CRYPTOGRAPHY
BASICS
ISO/IEC 27001 – GUIDELINES
FOR CYBERSECURITY
FABRIKAM
CRYPTOGRAPHY
CONFIDENTIALITY
INTEGRITY
NON-REPUDIATION
Caesar Cipher
Enigma machine
FABRIKAM
CRYPTOGRAPHY
CONCEPTS
CIPHER – algorithm used to perform the
encryption
KEY – information that determines how the
algorithm works
A. Kerckhoffs’s Principle
“a cryptosystem should be secure
even if everything about the system,
except the key, is public knowledge”
FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised
FABRIKAM
PUBLIC KEY CRYPTOGRAPHY
Source:
https://dusted.codes
FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised
FABRIKAM