Attacks On Cryptosystems

In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from malicious activities such as attacks. Let us consider the types of attacks to which information is typically subjected to. Attacks are typically categorized based on the… Continue reading Attacks On Cryptosystems

Challenge of Symmetric Key Cryptosystem

There are two restrictive challenges of employing symmetric key cryptography. These two challenges are highly restraining for modern day communication. Today, people need to exchange information with non-familiar and non-trusted parties. For example, a communication between online seller and customer. These limitations of symmetric key encryption gave rise to asymmetric key encryption schemes. Asymmetric Key… Continue reading Challenge of Symmetric Key Cryptosystem

Components of a Cryptosystem

The various components of a basic cryptosystem are as follows − For a given cryptosystem, a collection of all possible decryption keys is called a key space. An interceptor (an attacker) is an unauthorized entity who attempts to determine the plaintext. He can see the ciphertext and may know the decryption algorithm. He, however, must never know the… Continue reading Components of a Cryptosystem

Cryptosystems

A cryptosystem is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system. Let us discuss a simple model of a cryptosystem that provides confidentiality to the information being transmitted. This basic model is depicted in the illustration below − The illustration… Continue reading Cryptosystems

Cryptography Primitives

Cryptography primitives are nothing but the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services − The following table shows the primitives that can achieve a particular security service on their own. Note − Cryptographic primitives are intricately related and they are often combined to achieve a… Continue reading Cryptography Primitives

Security Services of Cryptography

The primary objective of using cryptography is to provide the following four fundamental information security services. Let us now see the possible goals intended to be fulfilled by cryptography. Confidentiality Confidentiality is the fundamental security service provided by cryptography. It is a security service that keeps the information from an unauthorized person. It is sometimes… Continue reading Security Services of Cryptography

Context of Cryptography

Cryptology, the study of cryptosystems, can be subdivided into two branches − What is Cryptography? Cryptography is the art and science of making a cryptosystem that is capable of providing information security. Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental… Continue reading Context of Cryptography

Modern Cryptography

Modern cryptography is the cornerstone of computer and communications security. Its foundation is based on various concepts of mathematics such as number theory, computational-complexity theory, and probability theory. Characteristics of Modern Cryptography There are three major characteristics that separate modern cryptography from the classical approach. Classic Cryptography Modern Cryptography It manipulates traditional characters, i.e., letters… Continue reading Modern Cryptography

Evolution of Cryptography

It is during and after the European Renaissance, various Italian and Papal states led the rapid proliferation of cryptographic techniques. Various analysis and attack techniques were researched in this era to break the secret codes. With the advances taking place in this field, government organizations, military units, and some corporate houses started adopting the applications… Continue reading Evolution of Cryptography