Documente Academic
Documente Profesional
Documente Cultură
Cryptography
• Cryptography is a means of transforming data in a way that renders it
unreadable by anyone except the intended recipient.
• Every modern computer system uses modern cryptographic methods to
secure passwords stored and provides the trusted backbone for e-
commerce.
• Cryptography has evolved so that modern encryption and decryption use secret keys
Key KA Key KB
Symmetric-Key Cryptography
0 1 0 0 0 0 1 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0 1 0 0 1 0 0 1 0 0 0 1 1 1 0 0 0 0 1 1 0 1 0 0 1
The key:
XOR’d with key
1 1 0 1 0 0 0 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0
1 1 0 1 0 0 0 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0
The ciphertext
yields plaintext
1 0 0 1 0 0 1 0 0 0 1 1 1 0 0 0 0 1 1 0 1 0 0 1
0 1 0 0 0 0 1 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0
• In asymmetric cryptography, each user has two keys: a public key and a
private key.
• The public key is made public. For example, it may be published on a
Web site.
• The private key must be kept secret. It is never shared with anyone.
• The security of the private key in asymmetric cryptography is as important
as key security in symmetric crypto.
Example:
Alice Bob
Digital Signature
• A digital signature is the electronic signature (Certificate) duly issued by
the Certifying Authority that shows the authenticity of the person signing
the same.
• Digital signatures, a form of electronic signatures, are created and verified
using Asymmetric (Public Key) Cryptography that is based on the concept
of a key pair generated by a mathematical algorithm, the public and private
keys.
• Three elements of DSC (Digital Signature Certificate)
o Subject Name and Other Certificate Extensions. This is
information about the object being certified.