KEMBAR78
Cryptography | PDF | Key (Cryptography) | Public Key Cryptography
0% found this document useful (0 votes)
6 views6 pages

Cryptography

Cryptography is a technique for encoding text into ciphertext to protect sensitive data from unauthorized access, commonly used in internet communications. It employs cryptographic keys for data encoding and decoding, with key management best practices essential for security. There are two main types of encryption: symmetric, which uses the same key for both encoding and decoding, and asymmetric, which utilizes a pair of keys (public and private) for secure data exchange.

Uploaded by

Apipedream
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

Cryptography

Cryptography is a technique for encoding text into ciphertext to protect sensitive data from unauthorized access, commonly used in internet communications. It employs cryptographic keys for data encoding and decoding, with key management best practices essential for security. There are two main types of encryption: symmetric, which uses the same key for both encoding and decoding, and asymmetric, which utilizes a pair of keys (public and private) for secure data exchange.

Uploaded by

Apipedream
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Created by Turbolearn AI

Understanding Cryptography
Cryptography is a method of converting text into abstract codes known as
ciphertexts. It's used to hide sensitive data, preventing unauthorized users from
accessing and stealing information. Most websites and applications use cryptography
to protect data transmission over the internet.

How Cryptography Works


Cryptography uses a cryptographic key, which is a string or sequence of text, to
scramble and encode readable data into an unreadable ciphertext.

Here’s how the transmission of information works on the internet:

1. The sender uses a key to encode the data.


2. The receiver uses the key to decode the data.

The strength of a cryptographic system depends on the length of the key, measured
in bits. The possible combinations for a key are generated by the number of its size
(in bits) to the power of two. For example, a one-bit key has two possible
combinations: 1 or 0.

Shorter keys have fewer combinations and are less secure, while longer keys are
more secure but algorithms also play a vital role in security.

Page 1
Created by Turbolearn AI

The infographic above illustrates the difference between HTTP and HTTPS protocols.
HTTPS is the secure version of HTTP, achieved through SSL/TLS encryption.

Key Management Best Practices


To prevent unauthorized use of keys, implement these practices:

Key Lifecycle Management: Update keys periodically and delete unused ones.
Protected Storage: Securely store keys, using a Hardware Security Module
(HSM) for enhanced security.
Usage and Access Restrictions: Limit access and usage permissions to
authorized users and specific purposes.
Audit Log Monitoring: Record all key creation, modification, and usage
activities in an audit log.

Importance of Cryptography
Cryptography is essential for enhancing data security on the internet. It protects
sensitive information, verifies data origin, prevents unauthorized modifications, and
increases user privacy. Cryptography is crucial because unencrypted data can be
viewed when transmitted over a network.

For website owners, cryptography ensures compliance with digital data protection
laws, such as the General Data Protection Law (LGPD). Installing an SSL certificate
on your site is the easiest way to comply with data protection rules on the internet.

Types of Cryptography
There are two main types of data encryption: symmetric and asymmetric, based on
the number of cryptographic keys used.

Symmetric Encryption
In symmetric encryption, the sender and receiver use an identical symmetric key to
encode and decode the transmitted data.

Page 2
Created by Turbolearn AI

Step Description

1. Key Sharing Both sender and receiver possess the same cryptographic key.
Using the symmetric key, the sender encrypts the data, converting
2. Encryption
textual information into an unreadable ciphertext.
3. Data
The encrypted data is sent over the internet.
Transmission
The recipient receives the encrypted data and decodes it with the
4. Decryption same symmetric key used earlier, revealing the transmitted
information.

Symmetric encryption is faster but less secure than asymmetric encryption. It is


suitable when speed is prioritized over security, often used to protect stationary data
like employee contracts stored in a cloud platform.

Asymmetric Encryption
Also known as public key cryptography, asymmetric encryption uses two different
but mathematically related keys: a public key and a private key.

Step Description

1. Key Generation Both sender and receiver generate their asymmetric key pairs.
2. Public Key
Each party sends their public key to the other.
Exchange
The sender encrypts the data using the recipient's public key and
3. Encryption
sends it.
4. Decryption The recipient decrypts the data using their private key.
5. Repetition (if If the recipient needs to send data back, they encrypt it using the
needed) original sender's public key, and the process repeats.

The public key encrypts data and is available to everyone. Only the
corresponding private key can decrypt data encrypted by the public key.
The private key is generated and used only by authorized users.

Page 3
Created by Turbolearn AI

Some technologies use a hybrid approach, combining symmetric and asymmetric


encryption. TLS (Transport Layer Security) certificates are an example, using
asymmetric encryption to protect the symmetric key. This provides an extra layer of
security but is slower. Public key cryptography is commonly used to protect sensitive
information exchanges, such as email messages.

Encryption Algorithms
An encryption algorithm is a mathematical formula that systematically converts data
into ciphertexts and allows the encrypted data to be reverted into readable text.
Different algorithms can be used with symmetric and asymmetric encryption.

DES (Data Encryption Standard)


One of the earliest cryptographic algorithms, developed at IBM. It's a symmetric key
algorithm and was the U.S. federal standard for data encryption until 1999.

Key Size: 56 bits


Status: Obsolete due to security concerns
Typical Use: Protecting electronic financial transactions

3DES (Triple Data Encryption Standard)


A successor to DES, designed to address the small key size (56 bits) issue.

Type: Symmetric
Key Size: 64 bits
Process: Applies the DES algorithm three times to each data block.

AES (Advanced Encryption Standard)


A more recent symmetric algorithm that replaced DES as the U.S. national
cryptographic standard.

Advantage: Larger key sizes (up to 256 bits) and faster mathematical efficiency.
Common Uses: Securing Wi-Fi networks, protecting information on data
storage platforms, and mobile applications.

Page 4
Created by Turbolearn AI

RSA (Rivest-Shamir-Adleman)
One of the first asymmetric cryptographic algorithms, offering a high level of security.

Method: Uses the mathematical method of Primary Factorization to generate a


long sequence of numbers from smaller combinations.
Key Sizes: Supports asymmetric keys up to 4096 bits.
Common Uses: Protecting web applications, email messages, and
cryptocurrency blockchains.

Twofish
A symmetric encryption algorithm supporting key lengths up to 256 bits.

Flexibility: Suitable for a wide range of applications, especially those with


limited storage and RAM.
Key Features: Allows performance to be balanced based on parameters like
encryption speed and hardware capabilities.
Applications:
PGP (Pretty Good Privacy): Email encryption program.
KeePass: Password manager for storage and encryption.
TrueCrypt: Disk encryption software for freeware programs.
PeaZip: File archiver and extractor.

RC4 (Rivest Cipher)


A symmetric encryption algorithm that uses a stream cipher system, processing data
one bit at a time.

Key Features: Known for its simplicity and good performance.


Common Uses: SSL and TLS certificates, Wi-Fi encryption protocols, and
browser protection.
Status: No longer widely used due to identified security vulnerabilities.

FAQ

What is a Cryptographic Key?

Page 5
Created by Turbolearn AI

In cryptography, a key is a sequence of characters (string) used to


systematically encode data. Secret keys are mathematically developed
based on a specific algorithm, making each key unique and difficult to
decipher.

What is a Brute Force Attack?


A brute force attack occurs when cybercriminals attempt to decipher an
encryption key by trying billions of possible combinations. Modern
cryptographic systems are immune to these attacks due to long keys and
complex algorithms.

What is the Difference Between Cryptography and


Tokenization?
Tokenization is a method of replacing sensitive information with tokens.
Unlike ciphertexts, tokens do not have a mathematical relationship to the
original data, making tokenization an irreversible encryption process. The
relationship between the protected information and the token is stored in
a database called a vault.

Page 6

You might also like