ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Cryptography and Network Security Simplified

Updated on August 26, 2014
cryptography and network security
cryptography and network security

For secure data transmission via Internet or any public network, there is no alternative to cryptography. Many of us either knowingly or unknowingly using cryptic messages while purchasing or transferring money online.Governmental and intelligence agencies around the world use cryptography to transmit message securely through public network. Without cryptography all message in Internet are unsecure. You might be thinking what about the security of email we send daily- no email is secure until email system using data encryption technology. So, whenever you send some confidential business information to your clients, make sure you always use cryptography. In this hub I will discuss little bit of history and basics of cryptography-mainly modern day cryptography. Once you read this hub carefully, you will be confident enough to determine which cryptography to use when, because every crypto algorithm has it strength and weakness

Contents

1. History of cryptography

2. Cryptography Concept

3. Basic goals of cryptography

4. Cryptography Keys

5. Symmetric key algorithm

6. Asymmetric key algorithm

7. Hashing Algorithms

History of cryptography

History suggests that Roman Emperor Julius Caesar was the first in the history, used cryptography to safeguard his messages sent to his generals while he was trying to conquer Europe. Caesar started using cryptography when his messengers were frequently being ambushed while on the way to his deployed military forces. His invented cryptography is now known to modern world as “Caesar Cipher”- in this system of message encryption technique he used to shift letters of his original message only 3 digits to the right. For example in a message if a word start with ‘a’, then he used to write it ‘d’ to keep his original message unintelligible to his enemies. This was very basic and simple cryptography is also known as the ROT3 or rotate 3 or C3 cipher-more generic term is substitution cipher.

Ultra and Enigma-Just before the World War II, German military designed a coding machine to encrypt all the governmental messages-this machine was nicknamed as Enigma. And truly its encoded messages remained enigmatic to the enemies. This machine used a series of rotors to encode a message into a substitution cipher. The only way to decode this message was to use another machine with similar rotor settings. This enigma code was matter of huge frustration to the allied forces during the World War II, because they have no machine like enigma. In an effort to uncover enigma messages, allied forces started a code breaking operation known as “Ultra”. Eventually they become successful when the Police military constructed a prototype of the Enigma. In 1940, the first enigma code was broken by the allied force. At that time Japan also used similar type of cryptography machine called “Japanese Purple Machine”

Cryptography Concept

In crypto world, you will hear the terms like “codes” and “ciphers”. Though many used both codes and ciphers interchangeably, but they are not the same.

When you write a message with you own language, it is just a plaintext. If you want to make you plaintext message to make unintelligible to anyone other than you, then you use a cryptographic algorithm to encrypt the message. Actually, cryptographic algorithms encrypt a plaintext message into a cipher text message. Now, if you send that message to a person he can only read the message if he uses the same algorithm to decrypt it.

Plaintext (your email)>cryptographic system> cipher text…media….cipher text>decryption algorithm>plaintext message.

Goals of Cryptography

Every cryptography has four basic goals-confidentiality, integrity, authentication and nonrepudiation. Every algorithm ensures that these four goals are met while transmitting any digital message.

Confidentiality- this ensures that while transmitting date in a network or Internet, it will remain confidential. No one can read this message except your intended receiver. The two types of key systems in use for confidentiality- public key and secret key.

Integrity-this ensure that a message is not altered in the way of transmission. So, a receiver of the message becomes certain that his received message is identical to the original message- no alteration of message by a third party. This functionality is ensured by digitally signed the original message.

Authentication- this is a very important function of crypto system and it verifies the claimed identity of the users. For instance, Dan wants to communicate with one of your friend, Jim. Jim sends Dan a challenge message by saying that proves your claim by encrypting the message. Then, Dan encrypts the message with his secret key only known to him and Jim. The encrypted message is sent back to Jim and after his verification that the encrypted message matches with the original message, he become sure that he is communicating with Dan.

Nonrepudiation-this gives assurances to the receiver of a message that it actually came from the sender and no one is faking the identity of the sender. This function of cryptography is provided with Public Key System only.

Cryptographic Key

In early day of cryptography, experts used to believe that secrecy of the algorithm will keep it safe from compromising the secrecy of encrypted messages. Unlike that, modern encryption algorithm is open to all for review and the secrecy is maintained by the use of keys. As long as you keep your key secrets, your messages are safe. The strength of the encryption depends of the length the keys-the longer the keys the better the security. As long as the computing power will keep increasing the length of keys also keep going up. Higher computing power will eventually make today’s standard key length obsolete. Once, the 56 bit key of DES algorithm was considered secure, but today 56 bit DES is no more in use. To keep data safe from prying eyes, most of the modern algorithm use 128-bit key.

There are number of cryptographic algorithms used for encryption data and most of all fall into two generic categories- Public Key system and secret key system.

Symmetric Key Algorithm

It is also known as secrecy key or shared key algorithm. Because in symmetric key algorithm a shared key does both the encryption and decryption. Since only one is used for doing everything, so the success of this algorithm depends on two factors-secrecy of the key and its distribution

Strength and weakness of Symmetric Key Algorithm

Strength
Weakness
Faster than asymmetric key algorithm- often 1000 times faster at least
Distribution of the key is the problem. because once a compromised key means a total security leak
Hardware implementation of this algorithm is possible
It does not provide nonrepudiation of data
 
Once a member of a security group leaves a new key must be generated and distributed.

Asymmetric Key Algorithms

It is also known as public key algorithm and it covers up all the weakness found in symmetric key system. In this algorithm, there are two keys-public and private- used for encryption and decryption. Public key is shared to all, and each member of a group had his own private key, which is only known to him. Normally, the public key is used to encrypt the message and private key is used to decrypt the message. The pair combination of public and private key is unique. If a public key is known to outsider also, he cannot decrypt the message because he does not have the other side of the decryption key-the private key-which never being transmitted in the network, always remains inside a computer. So, the thing his if you encrypt a message with the public key and send it to your friend via Internet, then only your friend’s private can open this message, no one else in this world. Thus making a public key encryption system an extremely efficient and confidential crypto system of the world.

Asymmetric key algorithm also provides the functionality of digital signature.

Symmetric and Asymmertic algorithms Comparison

Symmetric
Asymmetric
Single shared key
Key pair sets
Key distribution must be secure
Public key is available to all, only private key need to be secured.
Algorithm not scalable
Scalable algorithm
Bulk encryption
Used for small amount of data encryption, digital signature, digital certificate (CA)
This algorithm provides confidentiality only
It provides Integrity, authenticity, nonrepudiation
 
 

Hashing Algorithms

Hashing is mainly used with digital signature, it provides a fixed length digital digest of a message and it is almost impossible to derive a message from its hash function. It is also very much unlikely that the two messages will generate the same hash function-thus a very effective way to ensure integrity of a message. Most commonly used hash algorithms are:

Message Digest 2 (MD2)

Message Digest 4 (MD4)

Message Digest 5 (MD5)

Secure Hash Algorithm (SHA)

Hash-Based Message Authentication Code (HMAC)

Symmetric Cryptography Algorithms:

  • Data Encryption Standard (DES)
  • Triple DES (3DES),
  • International Data Encryption Algorithm (IDEA),
  • Blowfish
  • Skipjack,
  • Advanced Encryption
  • Standard (AES).

Asymmetric/ public key algorithm

  • Diffie-Hellman
  • RSA Public Key Encryption

Cryptographic algorithm development is a never-ending race as the cryptanalysts are also getting smatter with the advent of higher computer power of decoding secret codes. As a user you do not need any advanced level of knowledge how cryptographic algorithm works in a networked environment. You just need to know the difference between symmetric and asymmetric algorithms so as you can make right choice when to use which one of them to make your digital data transmission both cost effective and secure. Can you guess if you have to send one terabyte of data over a 512Kbps line then which algorithm will be most efficient- you’re right, symmetric key algorithm, because it’s much faster?

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)