Ir al contenido principal

Symmetric Cryptography and Asymmetric Cryptography (Symmetric Encryption Asymmetric Encryption and)

Encryption or Encryption Standard Data

Symmetric cryptography is a cryptographic method which uses the same key to encrypt and decrypt messages. The two communicating parties have to agree in advance on the key to use. Once both have access to this key, the sender encrypts a message using it, send it to the recipient, and the receiver decrypts with it.

Security

A good cipher puts all the security in the key and nothing in the algorithm. In other words, it should be of no help to an attacker to know the algorithm being used. Only if he obtains the key would knowledge of the algorithm. Encryption algorithms are widely used these properties (for example, GnuPG on GNU).

Since all the security is the key, it is important to be very difficult to guess the key. This means that the range of possible keys, ie, the space of possible keys must be broad. Richard Feynman was famous in Los Alamos for its ability to crack safes, to fuel the legend that he had around him, carried around a set of tools including a stethoscope. In fact, he used a variety of tricks to reduce the amount a small number of combinations to be tested, and then simply guessed until he found the right combination. In other words, reducing the size of the key space.

Currently, computers can decrypt keys very quickly, and this is the reason why the key size is important in modern cryptosystems. The cipher DES uses a 56-bit key, which means that there are 2 to 56 possible keys (key 72.057.594.037.927.936). This represents a very large number of keys, but a generic computer can check the possible set of keys in a matter of days. A specialized machine can do in hours. Encryption algorithms such as 3DES latest design, Blowfish and IDEA uses 128-bit keys, which means that there are 2 to 128 possible keys. This equates to many more keys, and even if all the machines on the planet cooperated, it would take longer to find the key to the universe's age.

Examples

As an example of symmetric system is Enigma. This was a system used by Germany during World War II, where the daily keys were distributed as code books. Each day, a radio operator, receiver or transmitter would consult his copy of the codebook to find the key of the day. All traffic sent by radio waves on that day was then encrypted and decrypted using the keys of the day.

Britain used machines to decrypt the keys during the war and although the aforementioned German system, Enigma, was fitted with a large key, the British built specialized computing engines, the Bombes to check the keys mechanically until the key the day was found. This meant that sometimes they found the day's key within hours after it was put in use, but also on other days could not find the right key. The Bombes were not general-purpose computers, but the forerunners of computers (PCs) today.

Some examples of symmetric ciphers include 3DES, AES, Blowfish and IDEA.

Drawbacks

The primary problem with symmetric ciphers is not tied to its security but with key exchange. Once the sender and receiver have exchanged keys can use them to communicate securely, but what communication channel is secure have been used to transmit the keys? It would be much easier for an attacker to intercept the key combinations to test the key space.

Another problem is the number of keys needed. If there are n people who need to communicate with each other, it takes n / 2 keys for each pair of people who have to communicate privately. This can work with a small group of people, but it would be impossible to carry out larger groups.

Asymmetric Cryptography

Asymmetric cryptography is the cryptographic method that uses a key pair for sending messages. The two keys belong to the same person who sent the message. One key is public and can be delivered to any person, the other key is private and the owner must keep it so that nobody has access to it. Also, cryptographic methods ensure that key pair can be generated only once, so you can assume it is not possible for two people happened to have obtained the same key pair.

If the sender uses the recipient's public key to encrypt the message once encrypted, only the recipient's private key can decrypt this message, since it is the only one who knows. Therefore confidentiality is achieved sending the message, no one but the recipient can decrypt it.

If the key pair owner uses his private key to encrypt the message, anyone can decrypt it using your public key. In this case is achieved by both the sender authentication identificacióny, since it is known that only could have been he who employed his private key (unless someone could have stolen it). This idea is the foundation of electronic signatures.

Systems of public key encryption or asymmetric ciphers were invented in order to completely avoid the problem of key exchange for symmetric ciphers. With the public key is not necessary for the sender and receiver agree on the key used. All that is required is that before secret communication the sender gets a copy of the recipient's public key. Moreover, the same public key can be used by anyone wishing to communicate with its owner. Therefore, we need only n key pairs for each n people to communicate.
 

Bases

Encryption systems are based on public key-trap functions one way to take advantage of particular properties, such as prime numbers. A function is one way that is easy to compute, while their investment is extremely difficult. For example, it is easy to multiply two prime numbers together to get a composite, but is difficult to factor a composite into its prime components. A function-way trapdoor is similar, but has a "trap". This means that if you know any piece of information would be easy to compute the inverse. For example, if we have a number composed of two prime factors and knowing one of the factors, it is easy to compute the second.

Given a public key encryption based on prime factorization, the public key contains a composite of two large prime factors, and the encryption algorithm uses that composite to encrypt the message. The algorithm to decrypt the message requires knowing the prime factors, so decryption is easy if you have the private key containing one of the factors but extremely difficult otherwise.

Security

As with good symmetric ciphers, with a good system of public-key encryption all security rests with the key, not the algorithm. Therefore, the key size is a measure of system security, but does not compare the size of the symmetric encryption key with the public key encryption for security measure. In a brute force attack on a symmetric cipher with a key size of 80 bits, the attacker must try to 280-1 keys to find the right key. In a brute force attack on a public key encryption with a key size of 512 bits, the attacker must factor a composite number encoded in 512 bits (up to 155 decimal digits). The workload for the attacker will be different depending on the cipher he is attacking. While 128 bits is sufficient for symmetric ciphers, given the factoring technology today, we recommend using 1024-bit public keys for most cases.

Disadvantages of asymmetric encryption

The biggest advantage of asymmetric cryptography is that you can encrypt and decrypt a key with the other, but this system has several downsides:

For the same key length and message you need more processing time.
Keys must be larger than symmetrical.
The encrypted message takes up more space than the original.

The system of elliptic curve cryptography represents a less expensive alternative to these problems.

Tools like PGP, SSH or SSL security layer to the hierarchy of TCP / IP using a hybrid consisting of asymmetric cryptography to exchange symmetric key cryptography and symmetric cryptography to transmit information.

Algorithms

Some algorithms asymmetric key techniques are

  • Diffie-Hellman
  • RSA
  • DSA
  • ElGamal
  • Elliptic Curve Cryptography

Other asymmetric key algorithms but unsafe:
  • Merkle-Hellman algorithms "Knapsack".
  • Protocols

Some protocols that use the algorithms mentioned above are

  • DSS ("Digital Signature Standard") with the DSA algorithm ("Digital Signature Algorithm")
  • PGP
  • GPG, an implementation of OpenPGP
  • SSH
  • SSL, now an IETF standard
  • TLS

Comentarios

Entradas populares de este blog

Ábaco y Tipos de Ábacos (Marco de Contar - Calculadora Manual)

El Ábaco, antigua Herramienta de Cálculo Manual, aún usada en la actualidad Fuente Foto Ábumes Web Picasa Licencia:  Click Aquí Definición Ábaco también llamado marco de contar, es una herramienta de cálculo utilizado principalmente en partes de Asia para el ejercicio de procesos de aritmética. Hoy en día, ábacos se construyen a menudo como un marco de bambú con cuentas deslizantes sobre alambres, pero originalmente eran frijoles o piedras, posteriormente se trasladó en las ranuras en la arena o en unas tablitas de madera, piedra o metal. El ábaco fue durante siglos antes de la adopción del sistema escrito de numerales modernos y sigue siendo ampliamente utilizado por los comerciantes, los comerciantes y dependientes de Asia, África y otros lugares. El usuario de un ábaco se llama un abacist.  Más sobre Definición Ábaco Etimología del Ábaco El uso de la palabra ábaco data de fechas anteriores al 1387 D.C., cuando un Inglés en medio del trabajo pre...

Tipos de Ábacos, Ábaco Cranmer para Invidentes o Ciegos

Ábaco Cranmer  p ara Personas Ciegas o  Invidentes Fuente Imagen Wikimedia Commons Definición Básica, Ábaco Cranmer para Invidentes Es un "ábaco inventado por Tim Cranmer", de ahí su nombre, llamado comúnmente Ábaco de Cranmer aún comúnmente utilizado por las personas que son invidentes, limitadas visualmente o ciegas. Características del Ábaco Cranmer para Invidentes Una de las principales características del ábaco de Cranmer; es que las esferas, semillas o perlas de conteo, no se deben mover sin que el usuario lo haga, con el fin de evitar ello y facilitar las operaciones realizadas con este, Tim Cranmer, ideó un mecanismo que trabara o frenara dichas esferas, semillas o perlas con el fin de facilitar la manipulación del mismo, Un trozo de tela suave o de goma se coloca detrás de los granos de manera para que no se muevan inadvertidamente. Lo anterior, evita que los granos se muevan de su lugar, mientras los usuarios se sientan a manipularlos, po...

Alfabeto tambien conocido como Abecedario o ABC

Un Alfabeto,  Abecedario o ABC : Es un conjunto estandarizado de letras y símbolos escritos base o grafemas. Cada uno de los cuales aproximadamente representa un fonema en un lenguaje hablado, ya sea tal y como existe ahora o como lo fue en el pasado. Imagen Alfabeto Básico Español  "Letra cursiva" Fuente: Wikimedia Commons Imagen de Dominio Público Hay otros  Sistemas de Alfabeto , abecedario o abc, Tales como logografías, en el que cada carácter representa una palabra, morfema, una unidad semántica; y silabarios. En el que cada carácter representa una sílaba del  alfabeto , abecedario o abc . Clasificación de los Alfabetos, Abecedarios o ABC Los alfabetos, abecedarios o abc, se clasifican según la forma en que indican las vocales de la siguiente forma: Del mismo modo que las consonantes, como en el alfabeto, abecedario o abc Griego (Alfabeto verdadero)  Diacríticos o modificación de las consonantes, co...

Músculo abductor del dedo meñique del pie

Músculo Abductor del Dedo Meñique del Pie y su importancia en el Equilibrio Corporal Fuente Wikimedia Commons Abductor del Dedo Quinti - (Músculo abductor del dedo meñique del pie) Es un músculo que se encuentra a lo largo del borde lateral del pie, y está en relación por su borde medio con los vasos y nervios plantares laterales. El músculo Abductor del dedo meñique del pie surge ampliamente, desde el proceso lateral de la tuberosidad del calcáneo;  Inicia desde la superficie inferior del calcáneo entre los dos procesos de dicha tuberosidad, hacia la parte delantera del proceso interno del plantar aponeurosis; y se extiende al tabique intermuscular entre éste y el Flexor corto de los dedos de los pies. Extensión  - (Músculo abductor del dedo meñique del pie)   El músculo  Abductor  del dedo meñique del pie cubre por así decirlo el tendón. Después de deslizarse suavemente sobre la superficie inferior de la base de la quinto m...

Escultura de Michael Jackson, su Infancia y Adolescencia

Michael Jackson, Escultura del Rey del Pop Fuente Wikimedia Commons Dominio Público Los Primeros años de Michael Jackson y los Jackson 5 (1958-1975) Michael Jackson, nació el 29 de agosto de 1958, el octavo de diez hijos de una familia afroamericana de clase trabajadora, en Gary, Indiana, un suburbio industrial de Chicago. Su madre, Katherine Esther Scruse, Era una devota ferviente de los Testigos de Jehová; y su padre, Walter José "Joe" Jackson, Era un trabajador de fábrica de acero que se realiza con una banda de R&B(Rhythm and Blues) llamado The Falcons. Michael Jackson, tuvo tres hermanas: Rebbie, La Toya; y Janet Jackson; y cinco hermanos: Jackie, Tito, Jermaine, Marlon; y Randy Jackson. Un sexto hermano de Michael Jackson, llamado: Brandon, murió poco después de su nacimiento. Michael Jackson, su Infancia, Adolescencia; y su Díficil relación con su Padre Michael Jackson, tuvo una relación sumamente difícil con su padre, Joe el padre de Michael Ja...

Michael Jackson, In The Closet

In the Closet Michael Jackson Image Font  Wikipedia The song In The Closet Michael Jackson, was a kind of satirical response the King of Pop, by the constant accusations and rumors of the tabloid press, questioning their sexuality. Initially the song would be played by the Queen of Pop Madonna; and the King of Pop Michael Jackson, unfortunately there were some differences that could not agree and finally not performed together the song and / or video clip In The Closet. General Features - In The Closet Michael Jackson Type: Single Album: Dangerous Released: May 1992 Format: CD single Recorded: 1990/1991 Genres: R & B, Pop Duration: 6:31 Discoquera: Epic Records Authors: Michael Jackson, Teddy Riley Producers: Michael Jackson, Teddy Riley Musical Positioning Lists - In The Closet Michael Jackson # 6, US Billboard Hot 100 # 1 Top 10 Musical Chronology - In The Closet Michael Jackson 1992 - Remember the Time 1992 - In the Closet 1992 - ...

Human Nature de Michael Jackson

Human Nature, fue una de las primeras canciones, interpretadas por Michael Jackson, en sus inicios en solitario, paradójica y curiosamente la utilizó en sus ensayos para la que sería su última gira mundial "This is It", la cual nunca se realizaría por su deceso.  Características Generales - (Human Nature de Michael Jackson) Tipo: Sencillo Álbum: Thriller Lanzamiento: 3 de julio de 1983 Formato: 7" Single Géneros: Pop, Balada, R&B Disquera: Epic Records Autores: Steve Porcaro, John Bettis Productor: Quincy Jones Grabado en: 1982 Duración 4:06 Album Version, 3:45 Single Version Vídeo Clip: Sí Cronología Musical - (Human Nature de Michael Jackson)   (1983) Wanna Be Startin' Somethin' (1983) Human Nature (1983) P.Y.T. (Pretty Young Thing) Algunas Canciones del Álbum Thriller de Michael Jackson Billie Jean Human Nature P.Y.T. (Pretty Young Thing) Vídeo Clip - (Human Nature de Michael Jackson) En la Películ...

Michael Jackson, Human Nature

Human Nature Michael Jackson Fuente Imagen Flickr.com Human Nature, was one of the first songs, performed by Michael Jackson, in his early alone, paradoxical and curiously used it in his essays for what would be his last world tour "This Is It," which will never be realized by your death. General Characteristics - (Human Nature Michael Jackson) Type: Single Album: Thriller Released: July 3, 1983 Format: 7 "Single Genres: Pop, Ballad, R & B Record Label: Epic Records Authors: Steve Porcaro, John Bettis Producer Quincy Jones Recorded in: 1982 Duration 4:06 Album version 3:45 Single version Video Clip: Yes Musical Chronology - (Human Nature Michael Jackson) (1983) Wanna Be Startin 'Somethin' (1983) Human Nature (1983) P.Y.T. (Pretty Young Thing) Some Songs of the Album Thriller Michael Jackson Billie Jean Human Nature  P.Y.T. (Pretty Young Thing Video Clip - (Human Nature Michael Jackson) In the Moonwalker Mo...

Código de Comercio Colombiano - del Artículo 1555 al Artículo 1565

Código de Comercio Colombiano De la Navegación Acuática Generado con IA - 21/Nov./2023 Con la tecnología de DALL-E 3 Decreto 410 de 1971 - Libro Quinto - De la Navegación - Primera Parte - De la Navegación Acuática - Título VIII - Del Crédito Naval - Capítulo I - Privilegios en General Art. 1555.-  Los privilegios navales darán derecho al acreedor para perseguir la nave en poder de quien se halle y hacerse pagar con su producto preferentemente a los demás acreedores, según el orden establecido en este Título. Art. 1556.-  Tendrán el carácter de privilegiados sobre la nave, el flete del viaje durante el cual ha nacido el crédito privilegiado, los accesorios del flete adquiridos después de comenzado el viaje sobre todos los accesorios de la nave: Los impuestos y costas judiciales debidos al fisco, que se relacionen con la nave, las tasas y derechos de ayudas a la navegación o de puerto y demás derechos e impuestos de la misma clase, causados dura...

Abreviatura AA o aa (Sigla con diferentes significados)

Letra A-a Primera Letra y Vocal del Alfabeto Fuente Wikimedia Commons Imagen de Dominio Público La unión de la letra A con otra letra A puede tener múltiples significados, comúnmente son las siglas de diferentes organizaciones, empresas, significados, denominaciones, etc. ... A continuación algunas de las más conocidas: Abreviatura o Sigla AA en Organizaciones y Empresas A.A: Escuela de Arquitectura de la Architectural Association, la prestigiosa Escuela de Arquitectura con sede en Londres  A.A: Colegio de Arquitectos de Dinamarca (Akademisk Arkitektforening)  A.A: La Academia de Albany, una escuela independiente para chicos en Albany, Nueva York  A.A: Albuquerque Academia, una escuela independiente en Albuquerque , Nuevo México  A.A: Alcoa, una compañía estadounidense productora de aluminio con el símbolo de cotización bursátil de AA  A.A: Alcohólicos Anónimos, una comunidad mundial de personas que se recuperan del alcoholismo  A.A: Alin...