Skip links

Cryptography And Network Security

Table of Contents

When discussing cryptography, the goals of the models are to delineate security threats, attacks, and services, and establish their connections with security objectives.

The field of cryptography and network security explores security mechanisms for safeguarding devices. By employing cryptographic techniques to implement these security mechanisms, numerous concepts in network security will be thoroughly examined in this discussion. Continue reading to delve into Cryptography And Network Security.

Security goals

Security goals involve safeguarding an automated information system to achieve relevant objectives, which include ensuring the confidentiality, e-integrity, and availability of information system resources, encompassing hardware, software, information, and data.

Fundamental Security Concepts: The three fundamental security objectives for both data and information and computing services are as follows:

  1. Confidentiality
  2. Integrity
  3. Availability

Implementation Techniques: The actual implementation of security goals involves employing various techniques, including:

  1. Cryptography
  2. Steganography
  3. Watermarking
  4. Hashing

Cryptography

Cryptography, acknowledged as the art and science of concealing messages to enhance secrecy in information security, serves as a fundamental element in computer security. The term “cryptography” is derived from the roots “crypto,” meaning “secret,” and “graphy,” meaning “writing.” It involves the skill of transforming messages to ensure their security and immunity to attacks. Cryptography encompasses three distinct mechanisms: symmetric-key encipherment, asymmetric-key encipherment, and hashing, contributing to the ongoing evolution of this field.

Components of cryptosystem

Plain Text: The original intelligible message or data provided as input to the algorithm.

Encryption Algorithm: Responsible for executing various substitutions and transformations on the plaintext.

Secret Key: A value independent of both the plaintext and the algorithm, influencing the output based on the specific key in use.

Ciphertext: The output, a scrambled message, dependent on both the plain text and the secret key for a given message.

Decryption Algorithm: The reverse of the Encryption Algorithm, utilizing the ciphertext and the secret key to produce the original plain text.

Cryptanalyst: Tasked with decrypting new pieces of ciphertext without additional information, aiming to extract the secret key.A person skilled in analyzing and breaking codes and ciphers is referred to as a cryptanalyst.