Want to create interactive content? It’s easy in Genially!

Reuse this genially

U1A1-Cryptografia-CristhianJimenez

Cristhian Jimenez

Created on November 3, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Akihabara Connectors Infographic

Essential Infographic

Practical Infographic

Akihabara Infographic

Vision Board

The Power of Roadmap

Artificial Intelligence in Corporate Environments

Transcript

Cryptografía

fundamentos principales

InformatioN

Security objectives

Cryptographic

Primitives

Transformation

The cryptographic goal

Encryption

Domains & Co-Domains

authentication

The Identity of a Subject

Access Control

LEast privileges and others

Encryption

This is the Way

Attacks

Types of Attacks

Cryptography has 2 important SpacesMessage Space (Plaintext): A set of plaintext messages derived from an alphabet. Ciphertext Space: A set where encrypted messages, or ciphertexts, are represented, possibly using a different alphabet.

¿Tienes una idea?

Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:

  • Visita las preferencias de Analytics;
  • Activa el seguimiento de usuarios;
  • ¡Que fluya la comunicación!

Authentication

Authentication confirms the identity of a subject, such as a user or device, through two steps: Identification: Asserting an identity. Authentication: Proving that asserted identity.

bases of authentication: Something you know (passwords).Something you are (biometrics). Something you have (ID badges).

Cryptographic primitives are evaluated based on:

  • Security Level - Measured by the complexity of defeating it.
  • Functionality - The specific needs each primitive addresses.
  • Performance - Efficiency in processing data.
  • Ease of Implementation - Feasibility in software or hardware.

Key Objectives

Confidentiality - Keeping information accessible only to authorized individuals. Data Integrity - Ensuring data has not been altered unauthorizedly. Authentication - Confirming the identity of entities involved. Non-repudiation - Preventing denial of previous actions, crucial in situations like digital contracts.

Access Controls

Access control limits access to resources based on policies, defining who (subjects) can access what (objects) and how. This includes mechanisms like: Access control lists (ACLs): Listing permitted actions for each user. Role-based access control (RBAC): Assigning permissions based on roles, enhancing manageability and scalability.

Attack Types

  • Interception: Unauthorized access to information, compromising confidentiality.
  • Interruption: Disrupting services, harming availability.
  • Modification: Unauthorized changes to data, affecting integrity.
  • Fabrication: Introducing fake data, violating integrity.

Encryption Types

Encryption transforms data so that only authorized parties can access it. Key encryption concepts include:

  • Symmetric Encryption: Uses the same key for encryption and decryption, efficient but challenging in key distribution.
  • Asymmetric Encryption: Utilizes a public and private key pair, facilitating secure exchanges without prior key sharing.
  • Message Digests: Cryptographic hashes that ensure data integrity by producing a unique output for each unique input.
  • Digital Signatures and Certificates: Use asymmetric encryption to verify sender identity and data integrity, essential for secure communication.

Encryption

Decryption

  • Encryption involves transforming plaintext messages into ciphertext using a key
  • Encryption schemes are defined by a set of transformations, each assigned a unique key to enhance security.
  • decryption reverses this process with a corresponding key