Cryptography Detailed Overview
Cryptography Detailed Overview
What is Cryptography?
Definition: Cryptography is the art and science of transforming information into a secure
format so only authorized users can access it. It is widely used to secure communications,
verify identities, and ensure data integrity.
Purpose of Cryptography:
1. Confidentiality: Keeps data private, accessible only to intended users.
2. Integrity: Ensures data remains unchanged and genuine.
3. Authentication: Confirms the identity of users or systems.
4. Non-repudiation: Ensures that the sender cannot deny sending a message.
Types of Cryptography
Characteristics:
• Speed: Faster and less computationally intense, making it suitable for encrypting large
amounts of data.
• Key Management: The main challenge is securely sharing the key between parties.
Example: When you encrypt a file with a password, that same password is needed to
decrypt it. Both parties must keep this password safe.
Characteristics:
• Security: Provides strong security for exchanging sensitive information.
• Efficiency: Slower than symmetric methods, so often used for secure key exchange rather
than large data encryption.
How It Works:
Encrypts data in fixed 64-bit blocks, using a 56-bit key. The key is applied in 16 rounds of
substitution and permutation operations to create the ciphertext.
Security:
DES was secure when introduced, but its short key length makes it vulnerable to brute-force
attacks today.
Example Use: DES was extensively used in banking, finance, and government applications.
However, it’s largely replaced due to its vulnerability.
How It Works:
Data is encrypted, decrypted, and then re-encrypted using three DES operations. This
process, though slower, increases security.
Security:
3DES is more secure than DES but is slower and still susceptible to certain modern
cryptographic attacks.
Example Use: 3DES was widely used in financial services, ATM encryption, and legacy
payment systems. It has since been replaced by AES due to efficiency and higher security
standards.
How It Works:
AES works with data blocks of 128 bits and supports key lengths of 128, 192, or 256 bits,
providing flexibility and strong encryption. AES performs operations over multiple rounds
(10, 12, or 14, depending on key size) involving substitution, permutation, and mixing.
Security:
AES is highly resistant to brute-force attacks and is considered secure for most applications.
Example Use: AES is used in online banking, Wi-Fi security (WPA2), VPNs, and many data
encryption applications due to its strength and efficiency.
1. RSA (Rivest–Shamir–Adleman)
Overview: RSA is one of the most popular and widely used asymmetric algorithms, known
for its security based on the difficulty of factoring large prime numbers.
How It Works:
Uses two keys—a public key to encrypt data and a private key to decrypt. The public key is
shared openly, while the private key is kept confidential by the user. Only the private key
can decrypt data encrypted with the public key, ensuring secure communication.
Security:
RSA is secure when key lengths of 2048 bits or more are used. However, it requires more
computational power, making it slower than symmetric algorithms.
Example Use: RSA is used in digital signatures, secure email, and HTTPS for secure internet
connections. For instance, when you access a secure website, RSA helps establish a secure
session by exchanging keys.
3. Email Security
- Email encryption tools like PGP (Pretty Good Privacy) combine symmetric and
asymmetric cryptography to secure email content.
- Example: A user encrypts an email with AES, then securely shares the key with the
recipient using RSA, ensuring the email can only be read by the intended recipient.