0% found this document useful (0 votes)
13 views5 pages

Important Questions

Uploaded by

kripakbenzeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

Important Questions

Uploaded by

kripakbenzeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Important questions

Digital Signature Algorithm DES


A Digital Signature is a veri cation method made by the recipient to ensure the message was sent
from the authenticated identity. When a customer signs a cheque, the bank must verify that he
issued that speci c cheque. In this case, a signature on a document acts as a sign of
authentication and veri es that the document is authentic.

OR

The DSA (Digital Signature Algorithm) approach involves using of a hash function to create a hash
code, same as RSA. This hash code is combined with a randomly generated number k as an input
to a signature function. The signature function depends on the sender’s private key (PRa) as well
as a set of parameters that are known to a group of communicating principals. This set can be
considered as a global public key (PUG). The output of the signature function is a signature with
two components, s and r. When an incoming message is received, a hash code is generated for
the message. This hash code is then combined with the signature and input into a veri cation
function. The veri cation function depends on the global public key as well as the sender’s public
key (PUa) which is paired with the sender’s private key. The output of the veri cation function
returns a value equal to the signature’s component r, if the signature is valid. The signature
function is designed in such a way that only the sender, with knowledge of the private key, can
produce a valid signature.

Double & Triple DES


>Double DES is an intermediate step that is vulnerable to meet-in-the-middle attacks, providing
limited improvement in security over DES.

>Triple DES (3DES) signi cantly enhances security over DES and Double DES, making it a
practical choice for secure encryption for many years, though it is now being replaced by more
advanced algorithms like AES.

Understanding the operational details and security implications of these cryptographic techniques
is crucial for anyone involved in the eld of information security.

RSA
RSA algorithm is an asymmetric cryptography algorithm. Asymmetric actually means that it
works on two di erent keys i.e. Public Key and Private Key. As the name describes that the
Public Key is given to everyone and the Private key is kept private.

MD5
MD5 (Message Digest Algorithm 5) is a widely used cryptographic hash function that produces a
128-bit (16-byte) hash value. It was designed by Ronald Rivest in 1991 and has historically been
used in various applications, such as digital signatures, message integrity checks, and storing
hashed passwords.

MD5 was once widely used and considered secure, it is now considered obsolete and insecure
due to its susceptibility to collision attacks. It should not be used for security-sensitive
applications or for storing passwords. For such purposes, modern cryptographic hash functions
with stronger security properties like SHA-256, SHA-3, bcrypt, or Argon2 should be used instead.
MD5 is fast and e cient in computation, which made it popular in the past for applications where
speed was important.
ff
fi
fi
ffi
fi
fi
fi
fi
fi
fi
Output Size: MD5 always produces a xed-size output of 128 bits (16 bytes).

Collision Vulnerabilities: MD5 is considered cryptographically broken and insecure against


collision attacks

MD4
MD4 (Message Digest Algorithm 4) is a cryptographic hash function that was developed by
Ronald Rivest in 1990. It generates a xed-size 128-bit hash value from variable-length input data.
MD4 was once widely used but is now considered insecure and should not be used in new
cryptographic designs or implementations. It has been superseded by more secure hash
functions such as SHA-256, SHA-3, and others recommended by modern cryptographic
standards.

Output Size: The output of MD4 is always 128 bits (16 bytes).

Security: MD4 is no longer considered secure against well-funded attackers due to vulnerabilities
discovered in the algorithm.

N Hash

Asymmetric Cryptography & Symmetric Cryptography


Cryptography is the practice and study of techniques for securing communication and data in the
presence of adversaries. Two fundamental types of cryptography are symmetric and asymmetric
cryptography. Here's a detailed comparison of the two:

### Symmetric Cryptography

#### Overview:
- **Symmetric Key Cryptography**, also known as secret-key or private-key cryptography, uses
the same key for both encryption and decryption.

#### Characteristics:
- **Single Key Usage:** The same key is used for both encryption and decryption.
- **Speed:** Generally faster than asymmetric cryptography.
- **Key Distribution:** Secure key distribution can be challenging because the same key must be
shared between the sender and the receiver without being intercepted.
- **Common Algorithms:** Examples include Advanced Encryption Standard (AES), Data
Encryption Standard (DES), and Triple DES (3DES).

#### Use Cases:


- **Bulk Data Encryption:** Ideal for encrypting large amounts of data quickly.
- **Encrypting Data at Rest:** Used for securing stored data, such as les on a disk.

#### Strengths:
- **Performance:** Faster encryption and decryption processes.
- **E ciency:** Less computationally intensive, making it suitable for large datasets.

#### Weaknesses:
- **Key Management:** The need to securely distribute and manage the keys is a signi cant
challenge.
- **Scalability:** Not well-suited for environments where a large number of users need to
communicate securely with each other, as each pair of users would require a unique key.

### Asymmetric Cryptography

#### Overview:
ffi
fi
fi
fi
fi
- **Asymmetric Key Cryptography**, also known as public-key cryptography, uses a pair of keys: a
public key and a private key. The public key encrypts data, while the private key decrypts it.

#### Characteristics:
- **Two Keys:** One key is used for encryption (public key), and a di erent key is used for
decryption (private key).
- **Public and Private Keys:** The public key can be shared openly, while the private key remains
con dential.
- **Common Algorithms:** Examples include RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve
Cryptography), and DSA (Digital Signature Algorithm).

#### Use Cases:


- **Secure Key Exchange:** Allows secure exchange of symmetric keys over an insecure channel.
- **Digital Signatures:** Veri es the authenticity and integrity of a message or document.
- **Secure Communications:** Used in protocols like SSL/TLS for secure web communications.

#### Strengths:
- **Security:** Eliminates the need to share the private key, reducing the risk of key compromise.
- **Scalability:** Better suited for environments with many users, as public keys can be freely
distributed.

#### Weaknesses:
- **Performance:** Slower than symmetric cryptography due to more complex mathematical
operations.
- **Resource Intensive:** Requires more computational power, making it less suitable for
encrypting large amounts of data directly.

### Combined Usage


In many systems, symmetric and asymmetric cryptography are used together to leverage the
strengths of both. This approach is common in secure communication protocols like SSL/TLS,
where asymmetric cryptography is used to securely exchange a symmetric key, which is then
used for the bulk of the data encryption due to its e ciency.

### Summary
- **Symmetric Cryptography:** Faster and e cient for large data but requires secure key
distribution.
- **Asymmetric Cryptography:** More secure key management and scalability but slower and
resource-intensive.
- **Hybrid Approaches:** Combine the strengths of both to create more secure and e cient
systems.

Various Protocols - Adjudicated,Arbitrated, Self Enhancement


Protocols
> An adjudicated protocol in cryptography involves a trusted third party, called an adjudicator,
who resolves disputes between participants. This protocol ensures fairness and correctness in
situations where participants might disagree. Common applications include digital contract
signing, secure multiparty computation, electronic voting, and digital cash systems. The
adjudicator examines evidence and makes binding decisions, reducing the need for mutual trust
among participants but adding complexity and reliance on a trustworthy adjudicator.

> An arbitrated protocol in cryptography involves a trusted third party, called an arbitrator, who
oversees and facilitates interactions between participants to ensure security and resolve disputes.
The arbitrator can verify actions, mediate communication, and enforce protocol rules, providing an
extra layer of trust and correctness in scenarios like digital contract signing, secure
communication, and electronic transactions. This reliance on an arbitrator adds security but also
introduces a single point of trust and potential complexity.
fi
fi
ffi
ffi
ff
ffi
> Self-enhancement protocols in cryptography refer to mechanisms that enable cryptographic
systems to improve their security and functionality autonomously over time. These protocols
typically involve adaptive methods to strengthen encryption, update keys, and address
vulnerabilities without external intervention, ensuring the system remains robust against evolving
threats. The primary goal is to maintain high security levels and adapt to new challenges in the
cryptographic landscape.

Link by Link Encryption


Link-by-link encryption in cryptography is a method where data is encrypted and decrypted at
each hop or node along its transmission path. Each intermediate node (like routers and switches)
decrypts incoming data to read the address information, then re-encrypts it before sending it to
the next node. This ensures the data remains protected at each stage of its journey, though it is
brie y exposed at each intermediate point.

### Key Characteristics:


- **Intermediate Decryption:** Each node decrypts and then re-encrypts the data.
- **Security:** Provides protection over each segment of the communication path.
- **Address Information:** Intermediate nodes need to read addressing information, necessitating
decryption at each hop.

### Use Cases:


- **Network Security:** Often used in wide area networks (WANs) and certain secure
communication protocols.
- **Data Integrity:** Ensures data is encrypted during transmission, reducing the risk of
interception at each link.

### Advantages:
- **Segmented Security:** Ensures encryption over each network segment.
- **Manageability:** Allows for e cient network tra c management and routing.

### Disadvantages:
- **Exposure at Nodes:** Data is vulnerable at each intermediate node where it is decrypted.
- **Complexity:** Requires more processing power and can introduce latency due to repeated
encryption and decryption.

Link-by-link encryption contrasts with end-to-end encryption, where data is encrypted at the
source and remains encrypted until it reaches the nal destination.

End to End Encryption


End-to-end encryption (E2EE) in cryptography ensures that data is encrypted at the source and
remains encrypted until it reaches the intended recipient. Only the communicating parties can
decrypt and access the data, preventing intermediaries or third parties from reading the content.

### Key Characteristics:


- **Source to Destination:** Data is encrypted by the sender and only decrypted by the intended
recipient.
- **Intermediary Security:** Intermediary nodes (e.g., servers, routers) cannot decrypt the data,
enhancing privacy.
- **User Control:** Only the communicating users hold the encryption keys.

### Use Cases:


- **Secure Messaging:** Used in messaging apps like WhatsApp, Signal, and Telegram to protect
conversations.
- **Email Security:** Applied in secure email services to ensure that only the sender and recipient
can read the email content.
- **File Transfer:** Used in secure le transfer protocols to protect data integrity and
con dentiality.
fi
fl
ffi
fi
fi
ffi
### Advantages:
- **Privacy:** Ensures that data remains con dential from the sender to the recipient.
- **Security:** Protects against eavesdropping and man-in-the-middle attacks by intermediaries.
- **Trust:** Users can trust that their data is not exposed to service providers or network
operators.

### Disadvantages:
- **Complex Key Management:** Requires robust systems for key distribution and management.
- **Limited Interception:** Makes it di cult for network administrators to monitor and lter
malicious content.
- **Device Dependency:** Security depends on the devices and software used for encryption and
decryption being secure.

End-to-end encryption provides a high level of security and privacy for communications, making it
a preferred method for protecting sensitive information in transit.

IDEA
The International Data Encryption Algorithm (IDEA) is a symmetric-key block cipher that was
designed to replace DES and o er a higher level of security. IDEA is a robust and secure
symmetric-key encryption algorithm that has played a signi cant role in the evolution of
cryptographic techniques. Its strong security features and e cient performance have made it a
popular choice for encryption, although it is gradually being overshadowed by newer standards
like AES. Understanding IDEA is crucial for appreciating the development and progression of
cryptographic algorithms over time.

Key Features

1. Symmetric Key Algorithm: Both encryption and decryption are performed using the
same key.
2. Block Cipher: IDEA operates on 64-bit blocks of plaintext and ciphertext.
3. Key Length: IDEA uses a 128-bit key, signi cantly longer than DES’s 56-bit key.
4. Structure: IDEA uses a series of modular arithmetic operations, bitwise XORs, and
shifbts.
ff
ffi
fi
fi
fi
ffi
fi

You might also like