Page 303 - DCAP103_Principle of operating system
P. 303

Principles of Operating Systems



                   Notes         Cryptography, then, not only protects data from theft or alteration, but can also be used for
                                 user authentication. There are, in general, three types of cryptographic schemes typically used
                                 to accomplish these goals—secret key (or symmetric) cryptography, public-key (or asymmetric)
                                 cryptography,  and  hash  functions,  each  of  which  is  described  below.  In  all  cases,  the  initial
                                 unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn
                                 (usually) be decrypted into usable plaintext.
                                 In many of the descriptions below, two communicating parties will be referred to as Alice and
                                 Bob; this is the common nomenclature in the crypto field and literature to make it easier to
                                 identify the communicating parties. If there is a third or fourth party to the communication,
                                 they will be referred to as Carol and Dave. Mallory is a malicious party, Eve is an eavesdropper,
                                 and Trent is a trusted third party.
                                 9.4.2 Types of Cryptographic Algorithms

                                 There  are  several  ways  of  classifying  cryptographic  algorithms.  For  purposes  of  this  paper,
                                 they will be categorized based on the number of keys that are employed for encryption and
                                 decryption, and further defined by their application and use. The three types of algorithms that
                                 will be discussed are (Figure 9.1):
                                    •  Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption.
                                    •  Public Key Cryptography (PKC): Uses one key for encryption and another for decryption.

                                    •  Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information.

                                    Figure 9.1: Three Types of Cryptography—Secret-key, Public key and Hash Function





                                    Plaintext                      Ciphertext                     Plaintext



                                    (a) Secret key (symmetric) cryptography. SKC usesa single key for both
                                        encryption and decryption.




                                    Plaintext                     Ciphertext                     Plaintext


                                    (b) Public key (asymmetric) cryptography. PKC uses to key, one for
                                        encryption and the other for decryption.



                                                               Hash function
                                                   Plaintext                    Ciphertext


                                    (c) Has function (one-way cryptography). Hash functions have no key
                                        since the plaintext is not recoverable from the cipher text.










        296                               LOVELY PROFESSIONAL UNIVERSITY
   298   299   300   301   302   303   304   305   306   307   308