IAS Module 1
IAS Module 1
and Technology
BSIT
I. INTRODUCTION:
BSIT
Other definitions
Cryptography
Is the process of converting plaintext into ciphertext to hide information from unauthorized
users
Plaintext: readable text (also called cleartext)
Ciphertext: unreadable or encrypted text
Decryption
is the process of converting ciphertext back to plaintext
Types of Cryptography
Symmetric Key Cryptography: It is an encryption system where the sender and receiver of
message use a single common key to encrypt and decrypt messages. Symmetric Key
Systems are faster and simpler but the problem is that sender and receiver have to somehow
Engineering-Computing Academy of Science
and Technology
BSIT
exchange key in a secure manner. The most popular symmetric key cryptography system are
Data Encryption System(DES) and Advanced Encryption System(AES).
Hash Functions: There is no usage of any key in this algorithm. A hash value with fixed
length is calculated as per the plain text which makes it impossible for contents of plain text to
be recovered. Many operating systems use hash functions to encrypt passwords.
Engineering-Computing Academy of Science
and Technology
BSIT
Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and
decrypt information. A receiver’s public key is used for encryption and a receiver’s private key
is used for decryption. Public key and Private Key are different. Even if the public key is known
by everyone the intended receiver can only decode it because he alone know his private key.
The most popular asymmetric key cryptography algorithm is RSA algorithm.
Engineering-Computing Academy of Science
and Technology
BSIT
Example of Cryptography
1. Morse Code refers to either of two systems for representing letters of the alphabet,
numerals, and punctuation marks by an arrangement of dots, dashes, and spaces. The
codes are transmitted as electrical pulses of varied lengths or analogous mechanical or
visual signals, such as flashing lights. The two systems are the original “American”
Morse Code and the later International Morse Code, which became the global
standard.
Engineering-Computing Academy of Science
and Technology
BSIT
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ZYXWVUTSRQPONMLKJIHGFEDCBA
BSIT
2. Integrity. The information cannot be altered in storage or transit between sender and
intended receiver without the alteration being detected.
3. Non-repudiation. The creator/sender of the information cannot deny at a later stage
their intentions in the creation or transmission of the information.
4. Authentication. The sender and receiver can confirm each other's identity and the
origin/destination of the information.
Applications Of Cryptography:
1. Computer passwords: Cryptography is widely utilized in computer security,
particularly when creating and maintaining passwords. When a user logs in, their
password is hashed and compared to the hash that was previously stored.
Passwords are hashed and encrypted before being stored. In this technique, the
passwords are encrypted so that even if a hacker gains access to the password
database, they cannot read the passwords.
2. Digital Currencies: To safeguard transactions and prevent fraud, digital
currencies like Bitcoin also use cryptography. Complex algorithms and
cryptographic keys are used to safeguard transactions, making it nearly hard to
tamper with or forge the transactions.
3. Secure web browsing: Online browsing security is provided by the use of
cryptography, which shields users from eavesdropping and man-in-the-middle
assaults. Public key cryptography is used by the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols to encrypt data sent between the web
server and the client, establishing a secure channel for communication.
4. Electronic signatures: Electronic signatures serve as the digital equivalent of a
handwritten signature and are used to sign documents. Digital signatures are
created using cryptography and can be validated using public key cryptography. In
Engineering-Computing Academy of Science
and Technology
BSIT
many nations, electronic signatures are enforceable by law, and their use is
expanding quickly. Authentication: Cryptography is used for authentication in many
different situations, such as when accessing a bank account, logging into a
computer, or using a secure network. Cryptographic methods are employed by
authentication protocols to confirm the user’s identity and confirm that they have
the required access rights to the resource.
5. Authentication: Cryptography is used for authentication in many different
situations, such as when accessing a bank account, logging into a computer, or
using a secure network. Cryptographic methods are employed by authentication
protocols to confirm the user’s identity and confirm that they have the required
access rights to the resource.
6. Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin
and Ethereum to safeguard transactions, thwart fraud, and maintain the network’s
integrity. Complex algorithms and cryptographic keys are used to safeguard
transactions, making it nearly hard to tamper with or forge the transactions.
7. End-to-End Encryption: End-to-end encryption is used to protect two-way
communications like video conversations, instant messages, and email. Even if the
message is encrypted, it assures that only the intended receivers can read the
message. End-to-end encryption is widely used in communication apps like
WhatsApp and Signal, and it provides a high level of security and privacy for users.
8.
DISCUSSION: CHAPTER 2 ”Advance Cryptography”
BSIT
IV. ASSESSMENT:
1. Define Cryptography
Reference List:
Cryptography
https://www.techtarget.com/searchsecurity/definition/cryptography