19.1 Cryptography
And this is Module19 – Cryptography, Section 19.1 - Introduction to Cryptography Cryptography is study of secure communication that prevent third parties or...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Turkey under the topic 'bursa deprem'.
About this video
And this is Module19 – Cryptography, Section 19.1 - Introduction to Cryptography
Cryptography is study of secure communication that prevent third parties or the public from reading private messages.
Cryptography means ‘hidden’ ‘writing’ and its features:
– Cryptography is synonymous with encryption, the conversion of readable information to non-readable (Ciphertext) format. Decryption is the reverse process.
– Cryptography takes care of data confidentiality, integrity, authentication and non-repudiation.
– Applications include e-commerce, payment cards, DRM etc.
– Cryptography is a technique of transforming and transmitting confidential data in an encoded way so that only authorized and intended users can obtain or work on it.
– Cryptanalysis is process of breaking the work of cryptography.
– Cryptology is the study of cryptography and cryptanalysis both.
In cryptography, a cipher or Code is an algorithm for performing encryption or decryption.
Modern encryption methods can be divided by two criteria:
– by type of key used
– by type of input data
Classical Ciphers: Ciphers written hard using simple substitutions of a letter code or a word.
– 20th century, electro-mechanical machines were invented to do encryption and decryption using transposition, polyalphabetic substitution.
– Secret communication requirement is there since age and methods vary as per need of the times.
– Symmetric key algorithms (Private-key cryptography), where the same key is used for encryption and decryption.
– Asymmetric key algorithms (Public-key cryptography), where two different keys are used for encryption and decryption.
By type of input data
– Block ciphers, which encrypt block of data of fixed size
– Stream ciphers, which encrypt continuous streams of data
Symmetric key algorithm
– In symmetric key algorithms same key is used for encryption and decryption. (e.g., DES and AES)
– The sender and receiver must have a shared key in advance exchanged secretly.
– Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key.
– Symmetric key ciphers are implemented as either block ciphers or stream ciphers.
– A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher.
– Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs.
In asymmetric key algorithms two different keys are used for encryption and decryption. (e.g. RSA)
There are two separate keys:
– a public key is published and enables any sender to perform encryption
– a private key is kept secret by the receiver and can be used to perform decryption.
Asymmetric systems
- RSA (Rivest-Shamir-Adleman)
- ECC (Elliptic Curve Cryptography)
Symmetric systems
- AES (Advanced Encryption Standard)
- DES (Data Encryption Standard)
Cryptographic hash functions are a third type of cryptographic algorithm.
– They take a message of any length as input, and output a short, fixed length hash, which can be used in a digital signature.
– MD5 is widely used hashing.
– SHA series is more secure than MD5. SHA-2 improves SHA1
– 2012 - NIST announced that Keccak would be the new SHA-3 hash algorithm.
– Cryptographic hash functions are used to verify the authenticity of data retrieved from a source.
Video Information
Views
1.5K
Total views since publication
Duration
6:23
Video length
Published
Nov 2, 2017
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#cbtu #cbtuniversity #java #ethical hacking #hacker #sql injection #cryptrography #cryptanalysis #secure comm #cipher #ciphertext #encryption #decryption #confidentiality #integrity #authentication #repudiation #symmetric key #pki #block cipher #stream cipher #private key #public key #des #3des #aes #rsa #dsa #ecc #hash function #keccak #md5 #sha
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.