170 likes | 185 Views
Encryption Basics. Module 7 Section 2. History of Encryption. Secret - NSA National Security Agency has powerful computers - break codes monitors all communications between US and other countries and within Designs codes and breaks codes. History. 1970 - Developed by Diffie & Hellman
E N D
Encryption Basics Module 7 Section 2
History of Encryption • Secret - NSA • National Security Agency • has powerful computers - break codes • monitors all communications between US and other countries and within • Designs codes and breaks codes
History • 1970 - Developed by Diffie & Hellman • Two mathematically related keys • to encrypt • to decrypt • Knowing the key to encrypt does not help decrypt • Each person has their own key pair
History • The encrypting key can become public • Public key - encrypt • Private key - decrypt • Senders can ID the recipients public key to encrypt yet only the recipient can decrypt it. • No need to transfer secret keys
Cryptography - Making and breaking of secret codes • Translation of the original message into a new incomprehensible one by a mathematical algorithm using a specific KEY • Plaintext - a message or data • Ciphertext - coded text • Decryption - decoding back to plaintext
Encryption Includes: • Coding scheme or cryptographic algorithm • Specific sequence of characters key used by the algorithm
Examples • Cereal box codes • Substitute cipher • Cryptoquip in newspaper
Variations - Symmetric • Use the same key to encrypt and decrypt (secret key) • Requires a more secure system to send the key than the system itself
Public Key Cryptography • Public Keys • Secret key for each pair of parties who wish to communicate privately • key is passed between the parties in a method more secure than the method used for sending the messages
Variations - Asymmetric • Use a key (public key) to encrypt a message • Another (private key) to decrypt it • Requires both keys
Reliability • The longer the key has remained unbroken, the stronger it is likely to be • The longer the key is in use, the more likely someone will be able to discover it • larger amount of info will be compromised • change key frequently
Available Algorithms • DES – Data Encryption Standard • RSA algorithm • PGP – Pretty Good Privacy • IDEA – International Data Encryption Algorithm • Digital Signature
DES - Data Encryption Standard • Developed by IBM • Adopted as a Federal Information Processing Standard • Uses a 56 bit key • Has been broken • To extend life - extend key to 128 bits • or triple DES
RSA algorithm • Used in public key cryptography • Patented in US • Based on multiplication of large prime numbers
PGP - Pretty Good Privacy • Based on RSA • Used for protecting E-Mail • Free • Distributed on Internet • Developed by Zimmerman for use with E-Mail
IDEA - International Data Encryption Algorithm • 1991 in Switzerland • Uses 128 - bit key • More mathematical theory than DES
Digital Signature • Add a statement of acceptance to the electronic document • encrypted with private key • cyphertext is decrypted with public key • providing any other key produced gibberish • Others can decrypt and read but only the one with the right key is signed