{"id":55804,"date":"2023-12-11T02:43:59","date_gmt":"2023-12-11T07:43:59","guid":{"rendered":"https:\/\/euvolution.com\/open-source-convergence\/uncategorized\/cryptography-101-key-principles-major-types-use-cases-splunk.php"},"modified":"2023-12-11T02:43:59","modified_gmt":"2023-12-11T07:43:59","slug":"cryptography-101-key-principles-major-types-use-cases-splunk","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-101-key-principles-major-types-use-cases-splunk.php","title":{"rendered":"Cryptography 101: Key Principles, Major Types, Use Cases &#8230; &#8211; Splunk"},"content":{"rendered":"<p><p>    Cryptography is fundamental to many     information security and privacy mechanisms. Today, a    variety of cryptographic algorithms are used in many different    applications.  <\/p>\n<p>    This article explains cryptography: how it works, key    principles or operations of cryptography, types of    cryptography, use cases and more!  <\/p>\n<\/p>\n<p>    Cryptography can refer to any approach that hides real    information, using codes, to prevent reading by unauthorized    parties. Cryptography can protect:  <\/p>\n<p>    Cryptography increasing relies on mathematical concepts  a set    of encryption algorithms and hashing algorithms  to transform    information in a way that is difficult to interpret or    crack.  <\/p>\n<p>    For example, suppose communication between two parties is    secured using cryptographic principles. The senders message is    typically known as the Plaintext. It is transformed into an    unreadable format called Ciphertext using the encryption key.    When the receiver gets the messages, the Ciphertext is    transformed into plaintext using the decryption key.  <\/p>\n<p>    Lets now turn to the principles that underpin cryptography.  <\/p>\n<p>    Confidentiality agreements have rules and guidelines to keep    the information secure and private. Confidentiality must be    protected using techniques like encryption. It ensures that    only authorized people can access the information at certain    places  and it restricts access to other unauthorized    parties.  <\/p>\n<p>    (Confidentiality is one component of the     CIA security triad.)  <\/p>\n<p>    The process of confirming that the person who sent a specific    message is the sender of that message. This principle ensures    the receiver receives the message from a sender who is    permitted to do so. Two common authentication mechanisms are:  <\/p>\n<p>    Encryption is the process of transforming information into an    unreadable format using an encryption algorithm to protect the    privacy of the information. Only the receiver can read them    using the decryption key.  <\/p>\n<p>    (Read our     end-to-end encryption explainer.)  <\/p>\n<p>    The data should be consistent and accurate without any    alterations while in transit from the sender to the receiver.    Data integrity ensures that no manipulation has been done to    the data during its lifecycle using techniques like    cryptographic hashing.  <\/p>\n<p>    The non-repudiation principle ensures that the message sender    cannot repudiate the authenticity of his signature using    techniques like digital signatures.  <\/p>\n<p>    Key    management is the process of maintaining cryptographic    keys. It includes tasks like key distribution, generation,    rotation, etc. Key management is vital to ensuring the maximum    security of a cryptography system as its security heavily    relies on cryptographic keys.  <\/p>\n<p>    There are three major types of cryptography. Lets get to know    them in this section.  <\/p>\n<p>    Symmetric-key cryptography involves encrypting and decrypting    using the same cryptographic keys. Here, the sender and all    receivers share a common secret key. The plaintext messages are    transformed into cipher text using a particular encryption key.    The receiver can use the same encryption key to decrypt the    message using the shared secret key.  <\/p>\n<p>    Examples of symmetric-key encryption algorithms include:  <\/p>\n<p>    The major drawback of this symmetric-key encryption is sharing    the secret key. The shared secret must be encrypted to prevent    unauthorized access. It can be an additional overhead for    cryptographic applications.  <\/p>\n<\/p>\n<p>    This type of cryptography, known as \"public-key cryptography,\"    uses different cryptographic keys for the encryption and    decryption processes. The sender and the receiver have a    private key and a public key:  <\/p>\n<p>    Though there is a mathematical connection between these private    key and public key pairs, the public key cannot    generate the private key.  <\/p>\n<p>    Public key cryptography is commonly used in digital signatures    for message authentication. Senders use their private keys to    digitally sign their messages to prove their authenticity.    Thus, the receiver knows exactly that the sender is a trusted    third party.  <\/p>\n<p>    Of the variety of asymmetric (or public key) cryptography    algorithms, here are some examples:  <\/p>\n<p>    Hash functions compute a fixed-length hash value or a    fingerprint on the plain text message. These hashes are    unique to each plaintext. Therefore, this type of cryptography    does not use a cryptographic key. Hash functions help ensure    data integrity between communicating parties. If the hash    produces the same output, it indicates that the information has    not been altered, compromised or damaged.  <\/p>\n<\/p>\n<p>    Hash functions are used in many cryptographic algorithms and    protocols, including MAC algorithms, digital signature    algorithms, and authentication protocols. Some of the most    common hashing algorithms include:  <\/p>\n<p>    In addition to the three major cryptography types, hybrid    encryption is another type used to secure data and    communications.  <\/p>\n<p>    Hybrid encryption combines public-key cryptography with    symmetric encryption for     data encryption. This cryptographic type generates a    private key and encrypts it using the public key. Then the    complete message with the encrypted private key will be    encrypted with the original symmetric key. The encoded message    can be decrypted only if the recipient knows the original    private key.  <\/p>\n<p>    Hybrid encryption performs randomization for the encryption so    that no two messages will have the same ciphertext. It makes    the encryption more secure.  <\/p>\n<p>    With the concepts explained, lets turn to the most common use    cases of cryptography  what are people actually using    cryptography for?  <\/p>\n<p>    Storing passwords like database passwords in plain text is    risky  anyone who can access the password storage can read    them. Instead, such passwords are encrypted or hashed using a    hashing algorithm as a security best practice. Whenever the    system refers to it, it will be hashed and compared to the    hashed value.  <\/p>\n<p>    Cryptocurrencies like Bitcoin and Ethereum use cryptographic    algorithms such as elliptic-curve cryptography, hash functions    and many more to maintain the security and privacy of    transactions. Blockchain nodes are secured with cryptography to    let users securely trade with other users.  <\/p>\n<p>    (Whats the     state of blockchain today?)  <\/p>\n<p>    Digital signatures are one of the applications of public key    cryptography that provide authenticity and data integrity. The    sender generates a unique signature using the private key and    attaches it to the document, which needs to be verified using    the public key.  <\/p>\n<p>    Organizations generate     significant volumes of data (upwards of 2.5 quintillion    bites per day). Storing that can be     a risk. Encrypting data in storage makes it more secure and    prevents data leakage. Most cloud solutions nowadays provide    encryption options along with storage options, including backup    drives.  <\/p>\n<p>    Additionally, automatic encryption can be enabled when data is    in transit to the storage and while at rest.  <\/p>\n<p>    Cryptography has enabled secure communications over the    internet by encrypting communication protocols. For example,    using HTTPS in the URL indicates connecting to a secure website    that encrypts the data. It is particularly useful for payment    gateways, where a secure communication channel needs to be    created to avoid the leakage of sensitive information.  <\/p>\n<p>    Another example is the SSH protocol that most people use for    tunneling and remote login.  <\/p>\n<p>    Most organizations use file encryption to protect email    communications, including sensitive conversations and    attachments. For example, S\/MIME encryption and Microsoft 365    message encryption are used to secure Microsoft 365 email    messages. Additionally, PGP\/MIME (Pretty    Good Privacy\/Multipurpose Internet Mail Extensions) is    another popular type of email encryption supported by Yahoo,    AOL and Android devices.  <\/p>\n<p>    Weve already named these in this article, so lets take a    brief look at how some common cryptographic algorithms work.  <\/p>\n<p>    The     Advanced Encryption Standard (AES) is a symmetric    encryption algorithm used by many governments worldwide. It was    established by the National Institute of Standards and    Technology (NIST) in the U.S.  <\/p>\n<p>    The key sizes of the AES block cipher can be 128, 192, and 256    bits, and encryption happens in blocks of 128 bits each.    Considered a strong cryptographic algorithm, more secure than    DES and Triple DES, AES is unbreakable by many attacks.  <\/p>\n<p>    The RSA (Rivest-Shamir-Adleman) algorithm is an asymmetric    encryption algorithm invented by Ron Rivest, Adi Shamir and    Leonard Adleman in 1978. It is used to encrypt data and    communications over the internet and for email    encryption.  <\/p>\n<p>    However, there are still several exploitable vulnerabilities in    the RSA. For example, researchers were able to crack a key    768-bit RSA algorithm. It is recommended to use 2048 bits as    the key length.  <\/p>\n<p>    The     Triple Data Encryption Standard (DES) provides more    security than the standard DES algorithm by using three passes    of the DES rather than one. The security of standard DES was    found to be less secure than AES. It uses 56-bit length    keys.  <\/p>\n<p>    ECC is a public-key encryption technique that uses the    algebraic architecture of elliptic curves with finite fields    and uses encryption, signatures, and key exchange. ECC is used    in applications like online banking, email encryption, and    secure payments.  <\/p>\n<p>    (Check out our     elliptcal curve cryptography explainer.)  <\/p>\n<p>    Cryptography is the heart of security and privacy mechanisms    worldwide. It transforms plain-text data into ciphertext in an    unreadable format using encryption algorithms. As technology    advances, well see growth in more kinds of cryptography. For    example,     homomorphic encryption is a fledging technology. And then     consider what     quantum computing might mean for encryption.  <\/p>\n<p>    This posting does not necessarily represent Splunk's    position, strategies or opinion.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/cryptography.html\" title=\"Cryptography 101: Key Principles, Major Types, Use Cases ... - Splunk\" rel=\"noopener\">Cryptography 101: Key Principles, Major Types, Use Cases ... - Splunk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cryptography is fundamental to many information security and privacy mechanisms. Today, a variety of cryptographic algorithms are used in many different applications. This article explains cryptography: how it works, key principles or operations of cryptography, types of cryptography, use cases and more! Cryptography can refer to any approach that hides real information, using codes, to prevent reading by unauthorized parties. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-55804","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/55804"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=55804"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/55804\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=55804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=55804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=55804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}