Overview [1]#
Cryptography
The story#
We often see and use Cryptography where the desire is for Alice to send a Message to Bob in presence of (the adversaries) Eve and Mallory.is the practice and study of hiding information. In modern times, cryptography is considered a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography.[1]
In Cryptography discussions we typically make a Computational Hardness Assumption.
Cryptography Objectives#
There are some differing opinions on Cryptography ObjectivesCryptography and Security#
"Security is only as strong as the weakest link, and the mathematics of Cryptography is almost never the weakest link. The fundamentals of Cryptography are important, but far more important is how those fundamentals are implemented and used. Arguing about whether a key should be 112 bits or 128 bits long is rather like pounding a huge stake into the ground and hoping the attacker runs right into it. You can argue whether the stake should be a mile or a mile-and-a-half high, but the attacker is simply going to walk around the stake. Security is a broad stockade: it’s the things around the cryptography that make the cryptography effective. " - Preface to Practical Cryptography (the 1st Edition)Major Types of Cryptography#
- Symmetric Key Cryptography - When using Symmetric Key Cryptography all parties MUST trust each other, because they can read each other's messages.
- Asymmetric Key Cryptography - each participant possesses a private and a public key.
- hybrid cryptosystem -
Cryptographic Systems#
Cryptographic Systems are what provide Cryptography. Taking any Cryptographic Primitive or isolated Cryptography piece will not allow meeting the objectives. Most breaches are caused by a Cryptographically Weakness that has been introduced in the Cryptographic process, often by improper implementation.Cryptographic Hash Functions#
A Cryptographic Hash Function or Message Digest is the output of a Secure Hash Algorithm which permeates a source message of variable length into a highly unique, fixed-length digital fingerprint (signature)
More Information#
There might be more information for this subject on one of the following:- Alice And Bob
- Apple Pay
- Applied Cryptography
- Best Practices OpenID Connect
- Block Cipher
- Bob Blakley
- Book
- CIRCL
- Certificate
- Certificate Authority
- Chip Card
- Cipher Block Chaining
- Ciphertext
- Code_challenge
- Code_verifier
- Computational Hardness Assumption
- CryptoAPI
- Cryptographic
- Cryptographic Module Validation Program
- Cryptographic Primitive
- Cryptographically Weak
- Cryptographically secure pseudorandom number generator
- Cryptosystem
- CurveCP
- CurveZMQ
- DES
- DNSCurve
- Data Encapsulation Method
- Diffie-Hellman
- Digital Key
- Digital Signature
- Distributed Consensus
- DomainKeys Identified Mail
- ECC
- ECDSA
- EMV Terms
- Elliptic Curve
- Elliptic Curve Diffie-Hellman
- Elliptic Curve Digital Signature Algorithm
- Enciphered PIN
- Entropy
- Export-grade
- FIDO Standards
- FLUSH+RELOAD
- FREAK
- Glossary Of LDAP And Directory Terminology
- Gossip protocol
- Grin
- Identify and Authenticate access to system components
- Integrity
- Java Authentication and Authorization Service
- Kerberos
- Key Generation
- Key Management
- Key size
- Key-Exchange
- Keyed-Hash Message Authentication Code
- LeftMenu
- Logjam
- MAC
- Macaroons
- NIST.SP.800-56A
- NSA Suite A Cryptography
- NSA Suite B Cryptography
- Nakamoto consensus
- Network Security Services
- Novell International Cryptographic Infrastructure
- OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
- OTP
- Off-the-Record Messaging
- Offline Data Authentication
- Offset Codebook Mode
- Open Protocol for Access Control, Identification, and Ticketing with privacY
- OpenSSL
- Oracle
- PKCS7
- PSK
- Padded
- Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)
- Pseudorandom function
- Pseudorandom generators
- Public Key Cryptography
- Public-Key Cryptography Standards
- RFC 2347
- RFC 4055
- RFC 4492
- RSA Cryptography
- Ransomware
- Record Protocol
- SSL-TLS Interception
- Secure Socket Layer
- Self-signed Certificate
- Shared Secret
- Side-channel attacks
- Sovrin
- Stellar Ledger
- Supported Groups Registry
- Symmetric Key Cryptography
- TLS 1.3
- Token Binding Protocol
- Token Binding over HTTP
- Trapdoor Function
- Trust Anchor
- United States Cryptography Export-Import Laws
- Verifiable Credentials
- W3C Decentralized Identifiers
- Web Blog_blogentry_170120_1
- Web Blog_blogentry_250719_1
- Web Blog_blogentry_260819_1
- Web Blog_blogentry_300918_1
- WebAuthn Authenticator
- Webtask
- Why OpenID Connect
- X.509
- Zcash
- [#1] - Cryptography
- based on information obtained 2013-04-10