Page 550 - StudyBook.pdf
P. 550

534    Chapter 9 • Basis of Cryptography


              TEST DAY TIP

                  Literally thousands of different cryptographic algorithms have been
                  developed over the years. Cryptographic algorithms can be classified as
                  follows:

                      ■ Encryption Algorithms Used to encrypt data and provide con-
                        fidentiality
                      ■ Signature Algorithms Used to digitally “sign” data to provide
                        authentication
                      ■ Hashing Algorithms Used to provide data integrity

                      Algorithms (ciphers) are also categorized by the way they work at
                  the technical level (stream ciphers and block ciphers). This categoriza-
                  tion refers to whether the algorithm is applied to a stream of data,
                  operating on individual bits, or to an entire block of data. Stream
                  ciphers are faster, because they work on smaller units of data. The key is
                  generated as a keystream, which is combined with the plaintext to be
                  encrypted. RC4 is the most commonly used stream cipher. Another is
                  ISAAC.
                      Block ciphers take a block of plaintext and turn it into a block of
                  ciphertext. (Usually the block is 64 or 128 bits in size.) Common block
                  ciphers include DES, CAST, Blowfish, IDEA, RC5/RC6, and SAFER. Most
                  AES candidates are block ciphers.




                 Instead of relying on the techniques of substitution and transposition that sym-
             metric key cryptography uses, asymmetric algorithms rely on the use of large-
             integer mathematics problems. Many of these problems are simple to do in one
             direction but difficult to do in the opposite direction. For example, it is easy to
             multiply two numbers together, but it is more difficult to factor them back into the
             original numbers, especially if the integers used contain hundreds of digits.Thus, in
             general, the security of asymmetric algorithms is dependent not upon the feasibility
             of brute-force attacks, but the feasibility of performing difficult mathematical
             inverse operations and advances in mathematical theory that may propose new
             “shortcut” techniques.
                 Asymmetric cryptography is much slower than symmetric cryptography.There
             are several reasons for this. First, it relies on exponentiation of both a secret and
             public exponent, as well as generation of a modulus. Computationally, exponentia-
             tion is a processor-intensive operation. Second, the keys used by asymmetric algo-



          www.syngress.com
   545   546   547   548   549   550   551   552   553   554   555