Encryption definition
Encryption
is the foundation of many aspects of security. For Example encryption protects
messages sent across the Internet and protects files stored on serves.
In
cryptography, encryption is the process of encoding messages such a way that
eavesdroppers or hackers cannot read it, but that authorized parties can.
In an
encryption scheme, the message or information is encrypted using an encryption
algorithm, turning it into an unreadable cipher text. This is usually done with
the use of an encryption key, which specifies how the message is to be encoded.
Any adversary that can see the cipher text should not be able to determine
anything about the original message.
An authorized party, however, is able to
decode the cipher text using a decryption algorithm, that usually requires a
secret decryption key, that adversaries do not have access to.
- Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users.
- Involves using special mathematical algorithms to transform digital data in scrambled code.
- Most widely used method uses a private keys unique to each individual
There are two basic types of encryption schemes:
1. Single Key
Figure 1 : Single Key encryption.
Both the person who encrypts the message and the person who
decrypts it use the same key. The system are fast, but it is
difficult to safely distribute the key.
Figure 1 |
2.
Public Key Encryption
Uses
two different keys, one private and one public. The keys are mathematically
related so that data encrypted with one key can be decrypted using only the
other key
Public key encryption |
Figure 2 : Dual-key encryption . Alice sends a message that only
Bob can read. With a dual-key system, one key encrypts the
message, the other decrypts it. Once Bob's public key is applied to
the message, only Alice's private key will retrieve the message.
Keys are usually very large prime numbers.
Figure 2 |
Figure 3 : Dual-key encryption foe message authentication.
Bob sends a message to Alice at the bank. Using his private key
ensures that the message must have come from him.
Using Alice's public key prevents anyone
else from reading the message.
Figure 3 |
No comments:
Post a Comment