Cryptology & Security Mechanisms

ZOhaib Ali
3 min readFeb 27, 2022

--

Cryptology is study of codes, both creating them ( how to protect data) and solving them (how to access protected data).

Cryptography

It is the study and application of codes and methodologies that secure information from access by unintended parties.

It enables unauthorized or malicious users from accessing data while still enabling the intended users to do so.

It includes all the methods that are used to keep the communication between two parties secret in a way that no one else can read, interpret, modify, or otherwise steal the message.

Cryptanalysis

It is technique of decoding messages from a non-readable format to readable format without knowing the key.

Or

It is a science of recovering the plaintext of messages without having access to the key.

Cryptanalysis is used to break cryptographic security system and gain access to the contents of encrypted messages, even if cryptographic key is unknown.

Types of Cryptanalytic attacks:

i. Ciphertext only attack

Attacker knows only ciphertext

ii. Known plaintext only attack

Attacker knows some combination of Pi, Ci (plain text, Ciphertext) and based on these, he try to decrypt the messages.

iii. Chosen plaintext attack

Attacker can choose random plaintexts to be encrypted and obtain the corresponding ciphertexts.

iv. Chosen Cipher attack

Cryptanalyst can choose different ciphertexts to be decrypted and has access to the decrypted plaintext.

v. Man-in-the-Middle attack

Cryptographic communications and key exchange protocols are susceptible to an attack in which the attacker is able to place himself on the communication line between tow parties.

vi. Brute Force Attack

It involves trying all possible keys until hitting on the one that results in plaintext.

etc…..

Security Mechanisms

These are set of processes that deal with recovery from security attacks. i.e. they are used to provide security.

Various mechanisms are designed to recover from these specific attacks at various protocol layers.

I. Encipherment

Hiding and covering of data which helps to become confidential. It uses some mathematical algorithms to transform data into a not readable form.

II. Digital Signature

It is from of electronic signature which is added by sender which is checked by receiver electronically. This mechanism is used to preserve data which is not more confidential but sender’s identity is to be notified.

III. Data Integrity

This security mechanism is used by appending value to data to which is created by data itself. It is similar to sending packet of information known to both sending and receiving parties and checked before and after data is received. If both the check values are same, the integrity of data is preserved.

IV. Authentication Exchange

In this, two entities exchange some messages to prove their identities to each other.

V. Traffic Padding/ Bit Stuffing

In this technique, we add some extra/dummy bits with the data while encrypting it. It helps data to be checked at the receiving end and is achieved by Even parity or Odd parity.

VI. Routing Control

Selecting or continuously changing the different available routes between the sender and receiver to prevent the attacker from eavesdropping on a particular route.

VII. Access Control

This mechanism is used to stop unattended access to data which you are sending. It can be achieved by various techniques such as applying passwords, using firewall, or just by adding PIN to data.

VIII. Notarization

This security mechanism involves use of trusted third party in communication. It acts as mediator between sender and receiver so that if any chance of conflict is reduced. This mediator keeps record of requests made by sender to receiver for later denied.

--

--

ZOhaib Ali

I am Information technology enthusiast. I work on network & data security. I am here to share my experience & knowledge with others.