Difference between revisions of "Encryption Notes"

From CSEP590TU
Jump to: navigation, search
 
Line 2: Line 2:
 
= Quotes =
 
= Quotes =
 
* "The level of information security sought in any particular situation should be commensurate with the value of the information and the loss, financial or otherwise, that might occur" [http://en.wikipedia.org/wiki/Information_security]
 
* "The level of information security sought in any particular situation should be commensurate with the value of the information and the loss, financial or otherwise, that might occur" [http://en.wikipedia.org/wiki/Information_security]
* "Cryptography, over the ages, has been an art practised by many who have devised ad hoc techniques to meet some of the information secuirty requirements" http://www.cacr.math.uwaterloo.ca/hac ''(page 6)''
+
* "Cryptography, over the ages, has been an art practised by many who have devised ad hoc techniques to meet some of the information secuirty requirements" [http://www.cacr.math.uwaterloo.ca/hac] ''(page 6)''
* "The objectives of information security cannot solely be achived through mathematical algorithms and protocols alone, but required procedural techniques and abidance of laws to achive the desired result" http://www.cacr.math.uwaterloo.ca/hac ''(page 2)''
+
* "The objectives of information security cannot solely be achived through mathematical algorithms and protocols alone, but required procedural techniques and abidance of laws to achive the desired result" [http://www.cacr.math.uwaterloo.ca/hac] ''(page 2)''
 
= Uses of Encryption =
 
= Uses of Encryption =
 
== Information Security ==
 
== Information Security ==
Line 44: Line 44:
  
 
= Mathematics =
 
= Mathematics =
 
+
* [http://www.google.com/search?hl=en&q=define%3A+Intractable&btnG=Google+Search Intractable problems] provide the fundamentals Cryptography systems
 +
* Bijections are used as the tool for encrypting messages and the inverse transformations are used to decrypt [http://www.cacr.math.uwaterloo.ca/hac/] ''(page 8)''
 +
* A one-way function from X to Y is "easy" to compute for all x in X, but "hard" to find any x in X such that f(x) = y for essential all elements y in the range of f for X. [http://www.cacr.math.uwaterloo.ca/hac/] ''(page 8)''
 +
** I didn't do a very good job transcribing that. ''(JSN)''
 +
** I tend to think of rolling a large rock down a steep hill. ''(JSN)''
 +
* A trapdoor one-way function is a one-way function, that, given some extra information it becomes feasible to find for any given y an x such that f(x) = y.
 +
= Types of Encryption =
 +
== Public Key Cryptography
 +
==
 
= Attacks =
 
= Attacks =
 +
* An adversary

Revision as of 05:15, 8 November 2004

Overview

Quotes

  • "The level of information security sought in any particular situation should be commensurate with the value of the information and the loss, financial or otherwise, that might occur" [1]
  • "Cryptography, over the ages, has been an art practised by many who have devised ad hoc techniques to meet some of the information secuirty requirements" [2] (page 6)
  • "The objectives of information security cannot solely be achived through mathematical algorithms and protocols alone, but required procedural techniques and abidance of laws to achive the desired result" [3] (page 2)

Uses of Encryption

Information Security

Objectives

Information has many objectives.

    • Privacy
    • Data Integrity
    • Entity Authentication (Identification)
    • Message Authentication
    • Signature
    • Authorization
    • Validation
    • Access Control
    • Certification
    • Timestamping
    • Witnessing
    • Receipt
    • Confirmation
    • Ownership
    • Anonymity
    • Non-repudiation
    • Revocation [4] (page 3)
  • Cryptography isn't the only means of providing information security, but rather one set of techniques [5] (page 4)
  • The digital age has changed information security dramatically. In the paper age, making thousands of indistinguishable copies copies of was much more difficult. In a digitial society, a means to ensure information security that is independent of the physical medium is required - security must rely on the digital information itself.[6] (page 3). Alteration and creation of digitial data is also easy.

Mathematics

  • Intractable problems provide the fundamentals Cryptography systems
  • Bijections are used as the tool for encrypting messages and the inverse transformations are used to decrypt [7] (page 8)
  • A one-way function from X to Y is "easy" to compute for all x in X, but "hard" to find any x in X such that f(x) = y for essential all elements y in the range of f for X. [8] (page 8)
    • I didn't do a very good job transcribing that. (JSN)
    • I tend to think of rolling a large rock down a steep hill. (JSN)
  • A trapdoor one-way function is a one-way function, that, given some extra information it becomes feasible to find for any given y an x such that f(x) = y.

Types of Encryption

== Public Key Cryptography ==

Attacks

  • An adversary