Cryptography

Cryptography history


     Historically humans wanted to have a way of keeping some of the information in secrecy. At individual level it was not of a great concern but at institutional level there is so much private data which affects many peoples lives need to be kept safe. 




Modern Crypto methods

  1. Symmetric cryptography
  2. Asymmetric cryptography
  3. Hashing
  4. Message authentication
  5. Sign/Verify
  6. Digital certifitcates




Mechanisms:
1. Encryption/Decryption
     a) Symmetric encryption
         AES, 3DES,
     b) Asymmetric
          RSA, ECC
2. Key exchange
    To maintain secrecy over a network you need a way to exchange keys which going to be used for encrypting/decrypting plain text.
3. MAC: Message authentication:
   To make sure message is not changed while transporting over network or some other medium.
4. Digital signatures: This involves asymmetric keys, where private key is used to sign the message. And verify is done using public key.
 
5. Certificates :
   Digital certificate identifies the ownership, issuer and digital signature of the an entity that has verified the certificates contents.


Message security


Network security


Platform security




Crypto accelerator
Trusted platform modules
Hardware security modules

No comments:

Post a Comment