Cryptography_basics_ppt
Cryptography_basics_ppt
BASICS
ISO/IEC 27001 – GUIDELINES
FOR CYBERSECURITY
FABRIKAM
CRYPTOGRAPHY
CONFIDENTIALITY
INTEGRITY
NON-REPUDIATION
Caesar Cipher
Enigma machine
FABRIKAM
CRYPTOGRAPHY
CONCEPTS
CIPHER – algorithm used to perform the
encryption
KEY – information that determines how the
algorithm works
A. Kerckhoffs’s Principle
FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised
FABRIKAM
PUBLIC KEY CRYPTOGRAPHY
Source:
https://dusted.codes
FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised
FABRIKAM