Difference between revisions of "Encryption Notes"
From CSEP590TU
John.naegle (talk | contribs) |
John.naegle (talk | contribs) |
||
Line 2: | Line 2: | ||
= Quotes = | = Quotes = | ||
* "The level of information security sought in any particular situation should be commensurate with the value of the information and the loss, financial or otherwise, that might occur" [http://en.wikipedia.org/wiki/Information_security] | * "The level of information security sought in any particular situation should be commensurate with the value of the information and the loss, financial or otherwise, that might occur" [http://en.wikipedia.org/wiki/Information_security] | ||
− | * "Cryptography, over the ages, has been an art practised by many who have devised ad hoc techniques to meet some of the information secuirty requirements" http://www.cacr.math.uwaterloo.ca/hac ''(page 6)'' | + | * "Cryptography, over the ages, has been an art practised by many who have devised ad hoc techniques to meet some of the information secuirty requirements" [http://www.cacr.math.uwaterloo.ca/hac] ''(page 6)'' |
− | * "The objectives of information security cannot solely be achived through mathematical algorithms and protocols alone, but required procedural techniques and abidance of laws to achive the desired result" http://www.cacr.math.uwaterloo.ca/hac ''(page 2)'' | + | * "The objectives of information security cannot solely be achived through mathematical algorithms and protocols alone, but required procedural techniques and abidance of laws to achive the desired result" [http://www.cacr.math.uwaterloo.ca/hac] ''(page 2)'' |
= Uses of Encryption = | = Uses of Encryption = | ||
== Information Security == | == Information Security == | ||
Line 44: | Line 44: | ||
= Mathematics = | = Mathematics = | ||
− | + | * [http://www.google.com/search?hl=en&q=define%3A+Intractable&btnG=Google+Search Intractable problems] provide the fundamentals Cryptography systems | |
+ | * Bijections are used as the tool for encrypting messages and the inverse transformations are used to decrypt [http://www.cacr.math.uwaterloo.ca/hac/] ''(page 8)'' | ||
+ | * A one-way function from X to Y is "easy" to compute for all x in X, but "hard" to find any x in X such that f(x) = y for essential all elements y in the range of f for X. [http://www.cacr.math.uwaterloo.ca/hac/] ''(page 8)'' | ||
+ | ** I didn't do a very good job transcribing that. ''(JSN)'' | ||
+ | ** I tend to think of rolling a large rock down a steep hill. ''(JSN)'' | ||
+ | * A trapdoor one-way function is a one-way function, that, given some extra information it becomes feasible to find for any given y an x such that f(x) = y. | ||
+ | = Types of Encryption = | ||
+ | == Public Key Cryptography | ||
+ | == | ||
= Attacks = | = Attacks = | ||
+ | * An adversary |
Revision as of 05:15, 8 November 2004
Contents
Overview
Quotes
- "The level of information security sought in any particular situation should be commensurate with the value of the information and the loss, financial or otherwise, that might occur" [1]
- "Cryptography, over the ages, has been an art practised by many who have devised ad hoc techniques to meet some of the information secuirty requirements" [2] (page 6)
- "The objectives of information security cannot solely be achived through mathematical algorithms and protocols alone, but required procedural techniques and abidance of laws to achive the desired result" [3] (page 2)
Uses of Encryption
Information Security
- Encryption is one means to achive information security
Objectives
Information has many objectives.
- Privacy
- Data Integrity
- Entity Authentication (Identification)
- Message Authentication
- Signature
- Authorization
- Validation
- Access Control
- Certification
- Timestamping
- Witnessing
- Receipt
- Confirmation
- Ownership
- Anonymity
- Non-repudiation
- Revocation [4] (page 3)
|
|
|
- Cryptography isn't the only means of providing information security, but rather one set of techniques [5] (page 4)
- The digital age has changed information security dramatically. In the paper age, making thousands of indistinguishable copies copies of was much more difficult. In a digitial society, a means to ensure information security that is independent of the physical medium is required - security must rely on the digital information itself.[6] (page 3). Alteration and creation of digitial data is also easy.
Mathematics
- Intractable problems provide the fundamentals Cryptography systems
- Bijections are used as the tool for encrypting messages and the inverse transformations are used to decrypt [7] (page 8)
- A one-way function from X to Y is "easy" to compute for all x in X, but "hard" to find any x in X such that f(x) = y for essential all elements y in the range of f for X. [8] (page 8)
- I didn't do a very good job transcribing that. (JSN)
- I tend to think of rolling a large rock down a steep hill. (JSN)
- A trapdoor one-way function is a one-way function, that, given some extra information it becomes feasible to find for any given y an x such that f(x) = y.
Types of Encryption
== Public Key Cryptography ==
Attacks
- An adversary