You are on page 1of 60

INTRODUCTION TO

CRYPTROGRAPHY
Overview

Defining Cryptography

Why Use Cryptography

Hashing Algorithms

Symmetric Cryptographic Algorithms

Asymmetric Cryptographic Algorithms

COMSEC Level Classifications


Defining Cryptography

Defining cryptography involves understanding what it


is and what it can do

It also involves understanding how cryptography


can be used as a security
tool to protect data
Defining Cryptography

Cryptography
The science of transforming information into
an unintelligible form while it is
being transmitted or stored so that
unauthorized users cannot access it
Defining Cryptography

Steganography
Hides the existence of the data
What appears to be a harmless
image can contain hidden data embedded
within the image
Can use image, audio, or even
video files to contain hidden information
Defining Cryptography
Defining Cryptography

One of the most famous ancient


cryptographers was Julius Caesar
Caesar shifted each letter of his
messages to his generals three places
down in the alphabet
Defining Cryptography

Encryption
Changing the original text to a
secret message using cryptography
Decryption
Change the secret message back
to its original form
Defining Cryptography
Why Use Cryptography?
Why Use Cryptography?

Confidentiality
Ensures only authorized persons can view
the information being encrypted
Why Use Cryptography?

Integrity
Ensures information has not been
tampered with or altered
Why Use Cryptography?

Availability
Trusted information is accessible and
formatted correctly
Why Use Cryptography?

Authenticity
Verifying that information is true
and has actually been sent from
the correct sender
Why Use Cryptography?

Non-repudiation
Ensures that someone can not deny
that they sent a message
Normally based on Digital Signatures
Hashing Algorithms

Hashing
Also called a one-way hash
A process for creating a unique
signature for a set of data
Hashing Algorithms

Hashing is used only for integrity


Ensures information is in its original form
No unauthorized person or malicious software
has altered the data
Hashing Algorithms

Hash created from a set of


data cannot be reversed
Hashing Algorithms
Hashing Algorithms

A hashing algorithm is considered secure


if it has these characteristics:
The ciphertext hash is a fixed size
Two different sets of data cannot
produce the same hash
Hashing Algorithms

It should be impossible to produce


a data set that has a
desired or predefined hash
Resulting hash ciphertext cannot be reversed
The hash serves as a check
to verify the message contents
Hashing Algorithms
Hashing Algorithms
10 Minute Break
Symmetric Cryptographic
Algorithms

Symmetric cryptographic algorithms


Use the same single key to
encrypt and decrypt a message
Also called private key cryptography
How COMSEC materials work
Symmetric Cryptographic
Algorithms

Stream cipher
Takes one character and replaces
it with one character
Symmetric Cryptographic
Algorithms
Substitution cipher
The simplest type of stream cipher
Simply substitutes one letter or
character for another
Symmetric Cryptographic
Algorithms
Symmetric Cryptographic
Algorithms
Symmetric Cryptographic
Algorithms

Transposition cipher
A more complicated stream cipher
Rearranges letters without changing them
Symmetric Cryptographic
Algorithms

Block cipher
Manipulates an entire block of
plaintext at one time
Plaintext message is divided into separate
blocks of 8 to 16 bytes
Each block is encrypted independently
Symmetric Cryptographic
Algorithms

Stream cipher advantages and disadvantages


Fast when the plaintext is short
More prone to attack because the
engine that generates the stream
does not vary
Symmetric Cryptographic
Algorithms

Block cipher advantages and disadvantages


Considered more secure because the
output is more random
Symmetric Cryptographic
Algorithms

Cipher is reset to its original


state after each block is processed
Results in the ciphertext being
more difficult to break
Symmetric Cryptographic
Algorithms
Asymmetric Cryptographic
Algorithms
Asymmetric cryptographic algorithms
Also known as public key cryptography
Asymmetric Cryptographic
Algorithms
Uses two keys instead of one
The public key is known to
everyone and can be freely distributed
The private key is known only
to the recipient of the message
Asymmetric Cryptographic
Algorithms
Asymmetric cryptography can also be used to create a
digital signature
Asymmetric Cryptographic
Algorithms
Asymmetric Cryptographic
Algorithms
A digital signature can:
Verify the sender
Prove the integrity of the message
Prevent the sender from disowning the message
Asymmetric Cryptographic
Algorithms
Asymmetric Cryptographic
Algorithms
Asymmetric Cryptographic
Algorithms
COMSEC Level Classifications

Type 1 encryption
Restricted to the US Government, Military,
and Intelligence agencies. Suitable for highly
(up to Top Secret) classified information,
the customer must have a NSA
COMSEC Account to obtain.
COMSEC Level Classifications

Type 2 encryption
Restricted to the US Government and
Military, suitable for unclassified information.
COMSEC Level Classifications

Type 3 encryption
Restricted to US and Canadian companies
and citizens. Used in some LMRs
to protect sensitive but unclassified information
in non-tactical operations.
COMSEC Level Classifications

Type 4 encryption
Generally available to international companies and
citizens, subject to export approval.
Suitable for Sensitive But Unclassified
or "SBU" information.
COMSEC Level Classifications

Perfect for government applications where a


high level of privacy or security
is needed, but actual classified information
is not being passed though the
unit.
COMSEC Level Classifications

Type 5 encryption
Fairly unrestricted public key version of
Type 4 equipment, very exportable,
and available for private sale.
Summary

Cryptography is the science of transforming


information into a secure form while
its being transmitted or stored so
that unauthorized users cannot access it
Summary

Cryptography is used to ensure:


Confidentiality
Integrity
Availability
Authenticity
Non-repudiation
Summary

Hashing creates a unique signature, called


a hash or digest, which represents
the contents of the original text
Symmetric cryptography, also called private key
cryptography, uses a single key to
encrypt and decrypt a message
Summary

Asymmetric cryptography, also known as public


key cryptography, uses two keys instead
of one
There are five COMSEC level classifications

You might also like