Cryptography

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Cryptography is technique of securing information and communications

through use of codes so that only those person for whom the information is
intended can understand it and process it. Thus preventing unauthorized
access to information. The prefix “crypt” means “hidden” and suffix “graphy”
means “writing”

Features Of Cryptography are as follows:


1. Confidentiality: Information can only be accessed by the person
for whom it is intended and no other person except him can access
it.
2. Integrity: Information cannot be modified in storage or transition
between sender and intended receiver without any addition to
information being detected.
3. Non-repudiation: The creator/sender of information cannot deny
his intention to send information at later stage.
4. Authentication: The identities of sender and receiver are
confirmed. As well as destination/origin of information is
confirmed.
Complexity theory aims to identify problems that cannot be solved in
polynomial time. Cryptography aims to construct protocols that cannot be
broken in polynomial time.
Cryptography is much older than computational complexity. People have
been inventing methods for “secret writing” that would be difficult to
decipher for others since they began to write.
Computational complexity theory has three ways to measure the time
complexity of different inputs of the same size:
• Best-case complexity
• Average-case complexity
• Worst-case complexity
Types of Passive attacks are as follows:
• The release of message content
• Traffic analysis

The release of message content –


Telephonic conversation, an electronic mail message, or a transferred file may contain sensitive or
confidential information. We would like to prevent an opponent from learning the contents of these
transmissions.

Passive attack
Traffic analysis –
Suppose that we had a way of masking (encryption) information, so that the attacker even if
captured the message could not extract any information from the message.
The opponent could determine the location and identity of communicating host and could observe
the frequency and length of messages being exchanged. This information might be useful in
guessing the nature of the communication that was taking place.

Traffic analysis

Types of active attacks are as follows:


• Masquerade
• Modification of messages
• Replay
• Denial of Service
The OSI (Open Systems Interconnection) Security Architecture defines
a systematic approach to providing security at each layer

• (Encryption) involves the use of algorithms to transform data into


a form that can only be read by someone with the appropriate
decryption key. Encryption can be used to protect data it is
transmitted over a network, or to protect data when it is stored on
a device.
• Digital signature is a security mechanism that involves the use of
cryptographic techniques to create a unique, verifiable identifier for
a digital document or message, which can be used to ensure the
authenticity and integrity of the document or message.
• Traffic padding is a technique used to add extra data to a network
traffic stream in an attempt to obscure the true content of the
traffic and make it more difficult to analyze.
• Routing control allows the selection of specific physically secure
routes for specific data transmission and enables routing changes,
particularly when a gap in security is suspected
1. Ciphertext-only attack: In a ciphertext-only attack, the cryptanalyst only has
access to the ciphertext. This is the most difficult type of cryptanalysis, as the
cryptanalyst has very little information to work with.

2. Known-plaintext attack: In a known-plaintext attack, the cryptanalyst has access


to at least one pair of plaintext and ciphertext. This gives the cryptanalyst more
information to work with, and makes it easier to break the cipher.

3. Chosen-plaintext attack: In a chosen-plaintext attack, the cryptanalyst is able to


choose the plaintext and obtain the corresponding ciphertext. This gives the
cryptanalyst even more information to work with, and makes it even easier to break
the cipher.

• Linear and differential cryptanalysis opposite of


symmetric and asymmetric
Digital forensics is a branch of forensic science that deals with the collection,
preservation, analysis, presentation, and reporting of digital evidence. It is
used to investigate a wide range of crimes, including computer crime, cybercrime,
and financial crime.

Digital evidence handling is the process of collecting, preserving, and transporting


digital evidence in a way that ensures its integrity and admissibility in court. This
includes taking steps to prevent the contamination or modification of the evidence,
and documenting the chain of custody.

Media forensics is the branch of digital forensics that deals with the recovery and
analysis of digital evidence from storage media, such as hard drives, memory cards,
and USB drives.

Cyber forensics is the branch of digital forensics that deals with the investigation of
cybercrime. This includes investigating computer intrusions, data breaches, and
malware attacks.

Software forensics is the branch of digital forensics that deals with the analysis of
software applications to identify evidence of crimes. This can include analyzing the
code of an application, as well as the data that is stored or used by the application.

Mobile forensics is the branch of digital forensics that deals with the recovery and
analysis of digital evidence from mobile devices, such as smartphones and tablets.

You might also like