ITE 322 - Reviewer
ITE 322 - Reviewer
Defining Ciphertext
The result of employing encryption methods, often referred to as cyphers, is
called ciphertext. When data cannot be understood by individuals or devices
lacking the appropriate cypher, it is considered encrypted. To interpret the
data, the cypher is necessary. Algorithms transform plaintext into ciphertext,
and vice versa, to convert ciphertext back into plaintext. These processes
are known as encryption and decryption.
In simpler terms, letters are substituted for other letters. In the past,
recording corresponding characters to decipher a message was feasible.
2. Online Banking
o Secure Communication
3. E-commerce
o Payment Security
o Digital Wallets
Mobile payment apps like Apple Pay and Google Pay use
encryption to protect your payment card data when making in-
store or online purchases.
4. Email Encryption
o Secure Email Services
It’s important to note that the strength of a cipher is not solely determined
by the algorithm itself but also by the length and randomness of encryption
keys and the implementation of the encryption process. Even a strong cipher
can be compromised if keys are poorly managed, or there are vulnerabilities
in the encryption software.
Data Encryption
Encryption is the method by which information is converted into secret code that hides
the information's true meaning. The science of encrypting and decrypting information is
called cryptography.
Encryption has long been used to protect sensitive information. Historically, it was used
by militaries and governments. In modern times, encryption is used to protect data both
at rest and in motion. At-rest data is the type stored on computers and storage devices.
In-motion data refers to data in transit between devices and over networks.
Importance of Encryption
Encryption plays a vital role in securing different types of IT assets and personally
identifiable information (PII). To this end, encryption serves four essential functions:
When setting up a system for encrypting data, a security team must determine which
encryption algorithm to use to encode the data. Before doing that, however, the team
should first decide on the type of algorithm. The two most common types are symmetric
and asymmetric:
Symmetric ciphers - Also referred to as secret key cyphers, these algorithms use a
single key for both encrypting and decrypting data. The key is sometimes referred to as
a shared secret because the sender or computing system doing the encryption must
share the secret key with all entities authorized to decrypt the message. Symmetric key
encryption is usually much faster than asymmetric encryption. The most widely used
symmetric key cipher is the Advanced Encryption Standard (AES), which was designed
to protect government-classified information.
Asymmetric ciphers - Also known as public key encryption, these types of algorithms
use two different but logically linked keys for encrypting and decrypting data.
Asymmetric cryptography often uses prime numbers to create keys since it is
computationally difficult to factor large prime numbers and reverse-engineer the
encryption. The Rivest-Shamir-Adleman (RSA) encryption algorithm is currently the
most widely used public key algorithm. With RSA, the public or the private key can be
used to encrypt a message; whichever key is not used for encryption becomes the
decryption key.
Today, many cryptographic processes use a symmetric algorithm to encrypt data and
an asymmetric algorithm to securely exchange the secret key.
Advantages
Confidentiality - Encryption ensures that only authorized parties can access the
encrypted data. It helps protect sensitive information such as personal data, financial
records, and trade secrets from unauthorized access.
Disadvantages
Data Recovery - Strong encryption can make data recovery difficult or impossible if
encryption keys are lost or inaccessible. This can pose challenges in scenarios such as
recovering data from backups or recovering encrypted files without the decryption key.
Secret Key (Symmetric Decryption) - In symmetric encryption, the same key used for
encryption is also used for decryption. The secure exchange and management of this
secret key are crucial for the security of the communication.
Symmetric Decryption - The symmetric decryption algorithm takes the ciphertext and
the shared secret key, applying the inverse mathematical operations performed during
encryption to transform the ciphertext back into plaintext.
Asymmetric Decryption - The recipient uses their private key to decrypt the ciphertext
that was encrypted with their corresponding public key. The asymmetric decryption
process is computationally more intensive than symmetric decryption.
Uses Cases
Data Access - Decryption is used to access and retrieve information that has been
securely stored or transmitted in encrypted form.
Key management
The security of decryption relies on the secure management and distribution of keys. If
an unauthorized entity gains access to the decryption key, they may be able to reverse
the encryption process and access sensitive information.
Cryptographic Algorithms
Different cryptographic algorithms are employed for encryption and its corresponding
decryption. The choice of algorithms depends on factors such as security requirements,
performance considerations, and the specific use case.