Professional Documents
Culture Documents
UNIT-2 Part4
UNIT-2 Part4
UNIT-2 Part4
Cryptography (or cryptology) is a word from Greek ‘kryptos’, means “hidden or secret"; and
’graphic’means “writing", or "study". Cryptography is the practice and study of hiding information.
Cryptography is probably the most important aspect of communications security and is becoming
increasingly important as a basic building block for computer security.
Basically cryptography is the science and art of creating secret codes, it include techniques such as
microdots, merging words with images and other way to hide information in storage and transmit.
Modern cryptography follows a strongly scientific approach, and it concern itself with the following
four objectives i.e., confidentiality, integrity, non-repudiation and authentication.
• Confidentiality - ensure data is read only by authorized parties,
• Data integrity - ensure data wasn't altered between sender and recipient,
• Authentication - ensure data originated from a particular party.
• Non-repudiation- prevents either sender or receiver from denying a transmitted message. Thus,
when a message is sent, the receiver can prove that the alleged sender in fact sent the message.
Similarly, when a message is received, the sender can prove that the alleged receiver in fact received
the message.
TYPES OF CRYPTOGRAPHY
Disadvantages:-
1. Need for secure channel for secret key exchange: Sharing the secret key in the beginning is a
problem in symmetric key encryption. It has to be exchanged in a way that ensures it remains secret.
2. Too many keys: A new shared key has to be generated for communication with every different
party. This creates a problem with managing and ensuring the security of all these keys.
3. Origin and authenticity of message cannot be guaranteed: Since both sender and receiver use the
same key, messages cannot be verified to have come from a particular user. This may be a problem
if there is a dispute.
Disadvantages:-
1. Public keys should/must be authenticated: No one can be absolutely sure that a public key belongs
to the person it specifies and so everyone must verify that their public keys belong to them.
2. Slow: Public key encryption is slow compared to symmetric encryption. Not feasible for use in
decrypting bulk messages.
3. Uses up more computer resources: It requires a lot more computer supplies compared to single-
key encryption.
4. Widespread security compromise is possible: If an attacker determines a person's private key, his
or her entire messages can be read.
5. Loss of private key may be irreparable: The loss of a private key means that all received messages
cannot be decrypted.