Basic protocols in cryptography
Key exchange with digital signatures/
key exchange with digital signature" refers to a cryptographic process where
two parties securely exchange encryption keys by using a digital signature to
verify the authenticity of the public key being sent, ensuring that the key
belongs to the intended recipient and hasn't been tampered with during
transmission, typically using a method like Diffie-Hellman key exchange
alongside digital signature algorithms like RSA or DSA
Key and message Transmission
"key and message transmission" refers to the process of securely sending a
message (plaintext) by encrypting it using a cryptographic key, which is then
transmitted to the intended recipient who can decrypt it using the
corresponding private key, allowing only authorized parties to access the
original message; this often involves using public key cryptography where a
sender uses the recipient's public key to encrypt the message and the
recipient uses their private key to decrypt it, ensuring confidentiality during
transmission
Consider two users Alice& Bob as two users
Here at key transmission users need not to complete the key-exchange protocol before
exchanging messages.
In this protocol ,Alice sends bob the message M,without any previous key exchange
protocol
•Lets say Alice generates a random session key K and encrypts M using K i.e Ek(M)
•Alice gets bob’s public key from the Database
•Alice encrypts K with Bob’s Public key EB(K)
•Alice sends both the encrypted message & encrypted session key
to Bob
Ekm EB(K)
•Bob decrypts Alice’s session key , K using his private key.
•Bob decrypt’s Alice message using the session key
• Types of Cryptography Algorithm
• Advanced Encryption Standard (AES): AES (Advanced Encryption Standard)
is a popular encryption algorithm which uses the same key for encryption
and decryption It is a symmetric block cipher algorithm with block size of
128 bits, 192 bits or 256 bits. AES algorithm is widely regarded as the
replacement of DES (Data encryption standard) algorithm.
• Data Encryption Standard (DES): DES (Data encryption standard) is an older
encryption algorithm that is used to convert 64-bit plaintext data into 48-bit
encrypted ciphertext. It uses symmetric keys (which means same key for
encryption and decryption). It is kind of old by today’s standard but can be
used as a basic building block for learning newer encryption algorithms.
• RSA: RSA is an basic asymmetric cryptographic algorithm which uses two
different keys for encryption. The RSA algorithm works on a block cipher
concept that converts plain text into cipher text and vice versa.
• Secure Hash Algorithm (SHA): SHA is used to generate unique fixed-length
digital fingerprints of input data known as hashes. SHA variations such
as SHA-2 and SHA-3 are commonly used to ensure data integrity and
authenticity. The tiniest change in input data drastically modifies the hash
output, indicating a loss of integrity. Hashing is the process of storing key
value pairs with the help of a hash function into a hash table.
Advantages of Cryptography
Access Control: Cryptography can be used for access control to ensure that only parties
with the proper permissions have access to a resource. Only those with the correct
decryption key can access the resource thanks to encryption.
Secure Communication: For secure online communication, cryptography is crucial. It
offers secure mechanisms for transmitting private information like passwords, bank
account numbers, and other sensitive data over the Internet.
Protection against attacks: Cryptography aids in the defense against various types of
assaults, including replay and man-in-the-middle attacks . It offers strategies for
spotting and stopping these assaults.
RSA is a type of cryptosystem algorithm. DSA is a type of digital signature algorithm.
Use. One can use the RSA algorithm for securing the transmission of data. One can use
the DSA algorithm for the digital signatures and their verification
RSA stands for Rivest-Shamir-Adleman, and DSA stands for Digital Signature
Algorithm. RSA and DSA are both algorithms used in cryptography to secure data
transmission and digital signatures.
Key and message broadcast
• A "key and message broadcast" refers to a system where a single "key" is
used to encrypt a message that is then broadcasted to a large group of
recipients, meaning everyone who receives the broadcast needs the same
key to decrypt and read the message, essentially allowing for secure mass
communication where only authorized parties can access the information .
Key points about key and message broadcast:
• Encryption: The message is scrambled using a cryptographic key before being sent out, ensuring
privacy.
• Wide Distribution: The encrypted message is broadcast to a large number of recipients
simultaneously.
• Decryption with Key: Each recipient needs the same "key" to decrypt the message and read its
contents.
Common applications of key and message broadcast:
• Emergency alerts: Sending critical information like weather warnings or
evacuation orders to a wide area using a shared key.
• Secure communication within organizations: Sharing confidential information
among employees with access to the decryption key.
• Financial transactions: Broadcasting secure payment details to authorized parties
with the correct key.
• Important considerations:
• Key management: Distributing the decryption key securely to authorized
recipients is crucial to prevent unauthorized access.
• Key distribution methods: Various methods like dedicated key servers or secure
channels can be used to distribute keys.
• Compatibility: All recipients must have the necessary technology and software to
handle the encryption and decryption process using the same key
Consider 4 users as a group namely Alice,Bob ,Dave,Carol…
Alice can’t send the encrypted message to several people, lets
see this example Alice wants to send a encrypted message to
all 3 users
• Alice generates a random session key “K’’ and encrypts M
using K i.e. Ek(M)
• Alice gets the users public keys from data base and encrypts K
with all three users key Individually
EB(K),EC (K).ED(K)
• Alice broadcasts the encrypted message and all the encrypted
keys to anybody who cares to receive it.
EB(K),EC (K),ED(K), Ek(M)
• Only Bob,carol,Dave can decrypt the key K using their private
keys
Authentication and key exchange (AKE) protocols are cryptographic
primitives that allow two or more parties to establish a shared secret key
while authenticating the identities of the parties involved.
How do AKE protocols work?
AKE protocols use pre-shared information to authenticate the identities of
the parties.
AKE protocols establish a session key over an insecure communication
network.
AKE protocols use long-term keys and session keys.
AKE protocols are often used at the beginning of a communication session.
Why are AKE protocols important?
AKE protocols are essential to prevent man-in-the-middle attacks.
AKE protocols ensure that only the intended parties know the key.
Examples of AKE protocols
Password Authenticated Key Exchange (PAKE): Uses low-entropy
passwords to authenticate users and establish a session key
Transport Layer Security (TLS): Used to secure HTTP connections