MSU logo
MSU logo
LOG IN
Jump to Header Jump to Main Content Jump to Footer
MSU logo
  • Home
  • Share
  • Connect
  • Grow
    • Feed
    • Browse
  • Events
  • Thank an Educator
  • Center for T&LI
  • Mediaspace
  • MSU Commons
  • Getting Started
  • Help
MSU logo
Back

Cryptography

playlist image

Cryptography

Human being from ages had two inherent needs − (a) to communicate and share information and (b) to communicate selectively. These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even if the scrambled messages fell in their hand.

The art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography.

The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing.

+ view more

profile-img
Authored by
Admin

{"id"=>1882, "level_no"=>1, "level_title"=>"Modern Cryptography", "notes"=>"<p>Modern cryptography is the cornerstone of computer and communications security. Its foundation is based on various concepts of mathematics such as number theory, computational-complexity theory, and probability theory.</p>\n<h2>Characteristics of Modern Cryptography</h2>\n<p>There are three major characteristics that separate modern cryptography from the classical approach.</p>\n<table class=\"table table-bordered\">\n<tbody>\n<tr>\n<th>Classic Cryptography</th>\n<th>Modern Cryptography</th>\n</tr>\n<tr>\n<td>It manipulates traditional characters, i.e., letters and digits directly.</td>\n<td>It operates on binary bit sequences.</td>\n</tr>\n<tr>\n<td>It is mainly based on &lsquo;security through obscurity&rsquo;. The techniques employed for coding were kept secret and only the parties involved in communication knew about them.</td>\n<td>It relies on publicly known mathematical algorithms for coding the information. Secrecy is obtained through a secrete key which is used as the seed for the algorithms. The computational difficulty of algorithms, absence of secret key, etc., make it impossible for an attacker to obtain the original information even if he knows the algorithm used for coding.</td>\n</tr>\n<tr>\n<td>It requires the entire cryptosystem for communicating confidentially.</td>\n<td>Modern cryptography requires parties interested in secure communication to possess the secret key only.</td>\n</tr>\n</tbody>\n</table>\n<h2>Context of Cryptography</h2>\n<p>Cryptology, the study of cryptosystems, can be subdivided into two branches &minus;</p>\n<ul class=\"list\">\n<li>Cryptography</li>\n<li>Cryptanalysis</li>\n</ul>\n<img src=\"https://www.tutorialspoint.com/cryptography/images/cryptography_types.jpg\" alt=\"Cryptography Types\" />\n<h3>What is Cryptography?</h3>\n<p><em>Cryptography is the art and science of making a cryptosystem that is capable of providing information security.</em></p>\n<p>Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services. You can think of cryptography as the establishment of a large toolkit containing different techniques in security applications.</p>\n<h3>What is Cryptanalysis?</h3>\n<p><em>The art and science of breaking the cipher text is known as cryptanalysis.</em></p>\n<p>Cryptanalysis is the sister branch of cryptography and they both co-exist. The cryptographic process results in the cipher text for transmission or storage. It involves the study of cryptographic mechanism with the intention to break them. Cryptanalysis is also used during the design of the new cryptographic techniques to test their security strengths.</p>\n<p><strong>Note</strong>&nbsp;&minus; Cryptography concerns with the design of cryptosystems, while cryptanalysis studies the breaking of cryptosystems.</p>\n<h2>Security Services of Cryptography</h2>\n<p>The primary objective of using cryptography is to provide the following four fundamental information security services. Let us now see the possible goals intended to be fulfilled by cryptography.</p>\n<h3>Confidentiality</h3>\n<p>Confidentiality is the fundamental security service provided by cryptography. It is a security service that keeps the information from an unauthorized person. It is sometimes referred to as&nbsp;<strong>privacy</strong>&nbsp;or&nbsp;<strong>secrecy</strong>.</p>\n<p>Confidentiality can be achieved through numerous means starting from physical securing to the use of mathematical algorithms for data encryption.</p>\n<h3>Data Integrity</h3>\n<p>It is security service that deals with identifying any alteration to the data. The data may get modified by an unauthorized entity intentionally or accidently. Integrity service confirms that whether data is intact or not since it was last created, transmitted, or stored by an authorized user.</p>\n<p>Data integrity cannot prevent the alteration of data, but provides a means for detecting whether data has been manipulated in an unauthorized manner.</p>\n<h3>Authentication</h3>\n<p>Authentication provides the identification of the originator. It confirms to the receiver that the data received has been sent only by an identified and verified sender.</p>\n<p>Authentication service has two variants &minus;</p>\n<ul class=\"list\">\n<li>\n<p><strong>Message authentication</strong>&nbsp;identifies the originator of the message without any regard router or system that has sent the message.</p>\n</li>\n<li>\n<p><strong>Entity authentication</strong>&nbsp;is assurance that data has been received from a specific entity, say a particular website.</p>\n</li>\n</ul>\n<p>Apart from the originator, authentication may also provide assurance about other parameters related to data such as the date and time of creation/transmission.</p>\n<h3>Non-repudiation</h3>\n<p>It is a security service that ensures that an entity cannot refuse the ownership of a previous commitment or an action. It is an assurance that the original creator of the data cannot deny the creation or transmission of the said data to a recipient or third party.</p>\n<p>Non-repudiation is a property that is most desirable in situations where there are chances of a dispute over the exchange of data. For example, once an order is placed electronically, a purchaser cannot deny the purchase order, if non-repudiation service was enabled in this transaction.</p>\n<h2>Cryptography Primitives</h2>\n<p>Cryptography primitives are nothing but the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services &minus;</p>\n<ul class=\"list\">\n<li>Encryption</li>\n<li>Hash functions</li>\n<li>Message Authentication codes (MAC)</li>\n<li>Digital Signatures</li>\n</ul>\n<p>The following table shows the primitives that can achieve a particular security service on their own.</p>\n<img src=\"https://www.tutorialspoint.com/cryptography/images/primitive_service.jpg\" alt=\"Primitives Service\" />\n<p><strong>Note</strong>&nbsp;&minus; Cryptographic primitives are intricately related and they are often combined to achieve a set of desired security services from a cryptosystem.</p>", "challenge_id"=>733, "created_at"=>Sat, 30 Apr 2022 07:26:34.211831000 UTC +00:00, "updated_at"=>Sat, 30 Apr 2022 07:26:34.211831000 UTC +00:00}

  • Playlist Sections
  • Modern Cryptography

Description

Modern cryptography is the cornerstone of computer and communications security. Its foundation is based on various concepts of mathematics such as number theory, computational-complexity theory, and probability theory.

Characteristics of Modern Cryptography

There are three major characteristics that separate modern cryptography from the classical approach.

Classic Cryptography Modern Cryptography
It manipulates traditional characters, i.e., letters and digits directly. It operates on binary bit sequences.
It is mainly based on ‘security through obscurity’. The techniques employed for coding were kept secret and only the parties involved in communication knew about them. It relies on publicly known mathematical algorithms for coding the information. Secrecy is obtained through a secrete key which is used as the seed for the algorithms. The computational difficulty of algorithms, absence of secret key, etc., make it impossible for an attacker to obtain the original information even if he knows the algorithm used for coding.
It requires the entire cryptosystem for communicating confidentially. Modern cryptography requires parties interested in secure communication to possess the secret key only.

Context of Cryptography

Cryptology, the study of cryptosystems, can be subdivided into two branches −

  • Cryptography
  • Cryptanalysis
Cryptography Types

What is Cryptography?

Cryptography is the art and science of making a cryptosystem that is capable of providing information security.

Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services. You can think of cryptography as the establishment of a large toolkit containing different techniques in security applications.

What is Cryptanalysis?

The art and science of breaking the cipher text is known as cryptanalysis.

Cryptanalysis is the sister branch of cryptography and they both co-exist. The cryptographic process results in the cipher text for transmission or storage. It involves the study of cryptographic mechanism with the intention to break them. Cryptanalysis is also used during the design of the new cryptographic techniques to test their security strengths.

Note − Cryptography concerns with the design of cryptosystems, while cryptanalysis studies the breaking of cryptosystems.

Security Services of Cryptography

The primary objective of using cryptography is to provide the following four fundamental information security services. Let us now see the possible goals intended to be fulfilled by cryptography.

Confidentiality

Confidentiality is the fundamental security service provided by cryptography. It is a security service that keeps the information from an unauthorized person. It is sometimes referred to as privacy or secrecy.

Confidentiality can be achieved through numerous means starting from physical securing to the use of mathematical algorithms for data encryption.

Data Integrity

It is security service that deals with identifying any alteration to the data. The data may get modified by an unauthorized entity intentionally or accidently. Integrity service confirms that whether data is intact or not since it was last created, transmitted, or stored by an authorized user.

Data integrity cannot prevent the alteration of data, but provides a means for detecting whether data has been manipulated in an unauthorized manner.

Authentication

Authentication provides the identification of the originator. It confirms to the receiver that the data received has been sent only by an identified and verified sender.

Authentication service has two variants −

  • Message authentication identifies the originator of the message without any regard router or system that has sent the message.

  • Entity authentication is assurance that data has been received from a specific entity, say a particular website.

Apart from the originator, authentication may also provide assurance about other parameters related to data such as the date and time of creation/transmission.

Non-repudiation

It is a security service that ensures that an entity cannot refuse the ownership of a previous commitment or an action. It is an assurance that the original creator of the data cannot deny the creation or transmission of the said data to a recipient or third party.

Non-repudiation is a property that is most desirable in situations where there are chances of a dispute over the exchange of data. For example, once an order is placed electronically, a purchaser cannot deny the purchase order, if non-repudiation service was enabled in this transaction.

Cryptography Primitives

Cryptography primitives are nothing but the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services −

  • Encryption
  • Hash functions
  • Message Authentication codes (MAC)
  • Digital Signatures

The following table shows the primitives that can achieve a particular security service on their own.

Primitives Service

Note − Cryptographic primitives are intricately related and they are often combined to achieve a set of desired security services from a cryptosystem.

Submission: Experience summary

Write a paragraph about what you learned.




×
Michigan State University Wordmark
  • Call us: (517) 355-5482
  • Contact Information
  • Site Map
  • Privacy Statement
  • Site Accessibility
  • Call MSU: (517) 355-1855
  • Visit: msu.edu
  • Notice of Nondiscrimination
  • CTLI events, programs, and activities are open to all MSU educators and students, who are encouraged to participate fully.
  • Spartans Will.
  • © Michigan State University
  • Subscribe to #iteachmsu Digest

Wizdn Watermark image


OK

OK
Cancel