0% found this document useful (0 votes)
32 views

IAS Module 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

IAS Module 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Engineering-Computing Academy of Science

and Technology

BSIT

Course Code MMS 1A


Course Description Information Assurance and Security
Module Title Advance Cryptography

I. INTRODUCTION:

In computer science, cryptography refers to secure information and communication techniques


derived from mathematical concepts and a set of rule-based calculations called algorithms, to
transform messages in ways that are hard to decipher. These deterministic algorithms are used for
cryptographic key generation, digital signing, verification to protect data privacy, web browsing on
the internet and confidential communications such as credit card transactions and email.

II. PRE- DISCUSSION ACTIVITY:


In your own words (2-3 sentences each number) define the following:
1. Cryptography

III. DISCUSSION: CHAPTER 1” Cryptography”


Cryptography
Cryptography is the technique of obfuscating or coding data, ensuring that only
the person who is meant to see the information–and has the key to break the
code–can read it. The word is a hybrid of two Greek words: “kryptós”, which
means hidden, and “graphein”, which means to write. Literally, the word
cryptography translates to hidden writing, but in reality, the practice involves the
secure transmission of information.
Engineering-Computing Academy of Science
and Technology

BSIT

Other definitions

1. Cryptography is associated with the process of converting ordinary plain


text into unintelligible text and vice-versa. It is a method of storing and
transmitting data in a particular form so that only those for whom it is
intended can read and process it. Cryptography not only protects data
from theft or alteration, but can also be used for user authentication.
2. Cryptography uses codes to protect data and communications so only
the intended receivers can decode and understand them.
Consequently, restricting access to information from outside parties.

Cryptography
Is the process of converting plaintext into ciphertext to hide information from unauthorized
users
 Plaintext: readable text (also called cleartext)
 Ciphertext: unreadable or encrypted text

Decryption
is the process of converting ciphertext back to plaintext

Encoding and decoding messages. This technique is called Cryptography

Types of Cryptography

Symmetric Key Cryptography: It is an encryption system where the sender and receiver of
message use a single common key to encrypt and decrypt messages. Symmetric Key
Systems are faster and simpler but the problem is that sender and receiver have to somehow
Engineering-Computing Academy of Science
and Technology

BSIT

exchange key in a secure manner. The most popular symmetric key cryptography system are
Data Encryption System(DES) and Advanced Encryption System(AES).

Hash Functions: There is no usage of any key in this algorithm. A hash value with fixed
length is calculated as per the plain text which makes it impossible for contents of plain text to
be recovered. Many operating systems use hash functions to encrypt passwords.
Engineering-Computing Academy of Science
and Technology

BSIT

Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and
decrypt information. A receiver’s public key is used for encryption and a receiver’s private key
is used for decryption. Public key and Private Key are different. Even if the public key is known
by everyone the intended receiver can only decode it because he alone know his private key.
The most popular asymmetric key cryptography algorithm is RSA algorithm.
Engineering-Computing Academy of Science
and Technology

BSIT

Example of Cryptography
1. Morse Code refers to either of two systems for representing letters of the alphabet,
numerals, and punctuation marks by an arrangement of dots, dashes, and spaces. The
codes are transmitted as electrical pulses of varied lengths or analogous mechanical or
visual signals, such as flashing lights. The two systems are the original “American”
Morse Code and the later International Morse Code, which became the global
standard.
Engineering-Computing Academy of Science
and Technology

BSIT

2. The first encryption methods date back to 4000 years ago.


Some Egyptian hieroglyphics were encrypted. Atbash Cipher a Hebrew cryptographic
method. The alphabet to be flipped so that each letter in the original alphabet was
mapped to a different letter in the flipped, alphabet.

ABCDEFGHIJKLMNOPQRSTUVWXYZ
ZYXWVUTSRQPONMLKJIHGFEDCBA

Encryption = is the process by which a readable message is converted to an


unreadable form to prevent unauthorized parties from reading it.

Decryption = is the process of converting an encrypted message back to its original


(readable) format. The original message is called the plaintext message.

Modern cryptography concerns itself with the following four objectives:


1. Confidentiality. The information cannot be understood by anyone for whom it was
unintended.
Engineering-Computing Academy of Science
and Technology

BSIT

2. Integrity. The information cannot be altered in storage or transit between sender and
intended receiver without the alteration being detected.
3. Non-repudiation. The creator/sender of the information cannot deny at a later stage
their intentions in the creation or transmission of the information.
4. Authentication. The sender and receiver can confirm each other's identity and the
origin/destination of the information.

Applications Of Cryptography:
1. Computer passwords: Cryptography is widely utilized in computer security,
particularly when creating and maintaining passwords. When a user logs in, their
password is hashed and compared to the hash that was previously stored.
Passwords are hashed and encrypted before being stored. In this technique, the
passwords are encrypted so that even if a hacker gains access to the password
database, they cannot read the passwords.
2. Digital Currencies: To safeguard transactions and prevent fraud, digital
currencies like Bitcoin also use cryptography. Complex algorithms and
cryptographic keys are used to safeguard transactions, making it nearly hard to
tamper with or forge the transactions.
3. Secure web browsing: Online browsing security is provided by the use of
cryptography, which shields users from eavesdropping and man-in-the-middle
assaults. Public key cryptography is used by the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols to encrypt data sent between the web
server and the client, establishing a secure channel for communication.
4. Electronic signatures: Electronic signatures serve as the digital equivalent of a
handwritten signature and are used to sign documents. Digital signatures are
created using cryptography and can be validated using public key cryptography. In
Engineering-Computing Academy of Science
and Technology

BSIT

many nations, electronic signatures are enforceable by law, and their use is
expanding quickly. Authentication: Cryptography is used for authentication in many
different situations, such as when accessing a bank account, logging into a
computer, or using a secure network. Cryptographic methods are employed by
authentication protocols to confirm the user’s identity and confirm that they have
the required access rights to the resource.
5. Authentication: Cryptography is used for authentication in many different
situations, such as when accessing a bank account, logging into a computer, or
using a secure network. Cryptographic methods are employed by authentication
protocols to confirm the user’s identity and confirm that they have the required
access rights to the resource.
6. Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin
and Ethereum to safeguard transactions, thwart fraud, and maintain the network’s
integrity. Complex algorithms and cryptographic keys are used to safeguard
transactions, making it nearly hard to tamper with or forge the transactions.
7. End-to-End Encryption: End-to-end encryption is used to protect two-way
communications like video conversations, instant messages, and email. Even if the
message is encrypted, it assures that only the intended receivers can read the
message. End-to-end encryption is widely used in communication apps like
WhatsApp and Signal, and it provides a high level of security and privacy for users.
8.
DISCUSSION: CHAPTER 2 ”Advance Cryptography”

Modern cryptography is the cornerstone of computer and communications security. Its


foundation is based on various concepts of mathematics such as number theory,
computational-complexity theory, and probability theory.

Classic Cryptography Modern Cryptography


Engineering-Computing Academy of Science
and Technology

BSIT

It manipulates traditional characters, i.e., It operates on binary bit sequences.


letters and digits directly.
It is mainly based on ‘security through It relies on publicly known mathematical
obscurity’. The techniques employed for algorithms for coding the information.
coding were kept secret and only the parties Secrecy is obtained through a secrete key
involved in communication knew about them. which is used as the seed for the algorithms.
The computational difficulty of algorithms,
absence of secret key, etc., make it
impossible for an attacker to obtain the
original information even if he knows the
algorithm used for coding.
It requires the entire cryptosystem for Modern cryptography requires parties
communicating confidentially. interested in secure communication to
possess the secret key only.

IV. ASSESSMENT:
1. Define Cryptography

Reference List:
Cryptography

https://www.techtarget.com/searchsecurity/definition/cryptography

Prepared by: Reviewed by: Recommending Approved:


Approval:

Daniel Villano Jane M. Fernandez Virgo Lopez Rhonda Padilla


Faculty,E-Coast Dean,E-Coast Vice President for President
Academics

You might also like