The key points of this chapter are to understand the technical details behind encryption, the different types of encryptions, and the history of encryption, and decipher them. There are symmetric and asymmetric encryption algorithms, with symmetric encryption algorithms having the same encryption and decryption keys, asymmetric encryption algorithms having different encryption and decryption keys, and a class of hashing algorithms that don’t require a key. In addition, there is a class of hashing algorithms that do not require a key, and symmetric-key encryption is fast and inexpensive but requires secure distribution of the session key. Public-key encryption does not require a prior key, but they are slow and expensive to use; it takes 100-1000 times longer than symmetric-key encryption, and it is only used for very short messages.
This chapter explain the concept of cryptography, describe in detail of symmetric key encryption, and the importance of key length. It is interesting to know that nearly all encryption for confidentiality uses symmetric key encryption. It is one of the popular encryptions due its fast and efficient processing ability. However, as the power of cryptanalysts’ computers continues to grow, the longer symmetric keys will be needed for strong encryption. In the 1970s, strong symmetric keys only had to be about 56 bits long for symmetric key encryption. Today, symmetric keys need to be at least 100 bits long to be considered strong.
The most important takeaway from this chapter on cryptography was that cryptography is the use of mathematical computations to protect messages traveling between two or more parties. One key point that stood out to me in this reading is the human issues in cryptography. You may think long complex keys and encryption for confidentiality would be always impossible to crack. That has been proved to not be that case especially since sometimes due to human error some people fail to properly encrypt the message or protect the key.
From this article, I learned that cryptography plays an important role in cyberspace security and is the basis for products such as network security, information security, and blockchain. As passwords get better and harder to crack, there is still no such thing as a perfectly secure password.
This chapter explains the concepts of cryptography, details symmetric key encryption, and the importance of key length. Interestingly, almost all confidentiality encryption uses symmetric key encryption. It is one of the popular encryptions due to its fast and efficient processing power. However, as the capabilities of cryptanalyst computers continue to grow, strong encryption will require longer symmetric keys. In the 1970s, strong symmetric keys only needed to be about 56 bits long for symmetric key encryption. Today, symmetric keys need to be at least 100 bits long to be considered strong.
Reading Chapter 3, I learned that symmetric cryptography is a cryptographic method that uses the same key for encryption and decryption. There are two important concepts: group ciphers and stream ciphers. Packet ciphers divide plaintext data into fixed-size chunks and encrypt each chunk using a key. Stream ciphers, on the other hand, encrypt plaintext bit-by-bit or byte-by-byte to produce a ciphertext that is the same length as the plaintext. In addition to the encryption algorithms themselves, Chapter 3 may also cover discussions of key management and security. Keys are a central element in symmetric cryptography, and their management and protection are critical to ensuring the security of encrypted communications.
Although cryptography has come a long way, it suffers from the same weakness as all technological controls: humans. As the textbook explains, “with long enough keys and well-tested ciphers, it is technically impractical to break symmetric key encryption for the sake of secrecy.” However, if the sender or receiver fails to keep the key secret, an eavesdropper could learn the key and read every message.” This chapter explains the concepts of cryptography, describes symmetric key encryption in detail, and the importance of key length. Interestingly, almost all secret encryption uses symmetric keys. Due to its fast and efficient processing power, it is one of the popular encryptions. However, as the capabilities of cryptanalyst computers continue to grow, strong encryption will require longer symmetric keys.
Base on the reading,I realized that as technology advances and cybersecurity threats increase, encryption technology needs to be constantly updated and improved. The future is likely to see the emergence of more efficient and secure encryption algorithms and technologies to meet changing network security needs.
Boyle and Panko’s treatment of cryptography in Chapter 3 may vary in depth and emphasis depending on the target audience and the scope of the book. However, it should provide a solid foundation for understanding cryptographic principles and their practical applications in information security.
Cryptography serves as the cornerstone for various products and technologies, including network security, information security, and blockchain. It operates as a powerful tool in ensuring data confidentiality, integrity, and authenticity in an increasingly interconnected digital landscape.
The article underscores the indispensable role of cryptography in fortifying cyber defenses while also acknowledging the evolving nature of cybersecurity challenges. It serves as a reminder of the ever-present need for robust security measures and proactive approaches to counter emerging threats in our digital age.
Reading Chapter 3, I gained a comprehensive understanding of symmetric cryptography, a cryptographic method utilizing identical keys for encryption and decryption. This chapter delves into two primary concepts: group ciphers and stream ciphers. Group ciphers divide plaintext data into fixed-sized chunks, encrypting each chunk with a key, while stream ciphers encrypt plaintext bit-by-bit or byte-by-byte, resulting in ciphertext of the same length as the plaintext. Beyond encryption algorithms, the chapter explores discussions on key management and security, emphasizing the centrality of keys in symmetric cryptography. Proper key management and protection are paramount in ensuring the confidentiality of encrypted communications.
Despite the significant advancements in cryptography, it remains vulnerable to human fallibility, as highlighted in the textbook. Although long keys and well-tested ciphers make it technically challenging to crack symmetric key encryption, failure to safeguard the key by the sender or receiver can compromise its security. This chapter underscores the importance of cryptography concepts, the intricacies of symmetric key encryption, and the significance of key length. Notably, symmetric keys are prevalent in secret encryption due to their speed and efficiency. However, with the ever-increasing capabilities of cryptanalyst computers, stronger encryption necessitates longer symmetric keys.
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. Cryptography can be broken down into three types: secret key cryptography, public key cryptography and hash functions. Secret Key Cryptography, uses a single key to encrypt data. Both encryption and decryption in symmetric cryptography use the same key, making this the easiest form of cryptography. Examples of Secret Key Cryptography is AES, DES and Ceasar Cipher’s. Public Key Cryptography occurs One key is kept private, and is called the “private key”, while the other is shared publicly and can be used by anyone, hence it is known as the “public key”. Examples of public key cryptography is ECC, Diffie-Hellman and DSS. Hashing Functions. Hash functions are irreversible, one-way functions which protect the data, at the cost of not being able to recover the original message Examples of Hashing Functions are MD5, SHA-1, SHA-2 and SHA-3.
Cryptography is a technique that employs mathematical operations to encrypt messages, ensuring confidentiality. Messages are encrypted using symmetric (AES, RC4, DES, and 3DES) keys and decrypted using the corresponding key. This process keeps messages confidential from eavesdropping attacks, provided the keys and encryption methods remain secure. Among these encryption methods, AES is considered the most efficient. Additionally, a session key is used for communication between two parties through an application, with a different key generated for each session, enhancing reliability. The public key method also maintains message confidentiality, utilizing two types of keys: Public and Private. The public key is shared with others, while the private key is kept secure. Messages are encrypted using the recipient’s public key and decrypted using their private key.
In this chapter, I have learned the importance of ciphers in the encryption and decryption process. There are two main types of ciphers: substitution ciphers and permutation ciphers. In a substitution cipher, the characters are arranged in the same order, but the characters are replaced by other characters. To decrypt the substitution cipher and get the original message, we need a key. In a permutation cipher, the characters themselves remain the same, but the positions of the characters change. Decrypting a permutation cipher requires us to rearrange the characters in a specific order to recover the original message. Both types of ciphers exemplify the key role of ciphers in information security.
This article explores how cryptography is the use of mathematical operations to secure messages that are transmitted between parties or stored on a computer. One key point I’ve noticed is public key encryption, which has two main encryption targets: public key encryption for confidentiality and public key encryption for authentication. The two methods send keys differently. With the continuous development of technology, the threat risk of network security is also constantly changing, and encryption technology and cryptography will continue to progress and develop with The Times, so as to better meet the needs of network security.
Introduction to Cryptography: An overview of the history, importance, and applications of cryptography. Cryptography is used to protect the confidentiality, integrity, and authenticity of data, and it is essential for secure communications over the Internet, financial transactions, and many other areas.
Basic principles of cryptography: Introduces the basic principles of cryptography, including ciphertext and plaintext, encryption and decryption, key and algorithm. It also covers the difference between symmetric and asymmetric encryption.
Symmetric encryption: This section details symmetric encryption algorithms, where the same key is used for encryption and decryption. Common symmetric encryption algorithms include Advanced encryption Standard (AES), Data encryption Standard (DES), and 3DES.
Asymmetric encryption: Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. This type of cryptography allows for secure communication between parties that have not previously exchanged keys. RSA and ElGamal are examples of asymmetric encryption algorithms.
Hash function: This chapter explains the hash function, which is a cryptographic algorithm that takes an input of arbitrary size and produces an output of fixed size, called a hash value. Hash functions are used for data integrity verification, password storage, and digital signatures.
Digital signature: A digital signature is a way to verify the authenticity and integrity of a message. They use asymmetric encryption and hash functions to provide non-repudiation, meaning that the sender cannot falsely claim that they did not send the message.
Public Key infrastructure (PKI): This chapter discusses PKI, which is a system for managing public key distribution and facilitating the use of public key encryption. PKI includes certificate authorities that issue digital certificates that bind public keys to entities.
Cryptographic attacks: The authors provide an overview of common cryptographic attacks, such as brute-force attacks, frequency analysis, and selective plaintext attacks, and discuss ways to prevent or mitigate these attacks.
Cryptographic standards and guidelines: This chapter concludes with a discussion of cryptographic standards and guidelines, such as those issued by the National Institute of Standards and Technology (NIST) and other standards bodies.
The key takeaway from this chapter was understanding the technicalities behind encryption, different types of encryption, the history of encryption, and deciphering them. It was interesting to learn about the different formulas of encryption and how complex they can be, when from a user perspective it’s as simple as hitting “encrypt message.” It was also good to know that encryptions are not automatically protected, user must set up protection and it only works if companies have and enforce organizational processes that do not compromise the technical strengths of cryptography.
Through this chapter, it is learned that organizations can optimize the advantages of cryptography by correctly understanding and utilizing cryptographic standards and suites to protect information transmitted or stored on computers between parties.
The most interesting aspect among them is digital signatures, where the sender uses a hash function to generate an information digest or hash value, and then encrypts the hash value of the information using a private key; The signature behavior means using a private key to encrypt the hash value of information.
Password plays a vital role in cyberspace and is the basis of network security, information security, blockchain and other products. The change of technology makes the password more and more perfect, and the difficulty of cracking is increasing. But any password has its certain risk.
There are four basic goals that we can achieve with cryptosystems: confidentiality, integrity, authentication and non-repudiation. Each of these objectives requires the fulfilment of a number of design requirements, and not all cryptosystems are designed to fulfil all four objectives. Not all cryptosystems are designed to meet all four objectives.
Confidentiality is one of the main goal of cryptography. It protects the secrecy of data at rest and in transit. Integrity assures the receiver of a message that the data has not been altered (either intentionally or unintentionally) from the time it was created has not been altered (either intentionally or unintentionally) from the time it was created to the time it is accessed. Non-repudiation provides irrefutable proof that the sender of a message has actually authorised it that the message sender actually authorised the message. This prevents the sender from later denying that he or she sent the original message.
Understand how cryptosystems achieve the goal of authentication. Authentication provides assurance of a user’s identity. Challenge-response protocols are A scheme for performing authentication that requires a remote user to encrypt a message with a key known only to the participants in the communication.
Both symmetric and asymmetric cryptosystems can perform authentication.
The core of this chapter is an in-depth understanding of the details of encryption technology, the various types of encryption and their development history, and explore decryption methods. There are two types of encryption algorithms: symmetric and asymmetric. Symmetric encryption algorithm uses the same key for encryption and decryption, which has the advantage of high efficiency and low cost, but the premise is to ensure the secure distribution of the session key. Asymmetric encryption algorithms use different keys for encryption and decryption, where the public key does not need to be shared in advance, but the encryption process is relatively slow and expensive, usually 100-1000 times longer than symmetric encryption, so it is mainly used for processing very short messages. In addition, there is a class of hashing algorithms without keys, which also occupy an important position in the field of encryption.
I enjoyed learning about all of the processes that happen within the system that the user is unaware of, such as encrypting an email or the authentication process when logging into a computer or VPN. What stood out to me was the information related to VPNs given the number of individuals that are working virtually and remote access VPNs are a commonly used method of connecting securely to a network. Due to this increase in usage, coupled with the cyber-threat landscape, it is more important than ever to ensure a secure connection. It was also interesting to read about IPsec as it is considered the “gold standard” in VPN security and how the different cryptography means can be layered onto of one another in order to configure the security the way it works best for each individual or organization, balancing the benefits with the costs. For example, since the transport mode is very costly to implement, tunnel mode can be used at a much lower cost, but does not provide the complete end-to-end security that transport mode does. A user or organization can then layer additional security in top such as encrypt the data that is being transmitted and/or implement firewalls or other methods to ensure the security of the site network.
Through reading, I understand the basic concepts, principles and applications of encryption technology. According to the use of the key, the encryption algorithm can be divided into symmetric encryption algorithm and asymmetric encryption algorithm. Symmetric encryption algorithms use the same key for encryption and decryption, while asymmetric encryption algorithms use a pair of keys, one for encryption and the other for decryption. These algorithms have their own advantages and disadvantages and are suitable for different application scenarios. In e-commerce, encryption technology can protect the privacy of both parties and the security of transaction information; In network communications, encryption prevents data from being stolen or tampered with. These application cases fully demonstrate the importance and wide application of encryption technology in modern society. I recognize the important role of encryption technology in protecting information security, as well as the characteristics and application scenarios of different encryption algorithms. This knowledge is of great guiding significance for my future study and work in the field of information security.
I was interested in the emphasis on the human element in cryptography in this chapter. It is very important for organizations to train employees to use their systems properly to reduce the risk of errors that can damage the company.Because of this, security awareness is so important, as human users may be the main reason to let outside users gain access. Not knowing how to handle keys between messages can lead to adverse results. When it comes to cybersecurity, the human element can be very harmful due to the potential for error and conflicts between ethics and purpose. However, this human element can also provide significant benefits to an organization if appropriate training and measures are taken to align employees with the organization’s goals.
SSL/TLS provides opaque transport layer security. In contrast, transparent Internet layer security IPSec operates at the Internet layer. It protects IP packets and everything in the data fields of IP packets. This includes ICMP (Internet Control Message Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol) messages and all applications.
Chun Liu says
The key points of this chapter are to understand the technical details behind encryption, the different types of encryptions, and the history of encryption, and decipher them. There are symmetric and asymmetric encryption algorithms, with symmetric encryption algorithms having the same encryption and decryption keys, asymmetric encryption algorithms having different encryption and decryption keys, and a class of hashing algorithms that don’t require a key. In addition, there is a class of hashing algorithms that do not require a key, and symmetric-key encryption is fast and inexpensive but requires secure distribution of the session key. Public-key encryption does not require a prior key, but they are slow and expensive to use; it takes 100-1000 times longer than symmetric-key encryption, and it is only used for very short messages.
Yuanjun Xie says
This chapter explain the concept of cryptography, describe in detail of symmetric key encryption, and the importance of key length. It is interesting to know that nearly all encryption for confidentiality uses symmetric key encryption. It is one of the popular encryptions due its fast and efficient processing ability. However, as the power of cryptanalysts’ computers continues to grow, the longer symmetric keys will be needed for strong encryption. In the 1970s, strong symmetric keys only had to be about 56 bits long for symmetric key encryption. Today, symmetric keys need to be at least 100 bits long to be considered strong.
The most important takeaway from this chapter on cryptography was that cryptography is the use of mathematical computations to protect messages traveling between two or more parties. One key point that stood out to me in this reading is the human issues in cryptography. You may think long complex keys and encryption for confidentiality would be always impossible to crack. That has been proved to not be that case especially since sometimes due to human error some people fail to properly encrypt the message or protect the key.
Guanhua Xiao says
From this article, I learned that cryptography plays an important role in cyberspace security and is the basis for products such as network security, information security, and blockchain. As passwords get better and harder to crack, there is still no such thing as a perfectly secure password.
Xiaozhi Shi says
This chapter explains the concepts of cryptography, details symmetric key encryption, and the importance of key length. Interestingly, almost all confidentiality encryption uses symmetric key encryption. It is one of the popular encryptions due to its fast and efficient processing power. However, as the capabilities of cryptanalyst computers continue to grow, strong encryption will require longer symmetric keys. In the 1970s, strong symmetric keys only needed to be about 56 bits long for symmetric key encryption. Today, symmetric keys need to be at least 100 bits long to be considered strong.
Yawen Du says
Reading Chapter 3, I learned that symmetric cryptography is a cryptographic method that uses the same key for encryption and decryption. There are two important concepts: group ciphers and stream ciphers. Packet ciphers divide plaintext data into fixed-size chunks and encrypt each chunk using a key. Stream ciphers, on the other hand, encrypt plaintext bit-by-bit or byte-by-byte to produce a ciphertext that is the same length as the plaintext. In addition to the encryption algorithms themselves, Chapter 3 may also cover discussions of key management and security. Keys are a central element in symmetric cryptography, and their management and protection are critical to ensuring the security of encrypted communications.
Shijie Yang says
Although cryptography has come a long way, it suffers from the same weakness as all technological controls: humans. As the textbook explains, “with long enough keys and well-tested ciphers, it is technically impractical to break symmetric key encryption for the sake of secrecy.” However, if the sender or receiver fails to keep the key secret, an eavesdropper could learn the key and read every message.” This chapter explains the concepts of cryptography, describes symmetric key encryption in detail, and the importance of key length. Interestingly, almost all secret encryption uses symmetric keys. Due to its fast and efficient processing power, it is one of the popular encryptions. However, as the capabilities of cryptanalyst computers continue to grow, strong encryption will require longer symmetric keys.
Haoran Wang says
Base on the reading,I realized that as technology advances and cybersecurity threats increase, encryption technology needs to be constantly updated and improved. The future is likely to see the emergence of more efficient and secure encryption algorithms and technologies to meet changing network security needs.
Xinyi Peng says
Boyle and Panko’s treatment of cryptography in Chapter 3 may vary in depth and emphasis depending on the target audience and the scope of the book. However, it should provide a solid foundation for understanding cryptographic principles and their practical applications in information security.
Shuting Zhang says
Cryptography serves as the cornerstone for various products and technologies, including network security, information security, and blockchain. It operates as a powerful tool in ensuring data confidentiality, integrity, and authenticity in an increasingly interconnected digital landscape.
The article underscores the indispensable role of cryptography in fortifying cyber defenses while also acknowledging the evolving nature of cybersecurity challenges. It serves as a reminder of the ever-present need for robust security measures and proactive approaches to counter emerging threats in our digital age.
Zhang Yunpeng says
Reading Chapter 3, I gained a comprehensive understanding of symmetric cryptography, a cryptographic method utilizing identical keys for encryption and decryption. This chapter delves into two primary concepts: group ciphers and stream ciphers. Group ciphers divide plaintext data into fixed-sized chunks, encrypting each chunk with a key, while stream ciphers encrypt plaintext bit-by-bit or byte-by-byte, resulting in ciphertext of the same length as the plaintext. Beyond encryption algorithms, the chapter explores discussions on key management and security, emphasizing the centrality of keys in symmetric cryptography. Proper key management and protection are paramount in ensuring the confidentiality of encrypted communications.
Despite the significant advancements in cryptography, it remains vulnerable to human fallibility, as highlighted in the textbook. Although long keys and well-tested ciphers make it technically challenging to crack symmetric key encryption, failure to safeguard the key by the sender or receiver can compromise its security. This chapter underscores the importance of cryptography concepts, the intricacies of symmetric key encryption, and the significance of key length. Notably, symmetric keys are prevalent in secret encryption due to their speed and efficiency. However, with the ever-increasing capabilities of cryptanalyst computers, stronger encryption necessitates longer symmetric keys.
Yujie Cao says
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. Cryptography can be broken down into three types: secret key cryptography, public key cryptography and hash functions. Secret Key Cryptography, uses a single key to encrypt data. Both encryption and decryption in symmetric cryptography use the same key, making this the easiest form of cryptography. Examples of Secret Key Cryptography is AES, DES and Ceasar Cipher’s. Public Key Cryptography occurs One key is kept private, and is called the “private key”, while the other is shared publicly and can be used by anyone, hence it is known as the “public key”. Examples of public key cryptography is ECC, Diffie-Hellman and DSS. Hashing Functions. Hash functions are irreversible, one-way functions which protect the data, at the cost of not being able to recover the original message Examples of Hashing Functions are MD5, SHA-1, SHA-2 and SHA-3.
Hongli Ma says
Cryptography is a technique that employs mathematical operations to encrypt messages, ensuring confidentiality. Messages are encrypted using symmetric (AES, RC4, DES, and 3DES) keys and decrypted using the corresponding key. This process keeps messages confidential from eavesdropping attacks, provided the keys and encryption methods remain secure. Among these encryption methods, AES is considered the most efficient. Additionally, a session key is used for communication between two parties through an application, with a different key generated for each session, enhancing reliability. The public key method also maintains message confidentiality, utilizing two types of keys: Public and Private. The public key is shared with others, while the private key is kept secure. Messages are encrypted using the recipient’s public key and decrypted using their private key.
Shuyi Dong says
In this chapter, I have learned the importance of ciphers in the encryption and decryption process. There are two main types of ciphers: substitution ciphers and permutation ciphers. In a substitution cipher, the characters are arranged in the same order, but the characters are replaced by other characters. To decrypt the substitution cipher and get the original message, we need a key. In a permutation cipher, the characters themselves remain the same, but the positions of the characters change. Decrypting a permutation cipher requires us to rearrange the characters in a specific order to recover the original message. Both types of ciphers exemplify the key role of ciphers in information security.
Yiwei Hu says
This article explores how cryptography is the use of mathematical operations to secure messages that are transmitted between parties or stored on a computer. One key point I’ve noticed is public key encryption, which has two main encryption targets: public key encryption for confidentiality and public key encryption for authentication. The two methods send keys differently. With the continuous development of technology, the threat risk of network security is also constantly changing, and encryption technology and cryptography will continue to progress and develop with The Times, so as to better meet the needs of network security.
Chenhao Zhang says
Introduction to Cryptography: An overview of the history, importance, and applications of cryptography. Cryptography is used to protect the confidentiality, integrity, and authenticity of data, and it is essential for secure communications over the Internet, financial transactions, and many other areas.
Basic principles of cryptography: Introduces the basic principles of cryptography, including ciphertext and plaintext, encryption and decryption, key and algorithm. It also covers the difference between symmetric and asymmetric encryption.
Symmetric encryption: This section details symmetric encryption algorithms, where the same key is used for encryption and decryption. Common symmetric encryption algorithms include Advanced encryption Standard (AES), Data encryption Standard (DES), and 3DES.
Asymmetric encryption: Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. This type of cryptography allows for secure communication between parties that have not previously exchanged keys. RSA and ElGamal are examples of asymmetric encryption algorithms.
Hash function: This chapter explains the hash function, which is a cryptographic algorithm that takes an input of arbitrary size and produces an output of fixed size, called a hash value. Hash functions are used for data integrity verification, password storage, and digital signatures.
Digital signature: A digital signature is a way to verify the authenticity and integrity of a message. They use asymmetric encryption and hash functions to provide non-repudiation, meaning that the sender cannot falsely claim that they did not send the message.
Public Key infrastructure (PKI): This chapter discusses PKI, which is a system for managing public key distribution and facilitating the use of public key encryption. PKI includes certificate authorities that issue digital certificates that bind public keys to entities.
Cryptographic attacks: The authors provide an overview of common cryptographic attacks, such as brute-force attacks, frequency analysis, and selective plaintext attacks, and discuss ways to prevent or mitigate these attacks.
Cryptographic standards and guidelines: This chapter concludes with a discussion of cryptographic standards and guidelines, such as those issued by the National Institute of Standards and Technology (NIST) and other standards bodies.
Zhaomeng Wang says
Symmetric key is a commonly used type of key in encryption algorithms, also known as shared key or private key encryption.
Hao Zhang says
The key takeaway from this chapter was understanding the technicalities behind encryption, different types of encryption, the history of encryption, and deciphering them. It was interesting to learn about the different formulas of encryption and how complex they can be, when from a user perspective it’s as simple as hitting “encrypt message.” It was also good to know that encryptions are not automatically protected, user must set up protection and it only works if companies have and enforce organizational processes that do not compromise the technical strengths of cryptography.
Yuming He says
Through this chapter, it is learned that organizations can optimize the advantages of cryptography by correctly understanding and utilizing cryptographic standards and suites to protect information transmitted or stored on computers between parties.
The most interesting aspect among them is digital signatures, where the sender uses a hash function to generate an information digest or hash value, and then encrypts the hash value of the information using a private key; The signature behavior means using a private key to encrypt the hash value of information.
Xuanwen Zheng says
Password plays a vital role in cyberspace and is the basis of network security, information security, blockchain and other products. The change of technology makes the password more and more perfect, and the difficulty of cracking is increasing. But any password has its certain risk.
Yue Wang says
There are four basic goals that we can achieve with cryptosystems: confidentiality, integrity, authentication and non-repudiation. Each of these objectives requires the fulfilment of a number of design requirements, and not all cryptosystems are designed to fulfil all four objectives. Not all cryptosystems are designed to meet all four objectives.
Confidentiality is one of the main goal of cryptography. It protects the secrecy of data at rest and in transit. Integrity assures the receiver of a message that the data has not been altered (either intentionally or unintentionally) from the time it was created has not been altered (either intentionally or unintentionally) from the time it was created to the time it is accessed. Non-repudiation provides irrefutable proof that the sender of a message has actually authorised it that the message sender actually authorised the message. This prevents the sender from later denying that he or she sent the original message.
Understand how cryptosystems achieve the goal of authentication. Authentication provides assurance of a user’s identity. Challenge-response protocols are A scheme for performing authentication that requires a remote user to encrypt a message with a key known only to the participants in the communication.
Both symmetric and asymmetric cryptosystems can perform authentication.
Nana Li says
The core of this chapter is an in-depth understanding of the details of encryption technology, the various types of encryption and their development history, and explore decryption methods. There are two types of encryption algorithms: symmetric and asymmetric. Symmetric encryption algorithm uses the same key for encryption and decryption, which has the advantage of high efficiency and low cost, but the premise is to ensure the secure distribution of the session key. Asymmetric encryption algorithms use different keys for encryption and decryption, where the public key does not need to be shared in advance, but the encryption process is relatively slow and expensive, usually 100-1000 times longer than symmetric encryption, so it is mainly used for processing very short messages. In addition, there is a class of hashing algorithms without keys, which also occupy an important position in the field of encryption.
Chunqi Liu says
I enjoyed learning about all of the processes that happen within the system that the user is unaware of, such as encrypting an email or the authentication process when logging into a computer or VPN. What stood out to me was the information related to VPNs given the number of individuals that are working virtually and remote access VPNs are a commonly used method of connecting securely to a network. Due to this increase in usage, coupled with the cyber-threat landscape, it is more important than ever to ensure a secure connection. It was also interesting to read about IPsec as it is considered the “gold standard” in VPN security and how the different cryptography means can be layered onto of one another in order to configure the security the way it works best for each individual or organization, balancing the benefits with the costs. For example, since the transport mode is very costly to implement, tunnel mode can be used at a much lower cost, but does not provide the complete end-to-end security that transport mode does. A user or organization can then layer additional security in top such as encrypt the data that is being transmitted and/or implement firewalls or other methods to ensure the security of the site network.
Haixu Yao says
Through reading, I understand the basic concepts, principles and applications of encryption technology. According to the use of the key, the encryption algorithm can be divided into symmetric encryption algorithm and asymmetric encryption algorithm. Symmetric encryption algorithms use the same key for encryption and decryption, while asymmetric encryption algorithms use a pair of keys, one for encryption and the other for decryption. These algorithms have their own advantages and disadvantages and are suitable for different application scenarios. In e-commerce, encryption technology can protect the privacy of both parties and the security of transaction information; In network communications, encryption prevents data from being stolen or tampered with. These application cases fully demonstrate the importance and wide application of encryption technology in modern society. I recognize the important role of encryption technology in protecting information security, as well as the characteristics and application scenarios of different encryption algorithms. This knowledge is of great guiding significance for my future study and work in the field of information security.
Yue Ma says
I was interested in the emphasis on the human element in cryptography in this chapter. It is very important for organizations to train employees to use their systems properly to reduce the risk of errors that can damage the company.Because of this, security awareness is so important, as human users may be the main reason to let outside users gain access. Not knowing how to handle keys between messages can lead to adverse results. When it comes to cybersecurity, the human element can be very harmful due to the potential for error and conflicts between ethics and purpose. However, this human element can also provide significant benefits to an organization if appropriate training and measures are taken to align employees with the organization’s goals.
Hao Li says
SSL/TLS provides opaque transport layer security. In contrast, transparent Internet layer security IPSec operates at the Internet layer. It protects IP packets and everything in the data fields of IP packets. This includes ICMP (Internet Control Message Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol) messages and all applications.