This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links
Cryptography

Version management

Difference between version and

At line 1 added 32 lines
!!! Overview [1]
[Cryptography|http://en.wikipedia.org/wiki/Cryptography] (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφω, gráphō, "I write", or -λογία, -logia, respectively) s the practice and study of techniques for secure communication in the presence of third parties (called adversaries)
!! The story
We often see and use [{$pagename}] where the desire is for [Alice] to send a [Message] to [Bob] in presence of (the adversaries) [Eve] and [Mallory].
is the practice and study of hiding information. In modern times, cryptography is considered a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography.[1]
In [{$pagename}] discussions we typically make a [Computational Hardness Assumption].
!! [Cryptography Objectives]
There are some differing opinions on [Cryptography Objectives]
!! [{$pagename}] and [Security]
"''[Security] is only as strong as the weakest link, and the mathematics of [{$pagename}] is almost never the weakest link. The fundamentals of [{$pagename}] are important, but far more important is how those fundamentals are [implemented|Implementation] and used. Arguing about whether a key should be 112 bits or 128 bits long is rather like pounding a huge stake into the ground and hoping the [attacker] runs right into it. You can argue whether the stake should be a mile or a mile-and-a-half high, but the [attacker] is simply going to walk around the stake. [Security] is a broad stockade: it’s the things around the cryptography that make the cryptography effective. ''" - Preface to Practical Cryptography (the 1st Edition)
!! Major Types of [{$pagename}]
* [Symmetric Key Cryptography] - When using [Symmetric Key Cryptography] all parties [MUST] [trust] each other, because they can read each other's messages.
* [Asymmetric Key Cryptography] - each participant possesses a private and a public key.
* [hybrid cryptosystem] -
!! Cryptographic Systems
Cryptographic Systems are what provide [{$pagename}]. Taking any [Cryptographic Primitive] or isolated [{$pagename}] piece will not allow meeting the objectives. Most breaches are caused by a [Cryptographically Weak]ness that has been introduced in the Cryptographic process, often by improper implementation.
!! [Cryptographic Hash Functions|Cryptographic Hash Function]
A [Cryptographic Hash Function] or [Message Digest|Message-Digest] is the output of a [Secure Hash Algorithm] which permeates a source message of variable length into a highly unique, fixed-length [digital fingerprint (signature)|http://en.wikipedia.org/wiki/Digital_signature]. [Cryptographic Hash Functions|Cryptographic Hash Function] cannot be used to reconstitute the original message but can be used by one participant to prove that another participant possesses some secret material (for example, a password). This proof can then be used to establish an identity.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Cryptography|Wikipedia:http://en.wikipedia.org/wiki/Cryptography|target='_blank'] - based on information obtained 2013-04-10