Page 122 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 122

Information  Security and Privacy




                    Notes          Self Assessment

                                   Fill in the blanks:
                                   9.  ....................... techniques are designed to provide the digital counterpart to handwritten
                                       signatures and can be achieved using cryptography.

                                   10.  Certification is a means for a ....................... to bind the identity of a user to a public key.

                                   8.5 Cryptographic Algorithms


                                   8.5.1 Symmetric (or Shared) Key Cryptography

                                   Symmetric-key cryptography is also known as shared-key, secret-key, single-key, one-key and
                                   eventually private-key cryptography.
                                   With symmetric key cryptography, a single key is used for both encryption and decryption. The
                                   sender uses the key (or some set of rules) to encrypt the plaintext and sends the cipher text to the
                                   receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the
                                   plaintext. Because a single key is used for both functions, symmetric key cryptography is also
                                   called symmetric encryption.
                                   With this form of cryptography, it is obvious that the key must be known to both the sender and
                                   the receiver; that, in fact, is the shared. The biggest difficulty with this approach, of course, is the
                                   distribution of the key.
                                   Symmetric key cryptography schemes are generally categorized as being either stream ciphers
                                   or block ciphers. Stream ciphers operate on a single bit (byte or computer word) at a time and
                                   implement some form of feedback mechanism so that the key is constantly changing.
                                   A block cipher is so-called because the scheme encrypts one block of data at a time using the
                                   same key on each block. In general, the same plaintext block will always encrypt to the same
                                   ciphertext when using the same key in a block cipher whereas the same plaintext will encrypt to
                                   different ciphertext in a stream cipher.

                                                         Figure  8.5: Symmetric-key  Cryptography














                                   Stream ciphers come in several flavors but two are worth mentioning here. Self-synchronizing
                                   stream ciphers calculate each bit in the keystream as a function of the previous n bits in the
                                   keystream. It is termed “self-synchronizing” because the decryption process can stay synchronized
                                   with the encryption process merely by knowing how far into the n-bit keystream it is.
                                   One problem is error propagation; a garbled bit in transmission will result in n garbled bits at
                                   the receiving side. Synchronous stream ciphers generate the keystream in a fashion independent
                                   of the message stream but by using the same keystream generation function at sender  and
                                   receiver. While stream ciphers do not propagate transmission errors, they are, by their nature,
                                   periodic so that the keystream will eventually repeat.



          116                               LOVELY PROFESSIONAL UNIVERSITY
   117   118   119   120   121   122   123   124   125   126   127