1/8

Cryptography

This material was developed with funding from the
National Science Foundation under Grant # DUE 1601612

Next

Restart

Back

Close

Symmetric

Algorithm
a mathematical procedure performed on data

Key
specifies the transformation of plaintext into ciphertext

Take a Quiz

Asymmetric

Digital
Signature

2/8

Click on each box for more information.

The use of cryptography to protect secrets by using codes and ciphers began thousands of years ago. Modern cryptography uses algorithms that use a key to encrypt and decrypt information.

1/5

As a child, you may have opened your cereal box to find a secret decoder ring as the prize inside the box. You could now send secret messages to your best friend that only he would be able to read.

If you want to send your friend a secret message, you would write out the message and use your secret decoder ring to change the characters of the original message to create ciphertext. If someone else found the ciphertext, he would not know what the message meant.

2/5

Original Plaintext

Decryption

Ciphertext

Symmetric Key

3/5

The secret decoder ring is an example of using a symmetric-key algorithm—the same cryptographic key both encrypts the original plaintext into ciphertext and decrypts the ciphertext back into plaintext.

Encryption

Asymmetric encryption uses two different, mathematically related keys to encrypt and decrypt messages (a key pair). A user has a public key which is available to anyone who wants to communicate securely. The user's private key remains protected on the device. The key pair is based on prime numbers having many digits. Since there is an infinite number of prime numbers available, the key pair remains secure.

1/6

Main Menu

Public Key

Private Key

Key Pair

Symmetric-key algorithms require that both the sender and the recipient of the message have the same secret key. Alice needs the same secret decoder ring as Bob to decode the message. How is Bob going to get Alice the same decoder ring? Distributing the key in a secure way is one of the challenges of symmetric encryption. For example, what happens to Bob's message if he loses or misplaces the ring?

4/5

Once Alice has a secret decoder ring, she also needs to know how Bob created the ciphertext. Bob’s ring used a very simple methodology—each alphabetic character is replaced by a numerical value. The key is that A=19, B=20, C=21; the value 1 corresponds to the letter “I”.

5/5

Alice’s
Private Key

If Bob wants to send Alice a message that only she could read, Bob would use Alice’s Public Key to encrypt the message. Because Alice’s key pair is mathematically related, whatever is encrypted with Alice’s Public Key can only be decrypted by Alice’s Private Key. The use of encryption maintains the confidentiality of the original message.

Confidentiality
information is not made available or disclosed to unauthorized individuals

Alice’s
Public Key

2/6

3/6

If Carol intercepts the message, she will not be able to decrypt and read it even though she also has access to Alice’s Public Key. Asymmetric encryption algorithms are secure because there is no way to calculate the second key if a user has access to one of the keys. Therefore, Carol will not be able to calculate Alice’s Private Key even though she has access to Alice’s Public Key.

Since Alice is the only one who has access to the corresponding Private Key, she is the only one who can decrypt the message. Asymmetric cryptography does not have the key distribution or key management problem associated with symmetric encryption.

4/6

5/6

Say Bob needs an app for mobile messaging. He finds one that allows messages and free calls with other users that have the app. This app uses end-to-end encryption which is an implementation of asymmetric encryption.

Bob’s
Public Key

Carol's
Private Key

When Bob installs the app on his smartphone, his public key gets registered with the app’s server and his private key remains protected on his smartphone. His friend, Carol, also has the app installed on her smartphone, and her Public Key is also stored on the app’s server. When using this app, Bob and Carol can maintain the confidentiality of their messages.

6/6

Carol’s
Public Key

Bob's
Private Key

Nonrepudiation
a sender in a transaction cannot deny having sent the communication

Another practical implementation of cryptography is the digital signature. A digital signature provides proof of authentication and nonrepudiation. Manually signing a document and sending it to the needed location can be time-consuming. There may be a delay to complete the manual signature process that may negatively impact the transaction. Digitally signing the documents can avoid a delay.

1/3

Digital Signature

Authentication
the act of verifying a claim of identity

2/3

A digital signature uses asymmetric-key encryption. Bob and Carol need to sign a contract. Bob and Carol both have a public-private key pair. To create a digital signature, Bob uses his private key to sign the document and transfers it to Carol.

3/3

Carol uses Bob’s public key (which she has access to since it is publicly available) to decrypt the message. Carol is now sure that the message came from Bob since he is the only one who has access to his Private Key. This message is not confidential, though, since anyone that has access to Bob’s Public Key can decrypt it.
Additionally, Bob cannot deny that he sent the message which is called non-repudiation.

If Bob wanted to send Carol a confidential message, what key would he use to encrypt the message?
Click on one of the keys to choose the correct key.

Take a Quiz

That’s correct!
All users’ Public Keys are stored on a third-party server maintained by the app. Since you want only Carol to read the message, you would need to use her Public Key to encrypt the message. She uses her Private Key (stored on her smartphone) to decrypt the message.

The act of verifying a claim of identity

Confidentiality

Algorithm

Note for Jasmine When the all correct keys are dropped please show
“final feedback”
Could they also hear the sound “confirmation2.mp3"

A sender in a transaction cannot deny having sent the communication

Great Job!

Information is not made available or disclosed to unauthorized individuals

A mathematical procedure performed on data

Authentication

Element
with Audio
HTML

Nonrepudiation

Note for Jasmine When the correct term is dropped please show
“checkmark” over the drop box
Could they also hear the sound “confirmation2.mp3"

Drag each term to its appropriate description.

Alice's
Private Key

Great Job!
All users’ Public Keys are stored on a third-party server. Since only Bob should read the message, Alice uses Bob’s Public Key to encrypt the message. Bob uses his Private Key to decrypt the message.

Note for Jasmine Answer:Drag Bob’s Public Key over encryptionDrag Bob’s Private Key over decryption

Drag and drop the correct key here

Alice and Bob are interested in maintaining confidentiality. What keys should be used?
Drag and drop the correct keys to the corresponding spaces above.

Note for Jasmine When the correct key is dropped please show
“checkmark” over the key for a couple seconds
Could they also hear the sound “confirmation2.mp3"

Great Job!
In this case, Carol and Alice are not looking to keep their communication confidential. Anyone having access to Carol’s Public Key will be able to see the message.

Carol needs to provide assurance to Alice that she sent the communication that Alice received. What keys should be used?
Drag and drop the correct keys to the corresponding spaces above.

Note for Jasmine When the correct key is dropped please show
“checkmark” over the key for a couple seconds
Could they also hear the sound “confirmation2.mp3"

Note for Jasmine Answer:Drag Carol’s Private Key over encryptionDrag Carol’s Public Key over decryption

Symmetric encryption ensures nonrepudiation but not confidentiality

Someone can calculate the private key by accessing the public key

Securely distributing the key

Storage of Public Key

What is the primary issue when using symmetric encryption?
Click to choose the correct answer.

That’s correct!
Since the same key is used to encrypt and decrypt the original plaintext, the challenge for Bob is making sure that Alice has the same key he used.