Cryptography

 

Cryptography refers to the encryption and decryption of communication between two entities or stored data. Encryption is a mathematical operation which converts the communication or data into unreadable forms, while decryption is the inverse operation of encryption.

There are many methods of encryption and decryption. Although these methods use different mathematical algorithms, one common ingredient is the existence of a "key." A key is a string of binary digits that controls the manner in which cryptography is performed. For non-recoverable encryption systems, decryption is impossible without knowledge of the key. For recoverable systems, decryption is possible without explicit knowledge of the key provided that key-recovery is performed.

Non-recoverable methods are in general more secure than recoverable methods. Examples of non-recoverable methods include:

Data Encryption Standard (DES)

DES is a standard method developed by the National Bureau of Standards to provide a standard method for protecting sensitive data. One single key is used to control the manner in which encryption is performed. Encryption is done in such a way that decryption is impossible without the key.

Pretty Good Privacy (PGP)

PGP is an implementation of the public-key cryptography system. In this system, a user is issued two keys: a public key P and a private key S. P and S are inverses of each other, i.e. S can decrypt a document that is encrypted by P. P and S together can be used to for encrypted communication or authentication of a document.

Kerberos

Kerberos is a software system for establishing a secure communication path over an otherwise insecure network. The data that are exchanged between network entities are encrypted using cryptography technologies such as DES. It is capable of user authentication and session encryption. Kerberos is often applied to telnet sessions.

 

References:

1) DES:

What is DES?

http://www.thenextwave.com/page19.html

DES: The Data Encryption Standard

http://www.cs.wm.edu/~hallyn/des/des.htm

2) PGP:

PGP and What It Does

http://www.arc.unm.edu/~drosoff/pgp/pgp.htm/

How to Get Better Policy on the Net?

http://www.cam.org/~githerr/privacy.htm

Internet Privacy Coalition

http://www.privacy.org/ipc/

CommSec: Communications Security on the Internet

http://207.115.146.55/smparker

3) Kerberos:

Taking the Mystery out of Kerberos

http://www.dttus.com/dttus/publish/mystery/kerberos.htm

Kerberos: The Network Authentication Protocol

http://web.mit.edu/kerberos/www/

USI/ISI Technical Report Number ISI/RS-94-399

http://nii.isi.edu/publications/kerberos-neuman-tso.html

The Kerberos Network Authentication Service

http://nii.isi.edu/gost-group/products/kerberos/

Kerberos

http://sunsite.utk.edu/net/security/kerberos/

 


/
Introduction/ Firewall/ The McCain - Kerrey Bill/

/Analysis/ Conclusion/ Home/

Comments? Questions? Drop me a mail...

haohsuan@hotmail.com

1