FoQ Unit 4
FoQ Unit 4
20SCPC502
FUNDAMENTALS OF QUANTIZATION
UNIT - 04
Introduction to Cryptography:
Cryptography is the science of securing communication and information by transforming data into an unreadable format
(ciphertext) using algorithms and keys. It ensures confidentiality, integrity, authenticity, and non-repudiation of data.
Cryptographic techniques are central to modern security systems, including securing communications, digital signatures, and
data protection.
1. Basics of Cryptography
1.1 Cryptography Concepts
Plaintext: The original readable message or data.
Ciphertext: The scrambled, unreadable output generated from plaintext using encryption.
Encryption: The process of converting plaintext into ciphertext using a cryptographic algorithm and key.
Decryption: The process of converting ciphertext back into plaintext using the appropriate key.
Key: A piece of information used by encryption and decryption algorithms, determining the transformation from plaintext to
ciphertext and vice versa.
1.2 Goals of Cryptography
Confidentiality: Ensuring that the information is accessible only to authorized parties.
Integrity: Ensuring that the information is not altered during transmission or storage.
Authentication: Verifying the identity of the parties involved.
Non-repudiation: Ensuring that a sender cannot deny sending a message.
2. Types of Cryptography
Cryptography can be categorized into two primary types:
2.1 Symmetric Cryptography (Secret-Key Cryptography)
In symmetric cryptography, the same key is used for both encryption and decryption.
Examples of Symmetric Algorithms:
XX YY ZZZZ
oData Encryption Standard (DES): An older algorithm with a 56-bit key, now considered insecure due to its vulnerability to
brute force attacks.
o Advanced Encryption Standard (AES): A widely used and secure algorithm with key lengths of 128, 192, or 256 bits.
o Triple DES (3DES): A variant of DES that applies the algorithm three times to each data block, improving security.
Advantages:
o Faster encryption and decryption.
o Efficient for encrypting large amounts of data.
Disadvantages:
o Key distribution problem: Both sender and receiver need to securely exchange the same key.
o Not scalable for large networks, as each pair of users requires a unique key.
2.2 Asymmetric Cryptography (Public-Key Cryptography)
Asymmetric cryptography uses two keys: a public key for encryption and a private key for decryption.
Examples of Asymmetric Algorithms:
o RSA (Rivest-Shamir-Adleman): Based on the mathematical difficulty of factoring large numbers, it is widely used for
encryption, digital signatures, and key exchange.
o Elliptic Curve Cryptography (ECC): Offers similar security to RSA but with shorter key lengths, making it more efficient.
o Diffie-Hellman (DH): A key exchange algorithm that allows two parties to securely share a secret key over an insecure
channel.
Advantages:
o No need for prior key exchange; the public key can be freely distributed.
o Scalable for large networks.
Disadvantages:
o Slower than symmetric encryption.
o Computationally intensive and requires more processing power.
In symmetric cryptography, securely sharing and managing the secret key is one of the biggest challenges. If the key is intercepted
or stolen, the confidentiality of the encrypted data is compromised.
Key Exchange Protocols: Techniques used to securely exchange keys between parties, such as Diffie-Hellman key exchange.
3.2 Public Key Infrastructure (PKI)
PKI is a framework for managing asymmetric keys and digital certificates. It involves:
Public and Private Key Pairs: Public keys are freely distributed, while private keys remain confidential.
Digital Certificates: Issued by trusted Certificate Authorities (CAs), these certificates verify the identity of users and bind their
public key to them.
5. Digital Signatures
A digital signature is a cryptographic technique used to validate the authenticity and integrity of a message. It uses asymmetric
cryptography and involves the signing process (encryption with a private key) and the verification process (decryption with a
public key).
XX YY ZZZZ
Process:
1. The sender generates a message digest using a hash function.
2. The digest is encrypted with the sender's private key to produce the digital signature.
3. The recipient decrypts the digital signature using the sender's public key and verifies the message's integrity by comparing
the decrypted digest with a newly computed digest of the message.
Applications:
o Verifying the authenticity of documents (e.g., emails, contracts).
o Blockchain transactions.
6. Cryptographic Protocols
Cryptographic protocols are designed to provide secure communication and are built on top of cryptographic algorithms.
They define the rules for how cryptographic techniques should be used to achieve specific security goals.
6.1 SSL/TLS (Secure Sockets Layer/Transport Layer Security)
Purpose: SSL/TLS protocols are used to secure communication over the internet, especially for web browsing (HTTPS).
How it Works:
1. Handshake: Client and server exchange public keys and agree on a symmetric encryption method.
2. Session Establishment: Secure session is established using symmetric encryption for efficiency.
3. Data Transmission: Encrypted communication between client and server.
6.2 IPSec (Internet Protocol Security)
Purpose: A protocol suite for securing IP communications by authenticating and encrypting each IP packet.
Usage: Used in Virtual Private Networks (VPNs).
7. Quantum Cryptography
Quantum cryptography leverages the principles of quantum mechanics to create secure communication channels that are
theoretically immune to interception and decryption.
Quantum Key Distribution (QKD): A method used to securely exchange cryptographic keys using quantum principles, ensuring
that any eavesdropping on the communication can be detected.
XX YY ZZZZ
8. Applications of Cryptography
Secure Communication: Cryptography is essential for securing data in email, messaging apps, and VoIP services.
E-commerce and Banking: Online transactions are secured with cryptographic protocols (e.g., SSL/TLS).
Digital Identity: Authentication mechanisms such as passwords, biometrics, and digital certificates rely on cryptographic
methods.
Blockchain: Cryptography ensures the integrity and security of transactions in blockchain networks.
2. Symmetric Cryptography
2.1 Definition
Symmetric cryptography uses a single key for both encryption and decryption. This is ideal for processing quantized data due to
its computational efficiency.
2.2 Key Characteristics
XX YY ZZZZ
Single Key: Both the sender and receiver share the same key.
Fast Processing: Suitable for large datasets like quantized audio or video streams.
2.3 Common Algorithms
AES (Advanced Encryption Standard): Provides strong encryption with minimal computational overhead. Commonly used in real-
time encryption of quantized data.
DES/Triple DES: Older standards for encrypting digital signals but less secure compared to AES.
2.4 Applications in Quantized Systems
Encrypted Voice Calls: Symmetric encryption secures voice data that has been quantized and transmitted over the network.
Media Streaming: Protects quantized video and audio content from piracy.
Sensor Networks: Secures quantized sensor data in IoT applications.
Advantages
High speed and efficiency for real-time applications.
Easy to implement in hardware for embedded systems.
Disadvantages
Key distribution is challenging and requires a secure channel.
3. Asymmetric Cryptography
3.1 Definition
Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption.
3.2 Key Characteristics
Key Pair: Public key can be shared openly, while the private key is kept secret.
Security Through Complexity: Relies on mathematical problems like factoring large numbers.
3.3 Common Algorithms
RSA: Used for secure key exchanges and digital signatures. Useful for establishing secure communication for quantized data.
ECC (Elliptic Curve Cryptography): Provides high security with shorter keys, making it suitable for resource-constrained devices
handling quantized data.
3.4 Applications in Quantized Systems
Key Exchange: Used to securely exchange symmetric keys for encrypting quantized data.
XX YY ZZZZ
Digital Signatures: Ensures the authenticity and integrity of quantized data files.
Cloud Storage: Secures quantized data stored in cloud environments.
Advantages
Simplifies key distribution.
High security, especially for authentication.
Disadvantages
Slower encryption and decryption compared to symmetric methods.
More computationally intensive.
5. Practical Considerations
Key Management:
o Symmetric keys must be protected using secure key exchange methods.
o Asymmetric keys require robust infrastructure like Public Key Infrastructure (PKI).
Latency:
o Symmetric methods are preferred for real-time quantized data due to low latency.
o Asymmetric methods are used only for initial key exchanges or authentication.
Hardware Implementation:
o Symmetric encryption like AES can be implemented efficiently in hardware for high-speed processing of quantized signals.
o Asymmetric encryption requires specialized processors or coprocessors.
XX YY ZZZZ
7. Summary Table
Aspect Symmetric Asymmetric Application in
Cryptography Cryptography Quantized Systems
Keys Single shared key Public and private key pair Key exchange (asymmetric) +
data encryption (symmetric).
2. Basic Principles
Cryptographic hash functions are used in scenarios requiring data integrity, authentication, and digital signatures. Their security
depends on their resistance to pre-image attacks, collision attacks, and other vulnerabilities.
Quantization Connection:
In quantization, hash functions may be used in error detection and data compression verification, ensuring the integrity of
quantized data during transmission or storage.
2. Digital Signatures:
o Hash functions are used to create a message digest, which is then signed using a private key in asymmetric cryptography.
3. Password Hashing:
o Converts passwords into secure hashes for storage in databases.
o Salting is often applied to prevent dictionary attacks.
4. Message Authentication Codes (MACs):
o Hash functions combined with a secret key to authenticate message integrity and origin.
5. Blockchain and Cryptocurrencies:
o Hash functions are used in proof-of-work algorithms and to link blocks securely.
6. Random Number Generation:
o Cryptographic hash functions can be used to generate pseudo-random numbers for secure applications.
7. Performance Metrics
1. Speed:
o How quickly the hash function processes data.
XX YY ZZZZ
2. Security:
o Resistance to pre-image, second pre-image, and collision attacks.
3. Output Length:
o Longer output lengths provide better security but increase computational overhead.
8. Future Directions
Post-Quantum Cryptography: Developing secure protocols resistant to quantum computing attacks.
AI-Driven Security: Enhancing threat detection and adaptive responses in secure communication.
Zero-Trust Architectures: Implementing stricter authentication and verification models.
1. Overview of PKI
PKI is a set of technologies, policies, and procedures for managing cryptographic keys and digital certificates. It ensures secure
communication in digital systems.
Key Components of PKI:
1. Certificate Authority (CA):
o A trusted entity that issues and manages digital certificates.
2. Registration Authority (RA):
o Acts as a mediator between users and the CA, verifying user identities before issuing certificates.
3. Digital Certificates:
o Electronic credentials that associate a public key with the identity of its owner.
4. Public and Private Keys:
o A cryptographic key pair used for encryption and decryption.
5. Certificate Revocation List (CRL):
o A list of revoked certificates that are no longer valid.
6. Directory Services:
o Secure storage for certificates and keys, often implemented as LDAP directories.
2. Digital Certificates
A digital certificate is an electronic document that binds a public key to an individual, organization, or device.
Components of a Digital Certificate:
1. Subject Information:
o Details of the certificate owner (e.g., name, email, organization).
2. Public Key:
o The public key corresponding to the owner.
3. Issuer Information:
o Details of the CA that issued the certificate.
4. Serial Number:
o A unique identifier for the certificate.
XX YY ZZZZ
5. Validity Period:
o The start and end dates of the certificate's validity.
6. Signature:
o The CA’s digital signature, ensuring the certificate's authenticity.
Types of Digital Certificates:
Domain Validation (DV): Verifies ownership of a domain.
Organization Validation (OV): Verifies the identity of the organization and domain ownership.
Extended Validation (EV): Provides the highest level of validation for organizations.
3. Digital Signatures
A digital signature is a cryptographic mechanism used to ensure the authenticity and integrity of digital messages and documents.
Properties of Digital Signatures:
1. Authentication: Verifies the sender's identity.
2. Integrity: Ensures the message has not been altered during transmission.
3. Non-Repudiation: Prevents the sender from denying the authenticity of the message.
How Digital Signatures Work:
1. Signing:
o The sender creates a hash of the message and encrypts it using their private key to generate the digital signature.
2. Verification:
o The receiver decrypts the signature using the sender's public key and compares it with the hash of the received message.
Standards for Digital Signatures:
Digital Signature Algorithm (DSA): Used for creating and verifying signatures.
RSA: Commonly used for both encryption and signing.
Elliptic Curve Digital Signature Algorithm (ECDSA): Provides high security with smaller key sizes.
4. PKI Operations
PKI enables secure communication and authentication through the following operations:
4.1 Key Pair Generation
XX YY ZZZZ
5. Applications of PKI
5.1 Secure Communication
SSL/TLS: PKI is the backbone of secure web communications, enabling HTTPS.
Email Security: Digital certificates encrypt and authenticate email messages.
5.2 Authentication
PKI is used for multi-factor authentication, ensuring secure access to systems.
5.3 Document Signing
Digital signatures authenticate legal and financial documents.
5.4 Software Integrity
Code signing certificates verify the authenticity of software and prevent tampering.
6. Advantages of PKI
1. Enhanced Security: Ensures encryption, authentication, and integrity.
2. Scalability: Suitable for large networks.
3. Interoperability: PKI standards enable compatibility across systems.
4. Trust Establishment: Builds trust between communicating parties.
7. Challenges in PKI
1. Complexity: Managing certificates and keys can be cumbersome.
2. Cost: Setting up and maintaining PKI infrastructure is expensive.
XX YY ZZZZ
Summary
1. PKI: A framework for managing keys and certificates to enable secure communication.
2. Digital Certificates: Bind public keys to identities, issued by trusted CAs.
3. Digital Signatures: Ensure authentication, integrity, and non-repudiation.
4. Applications: Used in secure communication, authentication, document signing, and software integrity.
5. Relevance to Quantization: Ensures the security and authenticity of quantized data in digital systems.