This document discusses symmetric and asymmetric cryptography. It explains that symmetric cryptography uses a single key for encryption and authentication, while asymmetric cryptography uses public/private key pairs. It also outlines several cryptographic algorithms like AES, KASUMI and their uses for encryption, integrity protection, and authentication. Cryptography is used to provide confidentiality, integrity, and authentication, and it is commonly applied in banking, passwords, and transactions.
This document discusses symmetric and asymmetric cryptography. It explains that symmetric cryptography uses a single key for encryption and authentication, while asymmetric cryptography uses public/private key pairs. It also outlines several cryptographic algorithms like AES, KASUMI and their uses for encryption, integrity protection, and authentication. Cryptography is used to provide confidentiality, integrity, and authentication, and it is commonly applied in banking, passwords, and transactions.
This document discusses symmetric and asymmetric cryptography. It explains that symmetric cryptography uses a single key for encryption and authentication, while asymmetric cryptography uses public/private key pairs. It also outlines several cryptographic algorithms like AES, KASUMI and their uses for encryption, integrity protection, and authentication. Cryptography is used to provide confidentiality, integrity, and authentication, and it is commonly applied in banking, passwords, and transactions.
Show some novel ways of using cryptographic mechanisms
● Symmetric cryptography can be used for encryption and authentication ● Symmetric encryption is an encryption where only 1 key is used to both encrypt & decrypt Symmetric key ● A cryptographic key that is used by 1 or more w/ a symmetric key algorithm The three cryptographic algorithms Authentication algorithm, encryption algorithm, and key generation algorithm ````````````````````` ● Produces an integrity digest that is based on data & a key ● Encrypt data w/ a key. Algorithms operate on data in units of a block size ● Generates keys & are used as integers ● 128 bit blocks & 128 bit keys ● Encryption algorithm has to be standardized ● KASUMI is used for encryption & in variation of CBC-MAC mode for integrity protection ● KASUMI is an eight round Feistel cipher with 64 bit blocks & 128 bit keys Private key ● A key used to decrypt keys that were encrypted using the corresponding public key Public key ● Used to verify a digital signature that is signed by its corresponding private key What is cryptography used for? ● Confidentiality ● Integrity ● AUthentication Where is cryptography used? ● Applications - Banking - Passwords - Transactions