Explore chapters and articles related to this topic
Blockchain Architecture, Components and Considerations
Published in Shaun Aghili, The Auditor's Guide to Blockchain Technology, 2023
Aafreen Fathima Altaf Hussain, Temitope Ipentan, Mahakpreet Singh, Grace Moyo Adeyemi
Symmetric cryptography provides a secret communication channel between trusted parties. Assume Alice and Bob have agreed on a secret key. Later when Alice and Bob decide to send a secret message to each other, the secret key is used to convert the message into a scrambled form that cannot be processed by anyone without the key. The original message is usually known as ‘plaintext’ while the scrambled message is known as ‘ciphertext’. This process is called ‘encryption’. The process where the ciphertext is received by Bob and he can use the secret key to convert it to plaintext is known as ‘decryption’ [68]. In symmetric encryption, a single secret key is used by both communication parties to encrypt the plaintext and decrypt the ciphertext, with the secret key being known to both parties. The encryption and decryption algorithms are known publicly. Hence, the secret key must be kept safe. The main problem in symmetric cryptography is the key distribution problem. The key distribution has to be done before the transmission of information. As such, there is a requirement for a secret channel as well as authentication between the communicating parties (Alice and Bob) for the distribution of key material.
Role of Cryptography and Its Challenges in Integrating Secured IoT Products
Published in S. Velliangiri, Sathish A. P. Kumar, P. Karthikeyan, Internet of Things, 2020
D. Citharthan, M. Varatharaj, D. Palanivel Rajan
Cryptology is a study of encryption and decryption. Encryption is a technique used to convert plain (readable) text to cipher (unreadable) text and, decryption is a technique used to convert cipher (unreadable) text to plain (readable) text. There are two methods of encryption, namely symmetric encryption and asymmetric encryption. Symmetric encryption uses symmetric keys for encryption as well as decryption. Asymmetric encryption uses two independent (asymmetric) keys, namely public key and private key. In asymmetric encryption, any one of the keys will be used for encryption, and another key will be used for decryption. Before sending any plain text to the IoT device, it will be encrypted using a symmetric or asymmetric key and converted to cipher text in the sender side. On the receiver side, the cipher text is decrypted using the same symmetric key or asymmetric key pair and converted to plain text. Symmetric encryption is faster than asymmetric encryption. But the problem is that symmetric keys have to store securely, and secure channel is required to transfer the symmetric key. So, combining the symmetric and asymmetric encryption methods will be more efficient in IoT product [1]. Asymmetric encryption is used in the key deployment and can be used to encrypt communication. Symmetric encryption is used where performance is required or where the data has to transmit faster.
Cyber Defence and Countermeasures
Published in Stanislav Abaimov, Maurizio Martellini, Cyber Arms, 2020
Stanislav Abaimov, Maurizio Martellini
Two major techniques used in encryption are symmetric and asymmetric encryption. In symmetric encryption, one key is used to encrypt and decrypt the message. The decryption procedure is faster as the key is comparatively short, but it requires better security for the key itself. Asymmetric technique uses a public key to encrypt a message and a private key to decrypt it. Both systems have their strengths and weaknesses and the most appropriate solution should be identified based on the computer potential, type of data and access, key management strategies, costs and available funding, etc. A strong key management process is essential to prevent unauthorized access to sensitive information, as the key theft is one of the most wide-spread methods of attacking a cryptosystem.
Security of networked control systems subject to deception attacks: a survey
Published in International Journal of Systems Science, 2022
Zhong-Hua Pang, Lan-Zhi Fan, Haibin Guo, Yuntao Shi, Runqi Chai, Jian Sun, Guo-Ping Liu
According to the keys used for encryption and decryption, cryptographic technologies are divided into: symmetric cryptography and asymmetric cryptography (also known as public key cryptography). Symmetric cryptography refers to encryption and decryption using the same secret key for both sides of the communication with faster encryption and less computation (Schneier, 1996). Typical algorithms include Data Encryption Standard, 3 Data Encryption Standard, and Advanced Encryption Standard. Nevertheless, asymmetric cryptography employs a pair of keys: a public key and a private key. The private key can only be held securely by one party and cannot be leaked, while the public key can be issued to anyone who requests it. This technique provides better security. The main algorithms are Elliptic Curves Cryptography, Digital Signature Algorithm, and Rivest–Shamir–Adleman (RSA) (Ashibani & Mahmoud, 2017). However, it is not feasible to only rely on one approach to serve all security challenges. In order to keep information confidential, two or more methods are often used in combination. Currently, some other technologies, such as lightweight encryption, homomorphic encryption, and blockchain technology (Alexandru et al., 2021; Jan et al., 2021; Jia et al., 2022; Liang et al., 2019), have also gained widespread popularity.
Linear approximation fuzzy model for fault detection in cyber-physical system for supply chain management
Published in Enterprise Information Systems, 2021
Compared to conventional Rough-Set Attribute Reductions (RSAR), the fuzzy rough-set software reduces the data set with no great loss of information (Scheffel and Wolpers 2010) in cyber systems. The study suggests a technique for dimensional reduction, with a hybrid combination of rough sets, bottlenecks, to avoid this loss of data in IoT assisted Cybersystems in supply chain management. Advanced Encryption Standard (AES) is the most popular symmetrical block cypher for encryption. It can be used in various embedded systems such as mobile phones, PDAs and smart cards. These embedded systems are a serious design point for safe information communication in supply chain management. However, cryptographic algorithms can cause problems and in fact, cryptographic algorithms can be hardware-implemented by observing and analysing the operation of such algorithms in various cyber systems (Xiao, Edmund, and Lai 2005; Pawlak 2002; Jensen and Shen 2002; Agrawal et al. 2002).
Efficient Key Generation Techniques for Securing IoT Communication Protocols
Published in IETE Technical Review, 2021
Amol K. Boke, Sangeeta Nakhate, Arvind Rajawat
This mode overcomes the problem faced by the ECB mode of repeating cipher text for the same plain text. The third method is Cipher Feedback Mode (CBF) in which cipher itself is given as feedback with some modification. The fourth mode is Output Feedback Mode (OFB) where encrypted data are given as feedback instead of cipher. The fifth and last mode is the Counter Mode where every step has a different counter and it does not depend on any feedback value. Examples of block cipher are given in Figure 3 out of which AES (Advanced Encryption Standards) is considered as one of the most secure symmetric key cryptographic algorithms. While there is only one key that does the encryption and decryption, symmetric key cryptographic algorithms are more suitable for those applications where the key does not need to be shared over the network.