Page 111 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 111

Unit 8: Cryptography and Encryption




          A key in cryptography is a long sequence of bits used by encryption/decryption algorithms.  Notes


                Example: The following represents a hypothetical 40-bit key:
          00001010 01101001 10011110 00011100 01010101
          A given encryption algorithm takes the original message, and a key, and alters the  original
          message mathematically based on the key’s bits to create a new encrypted message. Likewise, a
          decryption algorithm takes an encrypted message and restores it to its original form using one
          or more keys.

          When a user encodes a file, another user cannot decode and read the file without the decryption
          key. Adding a digital signature, a form of personal authentication, ensures the integrity of the
          original message.
          To encode plaintext, an encryption key is used to impose an encryption algorithm onto the data.
          To decode cipher, a user must possess the appropriate decryption key.

          A decryption key consists of a random string of numbers, from 40 through 2,000 bits in length.
          The key imposes a decryption algorithm onto the data. This decryption algorithm reverses the
          encryption algorithm, returning the data to plaintext. The longer the encryption key is,  the
          more difficult it is to decode. For a 40-bit encryption key, over one trillion possible decryption
          keys exist.
          There are  two primary  approaches to  encryption: symmetric  and public-key.  Symmetric
          encryption is the most common type of encryption and uses the same key for encoding and
          decoding data. Public-key encryption uses two different keys, a public key and a private key.
          One key encodes the message and the other decodes it. The public key is widely distributed
          while the private key is secret.
          Aside from key length and encryption approach, other factors and variables impact the success
          of a cryptographic system.


                 Example: Different cipher modes, in coordination with initialization vectors and  salt
          values, can be used to modify the encryption method.
          Cipher modes define the method in which data is encrypted. The stream cipher mode encodes
          data one bit at a time. The block cipher mode encodes data one block at a time. Although block
          cipher tends to execute more slowly than stream cipher.





              Task  Discuss the use of Secure Sockets Layer.



             Did u know? What is session key?
             Symmetric encryption is the most common type of encryption and uses the same key for
             encoding and decoding data. This key is known as a session key.
          Self Assessment


          Fill in the blanks:
          1.   ........................... cryptosystems use the same key for the functions of both encryption and
               decryption.



                                           LOVELY PROFESSIONAL UNIVERSITY                                   105
   106   107   108   109   110   111   112   113   114   115   116