Chapter 6 Lesson 1 - Introduction To Cryptography
Chapter 6 Lesson 1 - Introduction To Cryptography
Introduction to
Cryptography
• Plaintext
➢ the original raw text document onto which encryption needs to be
applied
Meet me at 3pm
• Ciphertext
➢ the output of applying encryption to a plaintext
• Encryption
➢ process of converting plaintext to a ciphertext using an
encryption algorithm.
• Decryption
➢ process of converting back the ciphertext to the original
message called plaintext
Fundamentals of Cryptography (continued)
• Encryption Algorithm
➢ a mathematical procedure for encryption and decryption
➢ Example: RSA, DES, Caesar, Affine, etc.
• Key length
➢ Choosing an encryption algorithm with an appropriate key
size is an important decision to make. The strength of the
key is usually determined by the key size or the number of
bits.
History of Cryptography
➢ came into existence in the 15th century, which offered moving letters
in the message with a number of variable places instead of moving
them the same number of places
❖ Symmetric Cryptography/Cipher
➢ Also known as Shared Key or Private key cryptography
➢ Both parties must use the same key for encryption and decryption. This
means that the encryption key must be shared between the two parties
before any messages can be decrypted.
➢ Examples: Caesar, Affine, Vigenere, Rail Fence, DES, AES/Rijndael
Diagram on how the symmetric cipher using the same private key works
Two Major Types of Cryptography (continued)
❖ Asymmetric Cryptography/Cipher
➢ The encryption key and the decryption keys are separate.
➢ Each person has two keys. One key, the public key, is shared publicly.
The second key, the private key, should never be shared with anyone.
➢ Examples: RSA and Diffie-Hellman
Diagram on how the symmetric cipher using the public and private key works
Cryptographic Techniques
❖ Substitution Cipher
❖ Transposition Cipher
❖ Block Cipher
❖ Stream Cipher
Cryptographic Techniques (continued)
❖ Substitution Cipher
➢ Encrypt plaintext by changing the plaintext one piece at a time
❖ Transposition Cipher
➢ Encrypt plaintext by moving small pieces of the message around.
Anagrams are a primitive transposition cipher
❖ Block Cipher
➢ An encryption algorithm that encrypts a fixed size of n-bits of data – known
as a block – at one time. The usual sizes of each block are 64 bits, 128 bits,
and 256 bits. In cases where bits of plaintext is shorter than the block size,
padding schemes are called into play.
❖ Stream Cipher
➢ An encryption algorithm that encrypt 1 bit or byte of plaintext at a time. It
uses an infinite stream of pseudorandom bits as the key. For a stream
cipher implementation to remain secure, its pseudorandom generator
should be unpredictable and the key should never be reused.
➢ Are designed to approximate an idealized cipher known as the One-Time
Pad.
Examples: RC4, and other stream cipher that already exist but never gained
the same popularity as RC4 (SALSA, SOSEMANUK, PANAMA)
o RC4 – stands for Rivest Cipher 4; most widely used of all stream ciphers; has been
used in various protocols like WEP and WPA (both security protocols for wireless
networks)
Rivest-Shamir-Adleman (RSA) Algorithm
1. VeraCrypt
2. Kruptos 2 cryptography tools
3. Boxcryptor
4. IBM Security Guardium Data Encryption
5. CertMgr.exe
6. Quantum Numbers Corp
7. Homomorphic Encryption
8. AxCrypt Premium
9. Key-Based Authentication
10.Authentication Token/Security Token
11.Docker