5. Cryptography

Keywords

Cryptography

Crypto = hidden secret
graphy = To write

A technique of encrypting (converting) clear text data into a scrambled code. This ensure CIA traids and non-repudation.
The encrypted data is called Ciphertext.

aa155629e7606a1089535529bcdbb3ea.png

Types

  1. Symmetric Cryptography
    It is based on a shared secret (key) that is used for both encryption as well as decryption. Both parties share the same key. Ex: DES,3DES,AES

6fd1c9cb086405a150fae4046851475e.png

  1. Asymmetric / Public key Cryptography
    In it 2 keys are used.
    Public key - known to everyone
    Private key - kept as secret - known to owner only
    Only Private key can decrypt something encrypted with public key and vice versa.
    Ex: RSA,DSA,Diffie-Hellman Algorithm

3c40f3882dd99f3dfb71bcfff65dc55c.png

Digital Certificates

They verify that a particular public key belongs to a certain entity (ownership of the key).
The public key is present inside the digital certificate.

PKI (Public Key Infastructure)

It is a system for the creation, storage, and distribution of digital certificates.

A CA (Certificate or Certification Authority) issues digital certificates.

Root Certificate
It provides the public key and other details of CA (Certificate Authority).

PKI Components: