Intro To Cyber

Lecture 4 & 5

Date Taken: Fall 2025
Status: Completed
Reference: LSU Professor Joseph Khoury, ChatGPT

Public Key Infrastructure (PKI)

PKI is a framework of technologies, policies, and procedures used to manage digital keys and certificates to enable secure electronic communication. PKI is the backbone for many security services like HTTPS, digital signatures, and encrypted emails.

Key Components:

Symmetric Encryption

Symmetric encryption uses the same (shared) key for both encryption and decryption. It is fast and efficient for large amounts of data but requires secure key distribution.

Symmetric Key Encryption

Attacking Symmetric Encryption

Attacking symmetric encryption means trying to break or weaken a cryptographic system that uses the same key for encryption and decryption. Understanding these attacks is essential for learning how to design or choose secure algorithms. Here's some examples:

Attacking Symmetric Key Encryption

Data Encryption Standard (DES)

DES is a symmetric-key algorithm for the encryption of digital data. It was widely used in the past but is now considered insecure due to its short key length (56 bits), making it vulnerable to brute-force attacks.

Triple DES (3DES)

Triple DES (3DES) is an enhancement of the original DES algorithm that applies the DES encryption process three times to each data block. It was developed to provide a more secure alternative to DES, which had become vulnerable to brute-force attacks due to its short key length.

Advanced Encryption Standard (AES)

AES is a widely used symmetric encryption algorithm that provides strong security and efficiency. It is the standard for encrypting sensitive data and is used in various applications, including secure communications, data storage, and financial transactions. This became the standard in 2001, replacing DES and 3DES due to their vulnerabilities.

Average Time for Key Search

Practical Security Issues

Several practical security issues can arise when implementing and using encryption systems. These issues can compromise the effectiveness of encryption and expose sensitive data to unauthorized access. Typically, symmetric encryption is applied to a unit of data larger than a single 64-bit or 128-bit block. This is done using a mode of operation, which defines how to repeatedly apply the cipher's single-block operation to securely transform amounts of data larger than a block. Common modes include ECB (Electronic Codebook), CBC (Cipher Block Chaining), and GCM (Galois/Counter Mode). Some common practical security issues include:

Types of Symmetric Encryption

Block & Stream Ciphers

Block ciphers and stream ciphers are two types of symmetric encryption algorithms used to secure data. They differ in how they process and encrypt data, making them suitable for different use cases.

Message Authentication

Message authentication ensures that a message has not been altered and verifies the sender's identity. It provides integrity and authenticity to communications, preventing tampering and impersonation.

Message Authentication Without Confidentiality

Message authentication without confidentiality focuses on ensuring the integrity and authenticity of a message without encrypting its content. This approach is useful when the message needs to be publicly readable but still requires verification that it has not been altered and comes from a legitimate source.

Message Authentication Code Message Authentication Hash

Security Hash Functions

Security hash functions are cryptographic algorithms that take an input (or 'message') and produce a fixed-size string of characters, typically a hash value or digest. They are designed to be fast to compute and difficult to reverse-engineer, ensuring that even a small change in the input results in a significantly different hash value. There are two approaches to attacking a secure hash function:

Common security hash functions include SHA-256 , SHA-3, and BLAKE2, which are widely used in digital signatures, data integrity verification, and password hashing. Secure Hash Algorithms (SHA) are a family of cryptographic hash functions designed to provide data integrity and authenticity. SHA-1, SHA-2 (including SHA-256 and SHA-512), and SHA-3 are commonly used variants, with SHA-256 being widely adopted for its balance of security and performance.

Public-Key Encryption Syructure

Public-key encryption, also known as asymmetric encryption, uses a pair of keys: a public key for encryption and a private key for decryption. This structure allows secure communication without the need to share a secret key in advance.

Punlic Key Cryptography Public Key Cryptography Appilications of Public Key Cryptography

Requirements For Public-Key Cryptosystems

Public-key cryptosystems must meet several requirements to ensure secure and effective communication. These requirements include:

Asymmetric Encryption Algorithms

Asymmetric encryption algorithms use a pair of keys (public and private) for secure communication. Public keys are used for encryption, while private keys are used for decryption. Common asymmetric encryption algorithms include:

Simplified Depiction of Essential Elements of Digital Signature Process Public-Key Certificate Use Digital Envelope

Random Numbers

Random numbers are essential in cryptography for generating keys, initialization vectors, and nonces. They must be unpredictable and uniformly distributed to ensure the security of cryptographic systems. There are two main types of random number generators: