Cryptography

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Cyber Security

By: Ashutosh Kumar Shukla

Cybersecurity is the protection of internet-connected systems such as hardware, software


and data from cyberthreats. The practice is used by individuals and enterprises to protect
against unauthorized access to data centres and other computerized systems.
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.
Vehicle Cybersecurity:
Applied to vehicles, cybersecurity takes on an even more important role: systems and
components that govern safety must be protected from harmful attacks, unauthorized
access, damage, or anything else that might interfere with safety functions.
In the future the vehicle is permanently and seamlessly connected. This serves for new
functions in the car and beyond, for example regarding infotainment, vehicle security or
intelligent traffic management and More in ADAS/ AD. At the same time Holistic
Connectivity also is the key to automated vehicles. However, new functions such as wireless
updates to vehicle electronics are accompanied by risks, especially when it comes to data
transfer between the car and its environment. Therefore, for Cybersecurity is at the heart of
the development of products and services.
Many Tier 1 and OEMs are developing end-to-end solutions with the aim of ensuring the
highest possible degree of security at all times. They are working a proactively, that takes
cyber security into account right from day one to till product development and further, so
that potential security loopholes do not arise in the first place.
Permanently monitoring the current status of the vehicle system also adds to more security.
Types of Cybersecurity:

Cybersecurity

Critical Infrastructure Application Network IOT Security Cloud Security


security Security Security

The Method which is going to Protect us from these threads is known as Cryptography.
Cryptography: Crypto’ means secret or hidden.
Cryptography is the science of secret writing with the intention of keeping the data secret.
Cryptography is a method of protecting information and communications using codes, so that
only those for whom the information is intended can read and process it. Cryptography is the
study of securing communications from outside observers.
Encryption algorithms take the original message, or plaintext, and converts it into ciphertext,
which is not understandable. The key allows the user to decrypt the message, thus ensuring
on they can read the message. The strength of the randomness of an encryption is also
studied, which makes it harder for anyone to guess the key or input of the algorithm.
Cryptography is how we can achieve more secure and robust connections to elevate our
privacy. Advancements in cryptography makes it harder to break encryptions so that
encrypted files, folders, or network connections are only accessible to authorized users.
Cryptography focuses on four different objectives:

1. Confidentiality: Confidentiality ensures that only the intended recipient can decrypt
the message and read its contents.
2. Non-repudiation: non-repudiation means the sender of the message cannot
backtrack in the future and deny their reasons for sending or creating the message.
3. Integrity: Integrity focuses on the ability to be certain that the information contained
within the message cannot be modified while in storage or transit.
4. Authenticity: Authenticity ensures the sender and recipient can verify each other’s
identities and the destination of the message.

These objectives help ensure a secure and authentic transfer of information.


Types of Cryptography
Cryptography can be broken down into three different types:

1. Secret Key Cryptography: Secret Key Cryptography, or symmetric cryptography,


uses a single key to encrypt data. Both encryption and decryption in symmetric
cryptography use the same key, making this the easiest form of cryptography. The
cryptographic algorithm utilizes the key in a cipher to encrypt the data, and when
the data must be accessed again, a person entrusted with the secret key can
decrypt the data. Secret Key Cryptography can be used on both in-transit and at-
rest data but is commonly only used on at-rest data, as sending the secret to the
recipient of the message can lead to compromise.
Examples:

• AES
• DES

2. Public Key Cryptography: Public Key Cryptography, or asymmetric cryptography,


uses two keys to encrypt data. One is used for encryption, while the other key
can decrypt the message. Unlike symmetric cryptography, if one key is used to
encrypt, that same key cannot decrypt the message, rather the other key shall be
used.
3. Hash Functions: It involves taking the plain text and converting it to a hash
value of fixed size by a hash function. This process ensures the integrity of the
message as the hash value on both, the sender’s and receiver’s sides should
match if the message is unaltered.

Some of the most famous hashing algorithms are:

• MD5
• SHA-1
• SHA-2 family which includes SHA-224, SHA-256, SHA-384, and SHA-512
• SHA-3
Difference between Hash functions, Symmetric, and Asymmetric algorithms:

SHA: Secure Hash Algorithm

SHA is the acronym for Secure Hash Algorithm, used for hashing data and certificate files.
Every piece of data produces a unique hash that is thoroughly non-duplicable by any other
piece of data.

SHA is the acronym for Secure Hash Algorithm, used for hashing data and certificate
files. Every piece of data produces a unique hash that is thoroughly non -duplicable by
any other piece of data. The resulting digital signature is unique too as it depends on
the hash that’s generated out of the data. For the course of the actual
communication, symmetric cryptography is used, where the same key that hashes or
encrypts data is used to decrypt it.
HSM: Hardware Security Modules
A hardware security module (HSM) is a physical device that provides extra security for
sensitive data. This type of device is used to provision cryptographic keys for critical
functions such as encryption, decryption and authentication for the use of applications,
identities and databases
A Hardware Security Module (HSM) is a hardware-based security device that generates,
stores, and protects cryptographic keys. Sterling Secure Proxy uses keys and certificates
stored in its store or on an HSM.
The functions of an HSM are:

• Onboard secure cryptographic key generation


• Onboard secure cryptographic key storage, at least for the top level and most
sensitive keys, which are often called master keys
• key management
• use of cryptographic and sensitive data material, for example, performing
encryption or digital signature functions
• offloading application servers for complete asymmetric and symmetric
cryptography.
HSMs are also deployed to manage transparent data encryption keys for databases and keys
for storage devices.
HSMs provide both logical and physical protection of these materials, including cryptographic
keys. HSM support both symmetric and asymmetric (public-key) cryptography. Some HSM
systems are also hardware cryptographic accelerators.
A software stack containing the HSM firmware, HSM driver code and an interface layer
allowing integration into the AUTOSAR framework.
Ideal for following applications:

• AD/ADAS security.
• Infotainment security.
• Radar/LiDAR security.

Configurable, scalable and flexible solution - the hardware security module can be scaled and
configured to match any requirement, even for the most demanding applications. The size
and performance of the solution can be adapted for a perfect application fit while leaving
room in the FPGA for other critical applications.
Key Features and Benefits

• Supports ISO26262
• Flexible and scalable platform
• Secure key storage
Advantages of Cyber Security?
One of the many advantages to living in a world where every device is connected is
convenience. It’s incredibly easy to conduct work, manage your social platforms and many
data from your smartphone or devices.
But, of course, the convenience of connected data also means threats from bad actors can do
a lot of damages. Cybersecurity initiatives are essential to protecting our data.

You might also like