Vous êtes sur la page 1sur 8

Encryption Basics

 A readable message is called plaintext.


 An encryption key is a formula used to make
plaintext unreadable.
 The coded message is called ciphertext.
 An encryption technique called rot-13 is used in
chat rooms and Usenet discussions.
 Symmetric key encryption algorithms are
encryption techniques that use the same key to
encrypt and decrypt a message.
 Data Encryption Standard (DES) is a commonly
used encryption system.
The Problem of Key Interception
 Rot-13 is not a secure encryption system.
 Symmetric key encryption systems are
vulnerable to key interception, or having
their key stolen.
 Banks and military agencies use a
complex encryption system called strong
encryption.
Public Key Encryption
 Public key encryption uses two different keys.
 Public key is the encryption key.
 Private key is the decryption key.
 They are used in e-commerce transactions.
 A secure channel for information is provided
when the keys are used.
 The encryption keys are computationally
intensive, they place a heavy burden on the
CPU.
 They are vulnerable to cryptanalysis, or code
breaking.
 Key length is the length (in bits) of an
encryption key.
Public Key Encryption Algorithms
 Numerous public key encryption algorithms
have been developed.
 Diffie-Hellman algorithm

 RSA encryption algorithm

 Fortezza
Digital Signatures and Certificates
 Digital signatures are a technique used to
guarantee that a message has not been
tampered with.
 Digital certificates are a technique used to
validate one’s identity.
 Digital signatures are used with non-encrypted
and encrypted messages.
 A hash key, a mathematical value, is used to
describe the message’s content.
 Digital certificates can be obtained from a
certificate authority (CA).
Public Key Infrastructure (PKI)
 A public key infrastructure is a uniform
set of encryption standards that
specify how public key encryption,
digital signatures, and digital
certificates should be implemented.
Public Security Issues of Strong
Encryption
 Encryption can be used for illegal means as well
as legitimate means.
 Encryption will devastate law enforcement’s ability
to fight crime.
 Public key encryption can also be used in
telephone conversations.
 Law enforcement agencies are asking for laws
enabling them to eavesdrop on encrypted
messages.
 Clipper Chip

 Key escrow plan

 Key recovery
The Academic Angle
 U.S cryptographic researchers lead the
world in cryptography.
 Companies are pressuring the researchers
to not publish their research.
 Copyright management infrastructures
(CMIs) enable vendors of digital media to
track and control the use and copying of
their products.
 The Digital Millennium Copyright Act
(DMCA) imposes stiff penalties for anyone
divulging information about how CMI works.

Vous aimerez peut-être aussi