L5. Encryption and Decryption Mechanisms
L5. Encryption and Decryption Mechanisms
Mechanisms
www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 2
Objectives
Upon completion of this course, you will be able to:
Describe the development of encryption and decryption technologies.
Describe the processes of various encryption and decryption methods.
Understand the mechanisms of encryption and decryption algorithms.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 3
Contents
1. Encryption Technology Development
2. Encryption and Decryption Mechanisms
3. Common Encryption and Decryption Algorithms
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 4
Cryptography
Cryptography is the conversion of plaintext (data to be hidden) into
ciphertext (unreadable data) using mathematical methods.
Plaintext Key
P K
C=En (K,
P)
Ciphertext
C
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 5
Functions of Encryption Technologies
Confidentiality
Non-repudiation
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 6
Functions of Encryption Technologies
Encryption is the process of making information only readable to
certain receivers and incomprehensible to other users. It achieves this
by enabling the original content to be shown only after the correct key
is used to decrypt the information. Encryption protects data from being
obtained and read by unauthorized users. It prevents interception and
theft of private information over networks. Encryption guarantees the
confidentiality, integrity, authenticity, and non-repudiation of
information.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 7
Functions of Encryption Technologies
Confidentiality: implemented through data encryption. It allows only
some users to access and read the information, making the information
incomprehensible to unauthorized users. This is the main objective of
encryption. It ensures that only the corresponding receivers can read it
by using mathematical equations.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 8
Functions of Encryption Technologies
Integrity: implemented through data encryption, hash algorithm, or
digital signature. It ensures that data is not changed (tampered with,
deleted, added, and replayed) by unauthorized users during the
storage and transmission processes. For users that require high-level
security, data encryption alone is not enough, because data can still be
cracked and changed by unauthorized users.
Authenticity: implemented through data encryption, hash algorithm, or
digital signature. It provides services relevant to the authentication of
the data sender and receiver.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 9
Functions of Encryption Technologies
Non-repudiation: implemented through symmetric or asymmetric
encryption and digital signature, with the help of trustworthy
registration or certification organizations. It prevents users from
denying things they have said or done.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 10
Encryption Technology Development
Scytale
Caesar
cipher
Rail fence
cipher
Cipher
machine
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 11
Encryption Technology Development
As a method for information security protection, cryptography is not a
modern invention. It dates back to a long time ago, when human
beings tried to learn how to communicate while keeping their
correspondence confidential. Ancient Greeks might be the first people
to use techniques to encrypt information, which they did prior to the
5th century B.C. They used a rod called a scytale, with a piece of
parchment wrapped around it, on which a message was written. Then
the parchment was sent to the receiver. Anyone who did not know the
diameter of the rod, which was the key in this case, could not
understand the information on the message.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 12
Parchment is a writing material made from specially prepared untanned
skins of animals.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 13
Encryption Technology Development
In about 50 B.C., the Roman emperor Caesar invented a method for
encrypting information during times of war, which was later called the
Caesar cipher. The principles are that each letter in the simple text is
replaced by the third letter further along in the alphabet, and the last
three letters in the alphabet are replaced by the first three letters
respectively. For example, after encryption, HuaweiSymantec becomes
KxdzhlvBPdqwhf.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 14
Encryption Technology Development
Recent encryption technologies were mainly used for military purposes,
such as the War of Independence and the Civil War in the US, and two
World Wars. During the War of Independence in the US, the rail fence
cipher was used. In this method, the simple text is written downwards
and diagonally on successive "rails" of an imaginary fence, then moving
up when we reach the bottom rail. When we reach the top rail, the
message is written downwards again until the whole plaintext is written
out.
During World War I, Germany wrote codes based on a dictionary. For
example, 10-4-2 means the 2nd word in the 4th paragraph on the 10th
page of a dictionary. In World War II, the most well-known cipher
machine was the Enigma machine used by Germans to encrypt
information.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 15
rail fence cipher
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 16
Contents
1. Encryption Technology Development
2. Encryption and Decryption Mechanisms
3. Common Encryption and Decryption Algorithms
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 17
Types of Encryption Technology
Symmetric encryption (also called shared-key encryption)
The same key is used for encryption and decryption.
Asymmetric encryption
Two different keys are used for encryption and decryption:
The private key is for Decryption.
The public key is used for encryption.
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 18
Symmetric Encryption
① ② ⑤ ⑥
③ ④
Encryption Decryption
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 19
Asymmetric encryption
public key
private key
① ② ⑤ ⑥
③ ④
Encryption Decryption
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 20
Contents
1. Encryption Technology Development
2. Encryption and Decryption Mechanisms
3. Common Encryption and Decryption Algorithms
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 21
Symmetric Cryptography Algorithms
Stream cipher
RC4
Block cipher
DES
3DES
AES
IDEA
RC2, RC5, RC6
Senior Middle1 (SM1), SM4
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 22
Asymmetric Cryptography Algorithms
Asymmetric cipher algorithms
DH
RSA
DSA
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 23
Hash Algorithm
Hash algorithm: Converts the input of any length into the output of a
fixed length.
Common hash algorithms
Message Digest Algorithm 5 (MD5)
Secure Hash Algorithm (SHA)
Senior Middle 3 (SM3)
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 24