Professional Documents
Culture Documents
Topic 7
Cryptography & PKI
Topic Reading
• Interact content.
Cryptography
Confidentiality
• Protect information from casual prying eyes or deliberate attempts to steal.
• Crypto directly addresses this issue by scrambling plain text into something
that only the intended recipient can unscramble.
Crypto Goals 2
Integrity
• Some components of crypto perform verification and validation of data.
Availability
• A major component of the CIA triangle but unfortunately not something
crypto can help with.
Authentication
• Confirmation that the person you think sent the information really
did…clearly important for commercial transactions.
Crypto Goals 4
Non-repudiation
• Ability to prove who signed information & that that signature has not been
spoofed.
• Primitives can be used singularly for some purposes but are usually used
together.
Random Numbers
• For this purpose numbers need only be unpredictable not totally random.
Symmetric Encryption
• That is…
– The time it would take to compute all possible key combinations is so
large that it cannot be achieved within the time frame that the encrypted
information is useful to.
• A hash function (H) takes variable-length blocks of data (M) as input and
outputs a fixed-size hash value.
• h = H(M)
• Primary objective is to ensure data integrity.
Hash value h
(fixed length)
• Provides:
– Confidentiality, integrity, authentication and non-repudiation.
PKI – Explained in 5….
Common Challenges PKI solves….
• MiTM attacks.
• Management of certificates.