy can build a codebook equivalent to plaintext or ciphertext. There are five standard modes of operation.
    • Electronic Code Book (ECB)
    • Cipher Block Chaining (CBC)
    • Cipher Feedback  (CFB)
    • Output Feedback (OFB)
    • Counter (CTR) 

Cryptography Model

  • There are two type of encryption and decryption models that widely used in the security domain to secure sensitive information
    • Symmetric Key Model
    • Asymmetric Key Model

Symmetric Key Model

In symmetric key encryption, we use the same key to encrypt as well as decrypt.

Above image representing an example of symmetric encryption. You can clearly see all those in some scenarios a hacker able to get cipher but he/she can not read data because he does not have the key. But there is a problem here because both parties are using same how do they share this key? We use key wrapping and unwrapping technique to protect key.

Key Wrapping and Unwrapping

  • Key Wrapping: Key wrapping is a technique to encrypt a symmetric key material. It is used to protect keys at rest or transmit them over insecure networks
  • Key Unwrapping: Key unwrapping is a technique used to decrypt a key material.

Asymmetric Key Model

 Asymmetric cryptographic systems use one key to encrypt data and the different key to decrypt. These keys are known as public and private key

In the asymmetric algorithm, the public key of the recipient is share across the channel. The sender encrypts the message with the public key of recipient and recipient decrypt with his private key which is securely stored.

Symmetric Key Algorithms 

There is a set of the symmetric key algorithm which use to encrypt a plaintext. We will discuss some of them here
  1. Advanced Encryption Standard (AES)
  2. Data Encryption Standard (DES)
  3. Triple Data Encryption Algorithm (3DES)

Asymmetric Key Algorithms

There is a set of an asymmetric key algorithm which use to encrypt a plaintext. We will discuss some of them here
  1.  Rivest Shamir Adleman (RSA)

Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.

Comments

  1. I gathered many useful informations about this topic. Really very useful for learning the skills and will continue your blog reading in the future.
    Blue Prism Training in Anna nagar
    Blue Prism Training in Chennai
    Blue Prism training chennai
    RPA Training in Anna nagar
    RPA Training in Adyar
    Data Science course in Anna nagar

    ReplyDelete

Post a Comment

Popular posts from this blog

Clique in Graph

Clique in Graph In this tutorial, we will learn about the clique in the graph theory. Clique In graph theory, a clique is a subset of vertices of an undirected graph such that every two distinct vertices in the clique are adjacent. Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.

Equations

In general we frame real life problems into some mathematical formula called equations in which we use constant and some variables(unknown) Example: Ram is 12 years old.Ram 's age is 3/5 of Shyam's age what is Shyam's age. Let Shyam's age is x then 3/5 of sham's age is 3*x/5 x*3/5=12 x=60/3=20 so Shyam's age is 20. Linear equations When there is a linear combination of unknown variables is there then eqn is linear Example: 3x+ 2y+ 4z=9 Non Linear Equations: Equations in which non linear combination of the variable is there then eqn is non linear. When any 2 unknown variable multiplication present in the equation then it is the nonlinear equation. Example: 2x+5yz=98 is a nonlinear equation because yz multiplication is there: Quadratic equation in one variable: x^2 + 4*x + 2=0 is non linear because unknown variable x is being multiplied in term x^2 Quadratic equation in many variable: x^2 + y^2 +z^2 + w=0 cubic equati...

Practice Problem on Square Measurement

Practice Problem on Square Measurement What is the area of square having side length 5 unit? 25 unit 2     10 unit 25 unit 10 unit 2 What is the  perimeter of a square   having side length 5 unit? 20 unit 20 unit 2 10 unit 10 unit 2 What is the  diagonal  length of a square   having side length 5 unit? 5√2 unit     5√2 unit 2 10 unit 10 unit 2 What is the side length of square having area equal to  25 unit 2  ? 5 unit 5  unit 2 10 unit 10  unit 2 There is a petrol pump in a area having length and width equal to 500 meter. What will be cost to put bricks in the whole area if bricks having length and width equal to 5 cm and cost of 1 bricks is Rs 5? Rs 500000000 Rs 50000000 Rs 5000000 Rs 500000 Related Post:  Square Mensuration Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above. ...

Vertex Cover

Vertex Cover In this tutorial, We will learn about the vertex cover in graph theory. Vertex Cover  A vertex cover of an undirected graph is a subset of its vertices such that for every edge (u, v) of the graph, either u or v is in vertex cover i.e minimum number of vertices that covers all edges of the given graph. Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.