- Four Areas:
- Encryption
- to scramble, mix up, or change the data in such a way that makes certain people unable to read it
- Nonrepudiation
- the process that guarantees that the data is the same as orginally sent and that it came from the source you think it should have come from
- authentication
- to verify that whoever accesses the data is the person you want accessing that data
- authorization
- defines what a person accessing the data can do with that data
Encryption
- plaintext: data is in an easily read or viewed industry-wide standard form
- also referred to as cleartext
- cipher: a series of complex and hard to reverse mathematics you run on a string of ones and zeroes to make an new set of seeming meaningless ones and zeros
- complete algorithm: the method used to implement a cipher
- symmetric-key algorithm: any encryption that uses the same key for both encryption and decryption
Symmetric-Key Algorithm Standards
- most algorithms are called block ciphers because they encrypt data in single chunks
- work well when data comes in clearly discrete chunks
- stream cipher: takes a single bit at a time and encrypts quickly
- Data Encryption Standard(DES)
- used a 64-bit block and a 56-bit block key
- Rivest Cipher 4(RC4):
- Advanced Encryption Standard (AES)
- a block cipher
- uses 128-bit block size
- uses 128-, 192-, and 256-bit key size
Asymmetric-Key Algorithm Standards
- Public-Key Crytography:
- allowed keys to be exchanged securely
- Ribest shamir Adleman(RSA)
- fully functional algorithm that enabled secure digital signatures
No comments:
Post a Comment