Professional Documents
Culture Documents
CRYPTROGRAPHY
Overview
Defining Cryptography
Hashing Algorithms
Cryptography
The science of transforming information into
an unintelligible form while it is
being transmitted or stored so that
unauthorized users cannot access it
Defining Cryptography
Steganography
Hides the existence of the data
What appears to be a harmless
image can contain hidden data embedded
within the image
Can use image, audio, or even
video files to contain hidden information
Defining Cryptography
Defining Cryptography
Encryption
Changing the original text to a
secret message using cryptography
Decryption
Change the secret message back
to its original form
Defining Cryptography
Why Use Cryptography?
Why Use Cryptography?
Confidentiality
Ensures only authorized persons can view
the information being encrypted
Why Use Cryptography?
Integrity
Ensures information has not been
tampered with or altered
Why Use Cryptography?
Availability
Trusted information is accessible and
formatted correctly
Why Use Cryptography?
Authenticity
Verifying that information is true
and has actually been sent from
the correct sender
Why Use Cryptography?
Non-repudiation
Ensures that someone can not deny
that they sent a message
Normally based on Digital Signatures
Hashing Algorithms
Hashing
Also called a one-way hash
A process for creating a unique
signature for a set of data
Hashing Algorithms
Stream cipher
Takes one character and replaces
it with one character
Symmetric Cryptographic
Algorithms
Substitution cipher
The simplest type of stream cipher
Simply substitutes one letter or
character for another
Symmetric Cryptographic
Algorithms
Symmetric Cryptographic
Algorithms
Symmetric Cryptographic
Algorithms
Transposition cipher
A more complicated stream cipher
Rearranges letters without changing them
Symmetric Cryptographic
Algorithms
Block cipher
Manipulates an entire block of
plaintext at one time
Plaintext message is divided into separate
blocks of 8 to 16 bytes
Each block is encrypted independently
Symmetric Cryptographic
Algorithms
Type 1 encryption
Restricted to the US Government, Military,
and Intelligence agencies. Suitable for highly
(up to Top Secret) classified information,
the customer must have a NSA
COMSEC Account to obtain.
COMSEC Level Classifications
Type 2 encryption
Restricted to the US Government and
Military, suitable for unclassified information.
COMSEC Level Classifications
Type 3 encryption
Restricted to US and Canadian companies
and citizens. Used in some LMRs
to protect sensitive but unclassified information
in non-tactical operations.
COMSEC Level Classifications
Type 4 encryption
Generally available to international companies and
citizens, subject to export approval.
Suitable for Sensitive But Unclassified
or "SBU" information.
COMSEC Level Classifications
Type 5 encryption
Fairly unrestricted public key version of
Type 4 equipment, very exportable,
and available for private sale.
Summary