Symmetric Encryption
Symmetric Encryption
Cipher text: The information after it has been obfuscated by the encryption algorithm.
Cryptanalysis: The art of analyzing cryptographic algorithms for identifying the weaknesses.
Cryptanalyst: An individual who uses cryptanalysis to identify the weaknesses in cryptographic algorithms.
Encryption Algorithm: An algorithm defines how data is transformed when original plaintext data scrambled to
cipher text. Both the data sender and the recipient must know the algorithm used for data transformation. The
recipient should use the same algorithm to decrypt the cipher text back into the original plaintext data.
Encryption Key: A key is secret value, which is used as an input to the algorithm along with the plaintext data
when plaintext is converted to cipher text. The same secret key should be used to decrypt the cipher text back into
plaintext data.
Symmetric Encryption
Symmetric encryption is the process of converting readable data unreadable format and converting it back to
readable format using same key. Symmetric encryption algorithms use the same key for encryption and decryption.
Symmetric Encryption Algorithms are :
DES,DESX,TripleDES,3DES,RC2,RC5,RC4,AES,IDEA,Blowfish,CAST,Block Cipher, Streaming Cipher
Data Encryption Standard (DES): An encryption algorithm that encrypts data with a 56-bit, randomly generated
symmetric key and 8 bit for error correction as empty bits . Uses the block cipher (64 bit) algorithm. Block cipher
is algorithm operate on fixed length of group of bit of bits.
Keying option 1
All three keys are independent.
Keying option 2
K1 and K2 are independent, and K3 = K1.
Keying option 3
All three keys are identical, i.e. K1 = K2 = K3.
Keying option 1 is the strongest, with 3 56 = 168 independent key bits.
Keying option 2 provides less security, with 2 56 = 112 key bits. This option is stronger than simply DES encrypting
twice, e.g. with K1 and K2, because it protects against meet-in-the-middle attacks.
Keying option 3 is equivalent to DES, with only 56 key bits. It provides backward compatibility with DES, because the
first and second DES operations cancel out. It is not recommended.
Asymmetric Encryption
Public key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys:
public keys which may be disseminated widely, and private keys which are known only to the owner.
Decrypt the cipher text with his own private key (PrivB)
Decrypt the hash sum with Alice's public key (PubA)
Calculate the hash sum of the plaintext and compare it with the decrypted hash sum
Digital Certificate:
The data structure used to transport and validate keys is called a digital certificate.