Cryptology

Read Complete Research Material

CRYPTOLOGY

SSL and HTTPS

SSL and HTTPS

Introduction

The emergence of communication networks, particularly the Internet, has opened new possibilities for information exchange. At the same time, there are increasing threats to the security of information transmitted. It is therefore, necessary to create different mechanisms intended to ensure the confidentiality and authenticity of electronic documents, all part of a new technology called cryptography. It addresses the issue of computer network security, specifically the different variants crypto: symmetrical and asymmetrical. It explains some key management schemes and public private: RSA and PGP. Finally, we address some of the limitations of the solutions offered by this new discipline.

If part of the view that security is concerned with the protection of property, it seems natural to establish what IT assets to protect. At first glance, it may be said that these are the hardware, software and data. Among them, those most at risk are those data. Depreciate rapidly, its shelf life is usually short and loses their value before the hardware, whose lifetime is estimated at 2 or 3 years, and the software sometimes with appropriate maintenance, can operate for more 5 years (Bruen, Hirschfeld, Wehlau, 2011, pp. 265-278).

Cryptology

Cryptography is a branch of mathematics that, by orienting to the world of digital messages, provides the tools to solve problems related to the authenticity and reliability. The issue of confidentiality is commonly linked with techniques known as "encryption" and authenticity with techniques known as "digital signature", although the solution of both really comes down to the implementation of cryptographic procedures encryption and decryption.

Cryptography is divided into two main branches, the private key cryptography or symmetric and public key cryptography or asymmetric. The first refers to the set of methods that allow secure communication between the parties provided that previously exchanged the corresponding key, called the symmetric key. The symmetry means that the parties have the same key to both encrypt and decrypt. The system also face some issues sometimes, Cryptographic algorithms tend to degrade over time. As time passes, the encryption algorithms are easier to break due to the advancement of speed and power of computer equipment. All cryptographic algorithms are vulnerable to brute-force attacks that deal systematically with every possible encryption key, looking for collisions for hash functions, factoring large numbers, etc. Brute force is easier to apply as time goes (William, 2006, pp. 45-49).

First Private key Cryptography

This method of data encryption (also called symmetric cryptography, or secret-key cryptography} is known for a long time. Simplest ciphers of this adjustment is based on the letters by a certain, predetermined schedule. Data are encrypted in this way in antiquity - eg Julius Caesar used the cipher based on this scheme to transmit orders to his troops.The general scheme of all such algorithms is as follows:• The parties agree the key (s) used to encrypt / decrypt data.(Frequently the same key is used both for encryption and decryption, but it is not a rule).• Later, the use of keys agreed to exchange data, possibly changing them from time to time.More advanced symmetric ciphers used today are based on operations on bits. The most well-known DES algorithm is used, among others to encrypt passwords on UNIX ...
Related Ads