Please enable JavaScript.
Coggle requires JavaScript to display documents.
Crypto systems (Public key encryption systems
Asymmetric key
digital…
Crypto systems
Public key encryption systems
- Asymmetric key
- digital signature - verify a message comes intact from the claimed sender
- Public key - known by anybody and can be used to encrypt the messages, verify signature
- Private key - known only to the recipient, used to decrypt message and sign signatures
-
-
-
-
ECC - Elliptic Curve Cryptography
- not less secure than RSA or some other public key crypto algorithms
- with smaller key size achieve same security as RSA
- more efficient for secure wireless applications
- high scalability
- more potential due to EC theory
-
-
-
-
Cipher
Block ciphers
- Symmetric encryption
- not used in asymmetric encryption
- 64 pr 128 bit
- most widely used
Advantages
-- Diffusion
-- Immunity to insertion
Disadvantages
-- Slowness of encryption
-- Error propagation
Stream ciphers
- process one bit at a time
- Vernam cipher, one time pad
Advantages
-- Speed of transformation
-- Low error propagation
Disadvantages
-- Low diffusion
-- Susceptibility to malicious insertion and modifications
-
Confidentiality
- Especially with transport encryption
Authentication and access control
- I know it's you. I really know it's you.
Non-repudiation
- You said it. You can't deny it
-