Cryptography
This is the process of hiding
data from a third party. It is the means of ensuring a secure
movement of data by avoiding adversaries to have access to the data
even if they lay their hands on it. As a potential Ethical hacker,
you will always come across this technology in almost everything you
do, since it has become mandatory in every secured environment.
Encryption is the process of
encoding the data, while decryption is the opposite. Meaning
decryption is the process of getting back the message into its
readable format.
Terminologies in cryptography
- Plaintext/cleartext
- Chipertext
- Algorithms Chipers
- Keys
Plaintext:
This refers to the data which
cryptography tends to protects. It is the information that is sent
across the network. I mean the raw information. Take for example you
have a secret to hide which you don't
want anyone to know and its written in a language that only you can
understand. Even if someone has access to that piece of note he will
understand nothing. The information hidden
in that format
is the plaintext.
Chipertext:
This
is the opposite of the plaintext. When someone has access to the
written document that only you can understand, he has access to the
chipertext. Chipertext
is the encorded message. Lets take for example I want to write my
name i.e. Salim Salisu. Salim Salisu is the plaintext right? So I
decided to hide it that who ever sees it will not understand what I
wrote, by encoding it to $67!w $67!$n. The
$67!w $67!$n is the chipertext.
Algorithms
Chipers:
This
is the steps in which the plaintext is converted to chpertext and
vice-versa.
It
can again be seen as the formula of encoding (encryption) and
decoding (decryption) of the plaintext to chipertext and vice-versa.
Keys:
Keys in cryptography do the same thing with what normal keys does.
They are used to lock and unlocked data. Take for example I am
sending my name in $67!w $67!$n format to someone else. The name
would definitely be useless for him without giving him the clue on
how to unlock it, The secret of decoding the name is the key.
Types of Cryptography
(public-key cryptography)
- Symmetric Algorithms
- Asymmetric Algorithms
Symmetric Algorithms:
This is the type of algorithms
which the encryption key and the decryption
key are all the same. This
type of encryption has its advantages and disadvantages
respectively.
Advantages
of Symmetric encryption
- Easy to use
- extremely secured
- Fast
- It provide authentication
Disadvantages
of symmetric encryption
- When the key is in the wrong hand it can cause a severe damage
- If you have the key, you have access. No additional checking.
Commonly
used Symmetric encryption.
Data Encryption
Standard (DES):
This originally used by the US government in 1977, although it is
still used today but not for any sensitive encryption. It
uses 56bit encryption algorithms. Using
such key in the present technological advancement is never best
practice so be warned!
Triple DES(3DES):
This an upgrade to DES. It is more secured and robust because it uses
3times of the native DES, meaning it is 168bits encryption
algorithms.
Blowfish:
This is a 448bits key encryption algorithms. It is designed to
support the current
32bits and 64nits processor respectively. It is very fast, strong and
simple to design. This
symmetric encryption is designed in
1993 by name Bruce
Schneider.
International Data
Encryption Algorithm (IDEA):
This was initially called improved proposed encryption standard
(IPES). It was designed to
replace the DES encryption algorithm. It
was designed by James Massey of ETH Zurich and Xuejia Lai. This
encryption was released to the public in 1990. It
is used in PGP pretty
good privacy v2.0 after
the encryption in the PGP v1.0 BassOmatic was found insecure.
It
is presently free to be used since its patent expired in 2012.
MARS:
A
finalist in the AES (advance encryption standard) august
1999.
It
was created by IBM. The MARS developers include Don Coppersmith
who was part of the creators of the DES in 1970s. This
encryption uses 128bits to 256bits.
The
goal of AES is to secure the government sensitive information for a
very long time. The
National Institute of Standards and Technology (NIST) organized the
AES competition.
RC2: This
was originally a trade secret to the RSA labs. It came into the
public in in 1996. This
encryption is 1 to 2048bits wow! But it was limited to 40bits in the
software exported to allow the US government surveillance.
RC4: This
almost the same with the RC2. It came to the public via a newsgroup
posting
1994.
RC5: The
same with RC2 and RC4, the difference
here is RC5 allows user to define its key length.
RC6:
This is another finalist in
the AES competition organized by the NIST. This encrytion supports
128 to 256bits.
Rijndael or AES: since
the DES cannot cop with the evolving of the technology, NIST choose
this as an encryption standard to replace the DES. Its algorithms is
very compact and fast. It supports
128, 192 or 256bits key lengths.
Serpent: This
is another AES competition finalist which was created by Ross
Anderson, Eli Biham and Lars Knudsen. It supports 128 to 256 bits
encryption key.
Twofish: This
was developed by Bruce
Schneider
and supports 128 to 256bits encryption key.
It has the previledge to
join the AES competition as a candidate.
To
be continued
Comments
Post a Comment