Documente Academic
Documente Profesional
Documente Cultură
and
Cryptography
Introduction to Encryption and Cryptography
History
Symmetric encryption incorporates Asymmetric Encryption consists of two Number of Cryptographic Keys
only one key for encryption as well as cryptographic keys. These keys are
decryption. regarded as Public Key and Private Key.
Due to its simplistic nature, both the Because of encryption and decryption Swiftness of Execution
operations can be carried out pretty by two separate keys and the process of
quickly. comparing them make it a tad slow
procedure
8
Encryption and Cryptography
Cryptography and Encryption Protocols
• Protocol: describes how the algorithms should be.
• A sufficiently detailed protocol includes details about data structures and
representations, at which point it can be used to implement multiple,
interoperable versions of a program.
• A cryptographic protocol usually incorporates at least some of these aspects.
o Key agreement or establishment
o Entity authentication
o Symmetric encryption and message authentication material
construction
o Secured application-level data transport
Encryption and Cryptography 9
Cont…
Keying option 1:
o All three keys are independent. Sometimes known as 3TDEA or triple-
length keys.
oThis is the strongest, with 3 × 56 = 168 independent key bits. It is still
vulnerable to meet-in-the-middle attack, but the attack requires 22 × 56
steps.
• In the present, AES is widely adopted and supported in both hardware and
software.
• Till date, no practical cryptanalytic attacks against AES has been discovered.
• Has built-in flexibility of key length, which allows a degree of ‘future-
proofing’.
• Just as for DES, the AES security is assured only if it is correctly implemented
and good key management is employed.