Fundamentos de criptografía
Las cartas secretas de María Estuardo, reina de Escocia
Introducción a la Criptografía
Encripción y Estrategias de Ofuscación
Criptografía Clásica
Conceptos Criptográficos
Aleatoriedad
Manejo de Aleatoriedad en JavaScript
Cryptoanálisis y Seguridad de Cifrado
Seguridad Criptográfica
Criptografía Simétrica
Ciphers
Advanced Encryption Standard
Cifrar y descrifrar archivos con JavaScript
Seguridad a través de Hashes
Funciones de hash comunes
Criptografía Asimétrica
Aritmética modular en Criptotografía Asimétrica
Intercambio de llaves y el problema del logaritmo discreto
Algoritmo de Diffie-Hellman
Cifrar mensajes con el algoritmo de Deffie-Hellman.
RSA y firma digital
Implementar Algoritmo de RSA y firma digital
Criptografía de Curvas Elípticas
ECDSA y tipos de curvas
Criptografía Moderna
Infraestructura de llave pública (PKI)
Sistemas de pruebas interactivos
Computación Cuántica
Investigación en Criptografía
You don't have access to this class
Keep learning! Join and start boosting your career
When we talk about encryption in cryptography, we refer to procedures that encrypt information to keep it secret. A key concept within this field is symmetric encryption, where an algorithm converts plaintext into encrypted information and then uses the same process to decrypt the text and return to the original format. This back-and-forth mechanics defines the symmetric cipher and is thought of as a "little box" that transforms content from one side to the other.
A modern method of encryption is the block cipher. Here, the data goes through multiple rounds of encryption, i.e. the algorithm is applied repeatedly possibly using different keys. The idea is that each round of encryption wraps around the previous one, creating an additional layer of security. Block ciphers have modes of operation that determine how the data is processed. Examples include:
In scenarios where the information is not completely known in advance, such as in audio or video streaming, streaming encryption is essential. This method uses a random number generator to encrypt data continuously. YouTube and Spotify are examples where each data stream is accompanied by random bits to keep the information secure.
In stream ciphering, in addition to a key, a unique number, known as a nonce, is used to ensure that keys are not repeated and predictability in encryption is avoided. The key-non-repeat combination ensures protection and security against attacks.
In stream ciphering there are different architectures that define its operation:
Each architecture offers advantages and is designed to improve encryption security, adapting to specific applications as needed.
Knowing the difference between these two types of encryption and the accompanying modes of operation and architectures opens the door to delve deeper into the vast world of cryptography. Don't hesitate to investigate further and apply this knowledge in your projects to ensure greater data security. If you know examples of stream ciphers or modes of operation for block ciphers, please share them and continue exploring this fascinating topic!
Contributions 8
Questions 0
Gracias
Want to see more contributions, questions and answers from the community?