0% found this document useful (0 votes)
3 views

L5. Encryption and Decryption Mechanisms

The document discusses encryption and decryption mechanisms, highlighting their importance in protecting data transmitted over the Internet from unauthorized access and tampering. It covers the development of cryptography, various encryption methods, and the functions of encryption technologies, including confidentiality, integrity, authenticity, and non-repudiation. Additionally, it outlines symmetric and asymmetric encryption types, along with common algorithms used in both categories.

Uploaded by

wk092279
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

L5. Encryption and Decryption Mechanisms

The document discusses encryption and decryption mechanisms, highlighting their importance in protecting data transmitted over the Internet from unauthorized access and tampering. It covers the development of cryptography, various encryption methods, and the functions of encryption technologies, including confidentiality, integrity, authenticity, and non-repudiation. Additionally, it outlines symmetric and asymmetric encryption types, along with common algorithms used in both categories.

Uploaded by

wk092279
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Encryption and Decryption

Mechanisms

www.huawei.com

Dr. Qazi Ejaz Ali

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.


Foreword
 Data encapsulated based on the TCP/IP protocol stack is transmitted in
plaintext over the Internet, resulting in potential risks. For example,
passwords and bank account information may be stolen or tampered
with, and users' identities may be impersonated. After encryption and
decryption technologies are applied on the network, transmitted data is
protected to reduce the risk of information being leaked.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 2
Objectives
 Upon completion of this course, you will be able to:

Describe the development of encryption and decryption technologies.

Describe the processes of various encryption and decryption methods.

Understand the mechanisms of encryption and decryption algorithms.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 3
Contents
1. Encryption Technology Development
2. Encryption and Decryption Mechanisms
3. Common Encryption and Decryption Algorithms

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 4
Cryptography
 Cryptography is the conversion of plaintext (data to be hidden) into
ciphertext (unreadable data) using mathematical methods.

Plaintext Key
P K

C=En (K,
P)

Ciphertext
C

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 5
Functions of Encryption Technologies

Confidentiality

Integrity Encryption Authenticity

Non-repudiation

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 6
Functions of Encryption Technologies
 Encryption is the process of making information only readable to
certain receivers and incomprehensible to other users. It achieves this
by enabling the original content to be shown only after the correct key
is used to decrypt the information. Encryption protects data from being
obtained and read by unauthorized users. It prevents interception and
theft of private information over networks. Encryption guarantees the
confidentiality, integrity, authenticity, and non-repudiation of
information.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 7
Functions of Encryption Technologies
 Confidentiality: implemented through data encryption. It allows only
some users to access and read the information, making the information
incomprehensible to unauthorized users. This is the main objective of
encryption. It ensures that only the corresponding receivers can read it
by using mathematical equations.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 8
Functions of Encryption Technologies
 Integrity: implemented through data encryption, hash algorithm, or
digital signature. It ensures that data is not changed (tampered with,
deleted, added, and replayed) by unauthorized users during the
storage and transmission processes. For users that require high-level
security, data encryption alone is not enough, because data can still be
cracked and changed by unauthorized users.
 Authenticity: implemented through data encryption, hash algorithm, or
digital signature. It provides services relevant to the authentication of
the data sender and receiver.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 9
Functions of Encryption Technologies
 Non-repudiation: implemented through symmetric or asymmetric
encryption and digital signature, with the help of trustworthy
registration or certification organizations. It prevents users from
denying things they have said or done.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 10
Encryption Technology Development
Scytale

Caesar
cipher

Rail fence
cipher
Cipher
machine

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 11
Encryption Technology Development
 As a method for information security protection, cryptography is not a
modern invention. It dates back to a long time ago, when human
beings tried to learn how to communicate while keeping their
correspondence confidential. Ancient Greeks might be the first people
to use techniques to encrypt information, which they did prior to the
5th century B.C. They used a rod called a scytale, with a piece of
parchment wrapped around it, on which a message was written. Then
the parchment was sent to the receiver. Anyone who did not know the
diameter of the rod, which was the key in this case, could not
understand the information on the message.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 12
 Parchment is a writing material made from specially prepared untanned
skins of animals.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 13
Encryption Technology Development
 In about 50 B.C., the Roman emperor Caesar invented a method for
encrypting information during times of war, which was later called the
Caesar cipher. The principles are that each letter in the simple text is
replaced by the third letter further along in the alphabet, and the last
three letters in the alphabet are replaced by the first three letters
respectively. For example, after encryption, HuaweiSymantec becomes
KxdzhlvBPdqwhf.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 14
Encryption Technology Development
 Recent encryption technologies were mainly used for military purposes,
such as the War of Independence and the Civil War in the US, and two
World Wars. During the War of Independence in the US, the rail fence
cipher was used. In this method, the simple text is written downwards
and diagonally on successive "rails" of an imaginary fence, then moving
up when we reach the bottom rail. When we reach the top rail, the
message is written downwards again until the whole plaintext is written
out.
 During World War I, Germany wrote codes based on a dictionary. For
example, 10-4-2 means the 2nd word in the 4th paragraph on the 10th
page of a dictionary. In World War II, the most well-known cipher
machine was the Enigma machine used by Germans to encrypt
information.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 15
rail fence cipher

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 16
Contents
1. Encryption Technology Development
2. Encryption and Decryption Mechanisms
3. Common Encryption and Decryption Algorithms

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 17
Types of Encryption Technology
 Symmetric encryption (also called shared-key encryption)
 The same key is used for encryption and decryption.
 Asymmetric encryption

Two different keys are used for encryption and decryption:

The private key is for Decryption.

The public key is used for encryption.

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 18
Symmetric Encryption

Symmetric key Symmetric key

① ② ⑤ ⑥

③ ④
Encryption Decryption

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 19
Asymmetric encryption

public key
private key

① ② ⑤ ⑥

③ ④
Encryption Decryption

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 20
Contents
1. Encryption Technology Development
2. Encryption and Decryption Mechanisms
3. Common Encryption and Decryption Algorithms

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 21
Symmetric Cryptography Algorithms
 Stream cipher

RC4
 Block cipher

DES

3DES

AES

IDEA

RC2, RC5, RC6

Senior Middle1 (SM1), SM4

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 22
Asymmetric Cryptography Algorithms
 Asymmetric cipher algorithms

DH

RSA

DSA

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 23
Hash Algorithm
 Hash algorithm: Converts the input of any length into the output of a
fixed length.
 Common hash algorithms

Message Digest Algorithm 5 (MD5)

Secure Hash Algorithm (SHA)

Senior Middle 3 (SM3)

Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Page 24

You might also like