Cryptografía
fundamentos principales
InformatioN
Security objectives
Cryptographic
Primitives
Transformation
The cryptographic goal
Encryption
Domains & Co-Domains
authentication
The Identity of a Subject
Access Control
LEast privileges and others
Encryption
This is the Way
Attacks
Types of Attacks
Cryptography has 2 important SpacesMessage Space (Plaintext): A set of plaintext messages derived from an alphabet. Ciphertext Space: A set where encrypted messages, or ciphertexts, are represented, possibly using a different alphabet.
¿Tienes una idea?
Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:
- Visita las preferencias de Analytics;
- Activa el seguimiento de usuarios;
- ¡Que fluya la comunicación!
Authentication
Authentication confirms the identity of a subject, such as a user or device, through two steps: Identification: Asserting an identity. Authentication: Proving that asserted identity.
bases of authentication:
Something you know (passwords).Something you are (biometrics). Something you have (ID badges).
Cryptographic primitives are evaluated based on:
- Security Level - Measured by the complexity of defeating it.
- Functionality - The specific needs each primitive addresses.
- Performance - Efficiency in processing data.
- Ease of Implementation - Feasibility in software or hardware.
Key Objectives
Confidentiality - Keeping information accessible only to authorized individuals. Data Integrity - Ensuring data has not been altered unauthorizedly. Authentication - Confirming the identity of entities involved. Non-repudiation - Preventing denial of previous actions, crucial in situations like digital contracts.
Access Controls
Access control limits access to resources based on policies, defining who (subjects) can access what (objects) and how. This includes mechanisms like: Access control lists (ACLs): Listing permitted actions for each user. Role-based access control (RBAC): Assigning permissions based on roles, enhancing manageability and scalability.
Attack Types
- Interception: Unauthorized access to information, compromising confidentiality.
- Interruption: Disrupting services, harming availability.
- Modification: Unauthorized changes to data, affecting integrity.
- Fabrication: Introducing fake data, violating integrity.
Encryption Types
Encryption transforms data so that only authorized parties can access it. Key encryption concepts include:
- Symmetric Encryption: Uses the same key for encryption and decryption, efficient but challenging in key distribution.
- Asymmetric Encryption: Utilizes a public and private key pair, facilitating secure exchanges without prior key sharing.
- Message Digests: Cryptographic hashes that ensure data integrity by producing a unique output for each unique input.
- Digital Signatures and Certificates: Use asymmetric encryption to verify sender identity and data integrity, essential for secure communication.
Encryption
Decryption
- Encryption involves transforming plaintext messages into ciphertext using a key
- Encryption schemes are defined by a set of transformations, each assigned a unique key to enhance security.
- decryption reverses this process with a corresponding key
U1A1-Cryptografia-CristhianJimenez
Cristhian Jimenez
Created on November 3, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Akihabara Connectors Infographic
View
Essential Infographic
View
Practical Infographic
View
Akihabara Infographic
View
Vision Board
View
The Power of Roadmap
View
Artificial Intelligence in Corporate Environments
Explore all templates
Transcript
Cryptografía
fundamentos principales
InformatioN
Security objectives
Cryptographic
Primitives
Transformation
The cryptographic goal
Encryption
Domains & Co-Domains
authentication
The Identity of a Subject
Access Control
LEast privileges and others
Encryption
This is the Way
Attacks
Types of Attacks
Cryptography has 2 important SpacesMessage Space (Plaintext): A set of plaintext messages derived from an alphabet. Ciphertext Space: A set where encrypted messages, or ciphertexts, are represented, possibly using a different alphabet.
¿Tienes una idea?
Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:
Authentication
Authentication confirms the identity of a subject, such as a user or device, through two steps: Identification: Asserting an identity. Authentication: Proving that asserted identity.
bases of authentication: Something you know (passwords).Something you are (biometrics). Something you have (ID badges).
Cryptographic primitives are evaluated based on:
Key Objectives
Confidentiality - Keeping information accessible only to authorized individuals. Data Integrity - Ensuring data has not been altered unauthorizedly. Authentication - Confirming the identity of entities involved. Non-repudiation - Preventing denial of previous actions, crucial in situations like digital contracts.
Access Controls
Access control limits access to resources based on policies, defining who (subjects) can access what (objects) and how. This includes mechanisms like: Access control lists (ACLs): Listing permitted actions for each user. Role-based access control (RBAC): Assigning permissions based on roles, enhancing manageability and scalability.
Attack Types
Encryption Types
Encryption transforms data so that only authorized parties can access it. Key encryption concepts include:
Encryption
Decryption