Cryptography
Cryptography
Cryptography
Cybersecurity
The Method which is going to Protect us from these threads is known as Cryptography.
Cryptography: Crypto’ means secret or hidden.
Cryptography is the science of secret writing with the intention of keeping the data secret.
Cryptography is a method of protecting information and communications using codes, so that
only those for whom the information is intended can read and process it. Cryptography is the
study of securing communications from outside observers.
Encryption algorithms take the original message, or plaintext, and converts it into ciphertext,
which is not understandable. The key allows the user to decrypt the message, thus ensuring
on they can read the message. The strength of the randomness of an encryption is also
studied, which makes it harder for anyone to guess the key or input of the algorithm.
Cryptography is how we can achieve more secure and robust connections to elevate our
privacy. Advancements in cryptography makes it harder to break encryptions so that
encrypted files, folders, or network connections are only accessible to authorized users.
Cryptography focuses on four different objectives:
1. Confidentiality: Confidentiality ensures that only the intended recipient can decrypt
the message and read its contents.
2. Non-repudiation: non-repudiation means the sender of the message cannot
backtrack in the future and deny their reasons for sending or creating the message.
3. Integrity: Integrity focuses on the ability to be certain that the information contained
within the message cannot be modified while in storage or transit.
4. Authenticity: Authenticity ensures the sender and recipient can verify each other’s
identities and the destination of the message.
• AES
• DES
• MD5
• SHA-1
• SHA-2 family which includes SHA-224, SHA-256, SHA-384, and SHA-512
• SHA-3
Difference between Hash functions, Symmetric, and Asymmetric algorithms:
SHA is the acronym for Secure Hash Algorithm, used for hashing data and certificate files.
Every piece of data produces a unique hash that is thoroughly non-duplicable by any other
piece of data.
SHA is the acronym for Secure Hash Algorithm, used for hashing data and certificate
files. Every piece of data produces a unique hash that is thoroughly non -duplicable by
any other piece of data. The resulting digital signature is unique too as it depends on
the hash that’s generated out of the data. For the course of the actual
communication, symmetric cryptography is used, where the same key that hashes or
encrypts data is used to decrypt it.
HSM: Hardware Security Modules
A hardware security module (HSM) is a physical device that provides extra security for
sensitive data. This type of device is used to provision cryptographic keys for critical
functions such as encryption, decryption and authentication for the use of applications,
identities and databases
A Hardware Security Module (HSM) is a hardware-based security device that generates,
stores, and protects cryptographic keys. Sterling Secure Proxy uses keys and certificates
stored in its store or on an HSM.
The functions of an HSM are:
• AD/ADAS security.
• Infotainment security.
• Radar/LiDAR security.
Configurable, scalable and flexible solution - the hardware security module can be scaled and
configured to match any requirement, even for the most demanding applications. The size
and performance of the solution can be adapted for a perfect application fit while leaving
room in the FPGA for other critical applications.
Key Features and Benefits
• Supports ISO26262
• Flexible and scalable platform
• Secure key storage
Advantages of Cyber Security?
One of the many advantages to living in a world where every device is connected is
convenience. It’s incredibly easy to conduct work, manage your social platforms and many
data from your smartphone or devices.
But, of course, the convenience of connected data also means threats from bad actors can do
a lot of damages. Cybersecurity initiatives are essential to protecting our data.