CSModule2 Part2
CSModule2 Part2
• It was the only type of encryption in use prior to the development of public key encryption in
the 1970s.
• Security depends on the secrecy of the key, not the secrecy of the algorithm
Symmetric Cipher Model
Examples of symmetric encryption cryptosystems
• Data Encryption Standard (DES)
which was developed by IBM and is based on the company’s Lucifer algorithm
which uses a key length of 128 bits
As implemented, DES uses a 64-bit block size and a 56-bit key.
• Each user places one of the two keys in a public register or other accessible file. This
is the public key.
• Either of the two related keys can be used for encryption, with the other
used for decryption.
A public-key(Asymmetric) encryption scheme has six ingredients
Plaintext - This is the readable message or data that is fed into the algorithm as
input.
Decryption algorithm - This algorithm accepts the ciphertext and the matching
key and produces the original plaintext.
Public Key Cryptography
• If Bob wants to send message to Alice, Bob must have to use public key of Alice.
Message to be transmitted after encryption of message using Alice’s public key.
• Alice has received message, and she can decrypt the message using only her private
key.
• Mathematically, it is represented,
Y = E(PUa, X)
X = D(PRa,Y) where, PUa – Alice’s public key and PRa – Alice’s private key
Scenario 2 : Encryption with private key
• If Bob wants to send message to Alice, Bob must have to use his own private key.
Message to be transmitted after encryption of message using Bob’s public key.
• Alice has received message, and she can decrypt the message using only Bob’s public
key.
• Mathematically, it is represented,
Y = E(PRb, X)
X = D(PUb,Y) where, PRb – Bob’s private key and PUb – Bob’s public key
Example of public-key cryptosystem
• RSA
Name is derived from Rivest-Shamir-Adleman
RSA algorithm was the first public key algorithm, developed in 1977
Conventional(Symmetric) and Public-Key (Asymmetric)Encryption
Cryptographic tools
• Public Key Infrastructure(PKI)
• Digital Signatures
• Steganography
Public-key Infrastructure (PKI)
• PKI is an integrated system of software, encryption methodologies, protocols, legal agreements,
and third-party services that enables users to communicate securely.
• PKI systems are based on public-key cryptosystems and include digital certificates and certificate
authorities (CAs).
• Digital certificates are public-key container files that allow computer programs to validate the key
and identify to whom it belongs.
• PKI and the digital certificate registries they contain enable the protection of information assets
by making verifiable digital certificates readily available to business applications.
• For protecting the information, the processes includes Authentication, Integrity, Privacy,
Authorization, and Nonrepudiation
A typical PKI solution protects the transmission and reception of secure information by integrating
the following components:
• A certificate authority (CA), which issues, manages, authenticates, signs, and revokes users’ digital
certificates, which typically contain the user name, public key, and other identifying information.
• A registration authority (RA), which operates under the trusted collaboration of the certificate authority and
can handle day-to-day certification functions, such as verifying registration information, generating end-user
keys, revoking certificates, and validating user certificates.
• Certificate directories, which are central locations for certificate storage that provide a single access point for
administration and distribution.
• Management protocols, which organize and manage the communications among CAs, RAs, and end users.
This includes the functions and procedures for setting up new users, issuing keys, recovering keys, updating
keys, revoking keys, and enabling the transfer of certificates and status information among the parties
involved in the PKI’s area of authority.
• Policies and procedures, which assist an organization in the application and management of certificates, in
the formalization of legal liabilities and limitations, and in actual business use.
Digital signatures
• A digital signature is a mathematical technique which validates the authenticity and integrity of a
message, software or digital documents.
• It allows us to verify the author name, date and time of signatures, and authenticate the message
contents.
• When an asymmetric cryptographic process uses the sender’s private key to encrypt a message,
the sender’s public key must be used to decrypt the message.
• When the decryption is successful, the process verifies that the message was sent by the sender
and thus cannot be refuted. This process is known as nonrepudiation.
• In general, digital signatures should be created using processes and products that are based on
the Digital Signature Standard (DSS).
How digital signatures work?
• Digital signatures are created and verified by using public key cryptography,
also known as asymmetric cryptography.
• By the use of a public key algorithm, such as RSA, one can generate two
keys that are mathematically linked- one is a private key, and another is a
public key.
• The user who is creating the digital signature uses their own private key to
encrypt the signature-related document.
• There is only one way to decrypt that document is with the use of signer's
public key.
Steganography
• Difficult to detect.
• Huge number of data, huge file size, so someone can suspect about it.
Once, it has been discovered no one can Once, it has been discovered any one can
easily get the secret data. get the secret data.
More popular approach. Less popular approach.