Page 40 - DCAP516_COMPUTER_SECURITY
P. 40

Computer Security




                    Notes          4.1 What is Cryptography?

                                   There are many aspects to security and many applications, ranging from secure commerce and
                                   payments to private communications and protecting passwords. One essential aspect for secure
                                   communications is that of cryptography.
                                   When your computer sends the information out, it scrambles it by using some key. This scrambled
                                   information would be gibberish to anyone who didn’t have the correct key to unscramble it at
                                   the other end.

                                   When the information reaches its destination, it gets unscrambled by using the key. This lets the
                                   person or website read the information correctly at the other end.
                                   Websites that use an encrypted connection use something called SSL (Secure Sockets Layer) to
                                   secure the information going back and forth. This is how websites like Amazon or your bank
                                   can ensure your private information like passwords and credit card numbers are safe from
                                   prying eyes.
                                   Cryptography can play many different roles in user authentication. Cryptographic authentication
                                   systems provide authentication capabilities through the use of cryptographic keys known or
                                   possessed only by authorized entities.
                                   Cryptography also supports authentication through its widespread use in other authentication
                                   systems. For example, password systems often employ cryptography to encrypt stored password
                                   files, card/token system often employ cryptography to protect sensitive stored information,
                                   and hand-held password generators often employ cryptography to generate random, dynamic
                                   passwords.

                                   Cryptography is frequently used in distributed applications to convey identification and
                                   authentication information from one system to another over a network. Cryptographic
                                   authentication systems authenticate a user based on the knowledge or possession of a
                                   cryptographic key. Cryptographic authentication systems can be based on either private key
                                   cryptosystems or public key cryptosystems.
                                   Private key cryptosystems use the same key for the functions of both encryption and decryption.
                                   Cryptographic authentication systems based upon private key cryptosystems rely upon a shared
                                   key between the user attempting access and the authentication system.
                                   Public key cryptosystems separate the functions of encryption and decryption, typically using a
                                   separate key to control each function. Cryptographic authentication systems based upon public
                                   key cryptosystems rely upon a key known only to the user attempting access.
                                   Today’s cryptography is more than encryption and decryption. Authentication is as fundamentally
                                   a part of our lives as privacy. We use authentication throughout our everyday lives – when we
                                   sign our name to some document for instance – and, as we move to a world where our decisions
                                   and agreements are communicated electronically, we need to have electronic techniques for
                                   providing authentication.
                                   Cryptography provides mechanisms for such procedures. A digital signature binds a document
                                   to the possessor of a particular key, while a digital timestamp binds a document to its creation
                                   at a particular time. These cryptographic mechanisms can be used to control access to a shared
                                   disk drive, a high security installation, or a pay-per-view TV channel.
                                   The field of cryptography encompasses other uses as well. With just a few basic cryptographic
                                   tools, it is possible to build elaborate schemes and protocols that allow us to pay using electronic
                                   money, to prove we know certain information without revealing the information itself and to
                                   share a secret quantity in such a way that a subset of the shares can reconstruct the secret.




          34                                LOVELY PROFESSIONAL UNIVERSITY
   35   36   37   38   39   40   41   42   43   44   45