Cryptography history
Historically humans wanted to have a way of keeping some of the information in secrecy. At individual level it was not of a great concern but at institutional level there is so much private data which affects many peoples lives need to be kept safe.
Modern Crypto methods
- Symmetric cryptography
- Asymmetric cryptography
- Hashing
- Message authentication
- Sign/Verify
- Digital certifitcates
Mechanisms:
1. Encryption/Decryption
a) Symmetric encryption
AES, 3DES,
b) Asymmetric
RSA, ECC
2. Key exchange
To maintain secrecy over a network you need a way to exchange keys which going to be used for encrypting/decrypting plain text.
3. MAC: Message authentication:
To make sure message is not changed while transporting over network or some other medium.
4. Digital signatures: This involves asymmetric keys, where private key is used to sign the message. And verify is done using public key.
5. Certificates :
Digital certificate identifies the ownership, issuer and digital signature of the an entity that has verified the certificates contents.
Message security
Network security
Platform security
Crypto accelerator
Trusted platform modules
Hardware security modules
No comments:
Post a Comment