Advertisement
Guest User

Untitled

a guest
Oct 15th, 2019
98
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.33 KB | None | 0 0
  1. KKKK
  2. 2222
  3. TTTT
  4. AA88
  5.  
  6. Cryptography is the study of techniques used for secure communication
  7. For information security you need to be able to store passwords or exchange
  8. information such as messages securely between computers which relies on
  9. cryptography to keep the information safe.
  10. Before the digital age cryptography primarily referred to the encryption and
  11. decryption of messages to and from text intended to be indecipherable except
  12. by the intended recipients.
  13. With the computer era cryptography is much more math-heavy.
  14. Various encryption models or protocols were designed for
  15. transmission of electronic data including the Data Encryption Standard by IBM.
  16. Following their work, an encryption algorithm is considered secure enough if
  17. it is mathematically difficult enough to decode.
  18. The computational hardness assumption assumes that attackers or eavesdroppers
  19. don't have unlimited computing resources to decode your communications.
  20.  
  21. With symmetric-key cryptography the sender and receiver of a message use the
  22. same key to encrypt and decrypt a message. This can make it difficult when
  23. trying to make messages secure among many people as every distinct message
  24. between a pair of users or group of users would need a distinct key.
  25. In public-key cryptography, a public key is used to encrypt data while a private
  26. key is used to decrypt it; the two keys are mathematically related while also
  27. not simply being able to be determined from the other one.
  28. hashing is a type of encryption that scrambles input and cannot be reversed easily,
  29. however, by using something called rainbow tables, password crackers
  30. store the output of many common passwords put through common hashing algorithms
  31. allowing weak passwords to be reverse-looked up in these tables.
  32.  
  33. secure messaging apps such as telegram automatically use cryptography to make
  34. sure your information is secure.
  35. when working with cryptography the goal is closely tied to information security:
  36. you want to be able to make sure users can only access data they have permission
  37. to access with data confidentiality,
  38. you want to make sure users are who they say they are;
  39. you want to make sure that data is not lost when encrypting it
  40. and for some applications you want to make sure some user actions or messages have
  41. a signature attached that proves it was sent by a specific person:
  42. for example, if I agree to pay someone for a service over electronic communication
  43. and sign it digitally, I shouldn't be able to go back and say that I never made
  44. an agreement.
  45.  
  46. defensive strategies to avoid cryptography include
  47. not using websites that store passwords in anything other than plain text
  48. as websites use encryption to prevent anyone from seeing your password.
  49. even if they "store" your password in a database, it's going to look
  50. like jibberish
  51. in fact, most of the internet uses encryption to a degree
  52. but maybe "how do I avoid cryptography?" isn't the question
  53. we shouldn't be asking here
  54.  
  55. to avoid cryptographic vulnerabilities, companies should
  56. implement well-tested algorithms instead of designing their own
  57. such as AES, RSA or SHA-256.
  58. data should be secure not only during transmission but also during storage
  59. as message sending is not the only time data can be vulnerable.
  60. companies also should keep track of machine identities and signatures
  61. so hackers cannot create encrypted tunnels to hide in.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement