Cryptology 101

November 7, 2017 | Views: 4478

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Neal Stephenson said in a novel of his called Cryptonomicon:

“How long do you want these messages to remain secret?[…] I want them to remain secret for as long as men are capable of evil.”

One cannot underestimate the importance of cryptology nowadays. As the need for studying and implementing secure communication techniques rise, in the assumption of the constant existence of attackers with malicious intents, especially with the growing global force eager to preserve the privacy of user’s data and government secrets at all costs. Studying these techniques can also be for the purpose of breaking secure communication in order to be able to read or alter ciphertext due to finding weaknesses in one of the cryptosystem parts.

The terminology cryptography consists of two contrary fields:

 

Cryptography:

It is the group of techniques used for the purpose of conducting secure communications and mitigating the risks of MITM attacks in the presence of third parties (communications in the wild/ insecure channels e.g the Internet).

In present times, cryptography is referred to as ‘encryption’. Actually, encryption represents nothing but a part of the overall cryptosystem as cryptography is composed of encryption (transforming plaintext to an unreadable format by humans or machines without the corresponding cipher aka. cipher or encryption algorithms or codes) and decryption which is the reverse process.

Cryptanalysis:

It is the study of a cryptosystem in the desire of identifying its hidden aspects and crack it all the way to access plaintext without knowing the decryption key. This can be done by not only analyzing the used algorithms to determine the used cipher and key but also by scanning for weaknesses in their implementation and exploiting them as they get increasingly harder and more complex to keep up with more modern sophisticated ciphers.

Terminology:

Although cryptology as a field is seeing a great evolution in cryptography and cryptanalysis, the terminology remains the same as the cryptosystems’ components are constant.

  • Plaintext: It is the messaged being sent and wanted to be changed for privacy/security purposes. It should be understandable by both parties (sender and receiver) and contains data which is mostly not meant to be disclosed or intercepted in its raw format.
  • Cipher/Cypher:  It is a type of algorithms used for performing an encryption or decryption process conserving the length between the input (plain-text) and the output (cipher-text).
  • Encryption/Decryption algorithm: Has the same concept as the cipher with the exception that the length varies between plaintext and ciphertext.
  • Encryption/Decryption keys: For security purposes, algorithms use d in encryption and decryption became public (e.g: RSA) with a variable key. A  key is a generated parameter used in the transformation of data (encrypt/decrypt). The use of the same key in encryption and decryption makes the used algorithm symmetric, and if it’s not the same then the used algorithm is asymmetric.

 

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
3 Comments
  1. Register for? Sorry I didn’t understand you

  2. It’s so shallow…

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel