Professional Documents
Culture Documents
CNS 8
CNS 8
8 Advanced
Topic
Prepared and Edited by:- Mayank Yadav Designed by:- Kussh Prajapati
www.collegpt.com collegpt@gmail.com
Prepared By : Mayank Yadav Cryptography and Network Security
Its basic idea is that a user's public key is created by applying a public hash function to the
user's ID string. A central trusted party generates the correct private key. The user needs to
authenticate his ID with the trusted party. After which, the private key is sent to that user over a
secure channel. Instead of a certificate, the trusted party issues a private key. These public and
private keys can be used in many cryptographic schemes.
Encryption: Encryption uses an algorithm to convert plain text into cipher text. This is used to
protect sensitive data from unauthorized users. Generally, cipher text looks like a long list of
random letters and numbers. Once the data has been encrypted, the only way to decrypt it and
restore access to it is by using the correct Encryption key.
Prepared By : Mayank Yadav Cryptography and Network Security
The example that follows can help us to know the process of Encryption in Identity Based
Cryptography:
● Suppose Ninja wants to send a message to Peter. He already knows the ID of Peter
(IDpeter) and the public key (pkpkg).
● To obtain cipher text (CT), he uses the public key (pkpkg) provided by PKG and Peter's
Identity (IDPeter).
● The encrypted message ( C ) is then sent to Peter via the internet (in this case).
Decryption : Decryption is the process of converting ciphertext into plain text. For decryption,
we require the same algorithm and key used to encrypt the message. Encrypted data cannot be
decrypted again without the proper key. Simply put, decryption is the converse of Encryption.
● Suppose Peter gets the encrypted message from Tony. It also has instructions about
how to contact PKG and decrypt the message.
● To decrypt the message into plain text, Peter authenticates his ID with the PKG. He
sends enough proof that confirms that IDpeter belongs to him.
● Upon successful authentication, Peter receives his private key (prpeter) from the PKG
through a secure channel.
● Peter recovers the plain text message by decrypting C with his private key prpeter.
Prepared By : Mayank Yadav Cryptography and Network Security
● Certificates are not required to get the public key. The public key of a recipient is created
from its ID.
● The recipient of an encrypted message does not need to do anything special to receive
it. It is one of the most appealing aspects of Identity Based Cryptography.
● It is not necessary to revoke keys because they expire. In a normal public-key system, if
a key is compromised, it must be canceled.
● Identity Based Encryption makes it possible to postdate messages for later decryption.
● Identity Based Encryption requires a centralized server. Hence, some keys must be
made and kept in deposit. It puts them at a higher risk of leakage.
● To transfer the private key, we need to establish a secure channel between the sender or
receiver and the IBE server.
Prepared By : Mayank Yadav Cryptography and Network Security
Core Concept:
● In ABE, data is encrypted with a policy specifying certain attributes.
● Users are assigned private keys based on their own attributes.
● Only users whose attributes satisfy the policy in the ciphertext can decrypt the message.
Example:
Imagine a company wants to share a confidential document only with employees from the
"Finance" department who have been with the company for "more than 2 years".
Benefits of ABE:
● Fine-grained Access Control: Enables more control over who can access encrypted
data compared to traditional public-key cryptography.
● Simplified Key Management: Reduces the need for complex key distribution and
management.
● Improved Security: Provides an extra layer of security by controlling access based on
attributes, not just identities.
Types of ABE:
● Ciphertext-Policy ABE (CP-ABE): The access control policy is embedded within the
ciphertext. The sender specifies the required attributes for decryption.
● Key-Policy ABE (KP-ABE): The access control policy is embedded within the user's
private key. The authority defines the attributes a user needs for decryption based on
their role or department.
Applications of ABE:
● Cloud Storage: Enables secure data sharing in the cloud, controlling access based on
user attributes.
● Healthcare Data: Allows fine-grained access control for medical records based on a
doctor's specialty or a patient's diagnosis.
Prepared By : Mayank Yadav Cryptography and Network Security
● Military and Government Data: Provides secure communication and data access
control based on security clearances and roles.
Core Principles:
● Superposition: Quantum particles can exist in multiple states simultaneously (0 & 1).
QC encodes information on these states (e.g., photon polarization).
● Entanglement: Two particles are linked, where measuring one instantly determines the
other's state, regardless of distance. This is crucial for detecting eavesdropping.
Key Points:
● Unconditional Security: The laws of physics guarantee security. Any attempt to tamper
with Quantum information introduces detectable errors.
● Quantum Key Distribution (QKD): Establishes a shared secret key between two
parties (Alice & Bob) for secure communication.
○ Alice transmits photons in various quantum states to Bob.
○ Bob randomly measures a subset of these photons.
○ Alice and Bob publicly compare their findings to ensure no eavesdropping
occurred.
○ Any tampering by an eavesdropper (Eve) will be flagged.
Prepared By : Mayank Yadav Cryptography and Network Security
Advantages:
● Unbreakable Security: Immune to advancements in computing power (unlike traditional
cryptography).
● Future-Proofs Communication: Secures data in the quantum computing age.
Disadvantages:
● Technical Complexity: Requires specialized equipment and expertise for implementation.
● Distance Constraints: Current technology limits transmission distances due to quantum
state fragility.
Applications:
● Financial Transactions: Securing sensitive financial data.
● Government Communication: Protecting classified information.
● Medical Records: Safeguarding patient privacy.
Prepared By : Mayank Yadav Cryptography and Network Security
The structure of a blockchain is designed to ensure the security of data through its consensus
mechanism which has a network of nodes that agree on the validity of transactions before
adding them to the blockchain.
Key Concepts:
● Blocks: Data is bundled into digital blocks, containing information (e.g., transaction
details), a timestamp, and a unique identifier.
● Chain: These blocks are chronologically chained together using cryptography, forming
an immutable record. Tampering with one block would alter the entire chain, making it
easily detectable.
● Decentralization: There's no central authority controlling the blockchain. It's maintained
by a network of computers (nodes) that validate and add new blocks.
Advantages:
Disadvantages:
Applications:
Blockchain technology is still evolving, with ongoing research addressing scalability and energy
efficiency concerns. As it matures, we can expect blockchain to revolutionize various sectors,
fostering trust and security in a digital world.
Prepared By : Mayank Yadav Cryptography and Network Security
Key Characteristics:
● Digital: Cryptocurrencies exist solely in electronic form. They are not physical coins or
bills.
● Decentralized: There's no single entity controlling the issuance or management of most
cryptocurrencies. They operate on peer-to-peer networks.
● Cryptography: Complex mathematical algorithms secure transactions and ensure the
integrity of the digital currency.
● Blockchain: Many cryptocurrencies leverage blockchain technology for recording
transactions securely and transparently on a public ledger.
Prepared By : Mayank Yadav Cryptography and Network Security
Types of Cryptocurrencies:
● Bitcoin (BTC): The first and most well-known cryptocurrency, known for its
decentralized nature and limited supply.
● Altcoins: Alternative cryptocurrencies offering different features or functionalities
compared to Bitcoin. (e.g., Ethereum, Litecoin)
● Stablecoins: Cryptocurrencies pegged to a stable asset like a fiat currency (e.g., USD
Coin) to minimize price volatility.
Advantages:
Disadvantages:
● Volatility: The price of most cryptocurrencies can fluctuate significantly, making them a
risky investment.
● Regulation: The evolving regulatory landscape surrounding cryptocurrencies poses
uncertainties.
● Scalability: Some blockchain networks struggle to process large volumes of
transactions quickly.
● Security Risks: Cryptocurrency exchanges and wallets can be vulnerable to hacking
attempts.
What is Bitcoin (BTC)? Bitcoin is the world's first and most well-known cryptocurrency. It's
a digital asset that operates on a decentralized network, independent of central banks or
governments. Unlike traditional currencies, bitcoins aren't physical coins or bills. They exist as
digital units stored on a public ledger called the blockchain.
Core Principles:
Key Features:
● Borderless Transactions: Bitcoins can be sent and received anywhere globally without
geographical restrictions.
● Transparency: All Bitcoin transactions are publicly recorded on the blockchain, fostering
trust and immutability.
● Pseudonymity: While transactions are public, user identities are masked using
cryptographic addresses, offering a degree of anonymity.
Advantages:
● Security: Cryptography and blockchain technology make Bitcoin transactions secure
and resistant to counterfeiting.
● Fast and Low-Cost Transactions: Transactions can be faster and potentially cheaper
compared to traditional international payments.
● Transparency and Immutability: The public blockchain ledger ensures transparency
and immutability of transaction records.
Prepared By : Mayank Yadav Cryptography and Network Security
Disadvantages:
● Volatility: The price of Bitcoin can fluctuate significantly, making it a risky investment.
● Scalability: The Bitcoin network can be slow to process large volumes of transactions.
● Regulation: The evolving regulatory landscape surrounding cryptocurrencies poses
uncertainties.
Visit: www.collegpt.com