Cryptography:
·
Cryptography or cryptology is the practice and study
of techniques for secure communication in the presence of third
parties called adversaries.
·
More generally, cryptography is
about constructing and analyzing protocols that prevent third parties
or the public from reading private messages.
·
Various aspects in information
security such as data confidentiality, data
integrity, authentication, and non-repudiation are central to
modern cryptography.
·
Applications of cryptography
include electronic commerce, chip-based payment cards, digital currencies, computer
passwords, and military communications.
·
Until modern times,
cryptography referred almost exclusively to encryption, which is
the process of converting ordinary information (called plaintext) into
unintelligible form (called cipher text). Decryption is the reverse,
in other words, moving from the unintelligible cipher text back to plaintext.
·
A cipher (or cypher)
is a pair of algorithms that create the encryption and the reversing decryption.
The detailed operation of a cipher is controlled both by the algorithm and in
each instance by a "key".
·
The key is a secret (ideally
known only to the communicants), usually a short string of characters, which is
needed to decrypt the cipher text. Formally, a "cryptosystem" is the
ordered list of elements of finite possible plaintexts, finite possible cipher
texts, finite possible keys, and the encryption and decryption algorithms which
correspond to each key.
·
There are two kinds of
cryptosystems: symmetric and asymmetric. In symmetric systems
the same key (the secret key) is used to encrypt and decrypt a message. Data
manipulation in symmetric systems is faster than asymmetric systems as they
generally use shorter key lengths.
·
Asymmetric systems use a public
key to encrypt a message and a private key to decrypt it. Use of asymmetric
systems enhances the security of communication.
·
Examples of asymmetric systems
include RSA (Rivest–Shamir–Adleman), and ECC (Elliptic Curve Cryptography).
Symmetric models include the commonly used AES (Advanced Encryption Standard)
which replaced the older DES (Data Encryption Standard).
·
Cryptanalysis is the term
used for the study of methods for obtaining the meaning of encrypted
information without access to the key normally required to do so; i.e., it is
the study of how to crack encryption algorithms or their implementations.
Symmetric Key Cryptography:
·
Symmetric
cipher models also called as secret key cryptography or symmetric key
cryptography.
·
In
symmetric key cryptography, a single key is used for encryption as well as
decryption.
·
As
shown in image sender encrypt plain text using a shared secret key and the
resultant ciphertext is transmitted through a communication medium such as the
Internet, at the receiver side, the ciphertext is decrypted using the same
decryption key to obtain the original plain text.
·
Note
that encryption and decryption process uses a well known symmetric key
algorithm called as Data Encryption Standard (DES).
·
Encryption
of plain text, D (K, E(P)) = Decryption of Plain text using shared key K.
·
For
Example, Stream and block cipher, Data Encryption Standard (DES), Advanced
Encryption Standard (AES) and BLOWFISH.
·
Here
the possibility is that if an attacker/opponent got cipher text?? He/she might
apply different permutations and combinations to decrypt and obtain the
original plain text. Here the main aim of cryptography comes into the picture.
Always sender has to think on applying different encoding technique on plain
text message and convert it into cipher text message so that the attacker
cannot read the actual plain text easily.
Advantages of Symmetric Key Cryptography:
·
A
Symmetric key is faster than asymmetric key cryptography.
·
Because
of single key data cannot decrypt easily at receiver side even if it is
intercepted by the attacker.
·
As
the same key is used for encryption and decryption, a receiver must have the
sender’s key; otherwise he cannot decrypt (without sender permission).
·
Symmetric key
achieves the authentication principle because it checks the receiver’s
identity.
·
DES
and AES techniques are implemented using symmetric key cryptography.
·
System
resources are less utilized in symmetric key cryptography.
Disadvantages of Symmetric Key Cryptography:
·
Once
the key is stolen while transmitting data between sender and receiver it is
very easy to decrypt the message as the same key is used for encryption and
decryption.
·
In
Symmetric key cryptography, a key is transmitted first and then a message is
transferred to the receiver. If the attacker intercepts the communication
between sender and receiver, then he can decrypt the message before it reaches
to intended recipients.
Asymmetric Key Cryptography:
·
Asymmetric
key cryptography is also called as public key cryptography.
·
In
asymmetric key cryptography two keys are used, one for encryption and other for
decryption.
·
As
mentioned asymmetric key cryptography involves the use of two keys one is a
public key that may know to everyone and can be used to encrypt messages, and
verify signatures. Other is private key known only to the receiver of the
message or verifier, used to decrypt messages, and sign (create) signatures.
·
It
is also called as asymmetric key cryptography because one key is used for
encryption only its corresponding key must be used for decryption. No other key
can decrypt the message. The sender and receiver can encrypt messages using an
encryption key (public) or verify signatures, he cannot decrypt messages or
create signatures because he required decryption key (private) which is known
only to the receiver of the message. Public key cryptosystem /asymmetric key
cryptography are shown in image.
·
Mathematically
it is represented as P = D(Kd, E (Ke,P))
·
For
example, sender Ramesh wants to communicate with the receiver Suresh then they
must have each one of this i.e. private key and public key then and then
communication will be successful.
Advantages of Asymmetric Key Cryptography:
·
In
Asymmetric key cryptography, a key cannot be distributed among sender and
receiver as both have their own key, so there is no problem of key distribution
while transmitting the data over the insecure channel.
·
The
main advantage of asymmetric key cryptography is that two separate keys are
used for used encryption and decryption; even if the encryption key is stolen
by attacker he/ she cannot decrypt the message as decryption key is only
available with the receiver only.
·
RSA
algorithm and Diffie Hellman key exchange are implemented using asymmetric key
cryptography.
·
Easy
to use for user and scalable; does not require much administrative work.
Disadvantages of Asymmetric Key Cryptography:
·
Because
of a different key used between sender and receiver require more time to get
the transmission done as compare to symmetric key cryptography. (Slower than
symmetric key cryptography very few asymmetric encryption methods achieve the
fast transmission of data).
· Asymmetric key cryptography utilizes more resource as compare to symmetric key cryptography.
Comparison Chart
Symmetric Encryption |
Asymmetric Encryption |
Single
or same key is used for encryption and decryption. |
Two
keys are used, one is for encryption and other is for decryption. |
Symmetric
key cryptography is also called secret key cryptography or private key cryptography. |
Asymmetric
key cryptography is also called public key cryptography or conventional
cryptographic system. |
Mathematically
it is represented as |
Mathematically
it represented as |
A
Symmetric key is faster than asymmetric key cryptography. |
An
asymmetric key is slower than symmetric key cryptography because of two
different key used. |
For
encryption of large message, asymmetric key cryptography still play an
important role. |
Asymmetric
key cryptography plain text and cipher text treated as integer numbers. |
Symmetric
key cryptography utilizes less resource as compared to asymmetric key
cryptography. |
Asymmetric
key cryptography utilizes more resource as compared to symmetric key
cryptography. |
For
Example AES, DES, and BLOWFISH |
For
Example RSA, Diffie Hellman Key exchange algorithm. |
No comments:
Post a Comment