Cryptology
Cryptology
InformationSecurity,
Fourth Edition
Yet it may roundly be asserted that human ingenuity cannot
concoct a cipher which human ingenuity cannot resolve.
Chapter 8
Cryptography
• Encryption is the process of converting a message into a form
that is unreadable to unauthorized individuals.
• The science of encryption, known as cryptology, encompasses
cryptography (making and using encryption codes) and
cryptanalysis (breaking encryption codes).
• Cryptology has a long history and continues to change and
improve.
………
• Two basic processing methods are used to convert plaintext data
into encrypted data—bit stream and block ciphering. The other
major methods used for scrambling data include substitution
ciphers, transposition ciphers, XOR function, Vigenère cipher, and
the Vernam cipher.
• The strength of many encryption applications and cryptosystems is
determined by key size. All other things being equal, the length of
the key directly affects the strength of the encryption.
• Hash functions are mathematical algorithms that generate a
message summary, or digest, that can be used to confirm the
identity of a specific message and to confirm that the message has
not been altered.
…….
• Most cryptographic algorithms can be grouped into two broad
categories, symmetric and asymmetric. In practice, most popular
cryptosystems are hybrids that combine symmetric and asymmetric
algorithms.
• Public-Key Infrastructure (PKI) is an integrated system of software,
encryption methodologies, protocols, legal agreements, and third-
party services that enables users communicate securely. PKI
includes digital certificates and certificate authorities.
……….
• Digital signatures are encrypted messages that are independently
verified by a central facility, and which provide nonrepudiation. A
digital certificate is an electronic document, similar to a digital
signature, that is attached to a file to certify that the file is from the
organization it claims to be from and has not been modified from its
original format.
• Steganography is the hiding of information, and while it is not
properly a form of cryptography, like cryptography it is used to
protect confidential information while in transit.
………..
• S-HTTP (Secure Hypertext Transfer Protocol), Secure Electronic
Transactions (SET), and SSL (Secure Sockets Layer) are protocols
designed to enable secure communications across the Internet.
IPSec is the protocol used to secure communications across any IP-
based network such as LANs, WANs, and the Internet.
• Secure Multipurpose Internet Mail Extensions (S/MIME), Privacy
Enhanced Mail (PEM), and Pretty Good Privacy (PGP) are protocols
that are used to secure electronic mail.
• PGP is a hybrid cryptosystem that combines some of the best
available cryptographic algorithms and has become the open source
de facto standard for encryption and authentication of e-mail and
file storage applications.
………..