D-Link DFL-2500 User Guide - Page 214

Introduction to Cryptography

Page 214 highlights

20.2. Introduction to Cryptography 195 Another solution is required. From a connectivity and security perspective, Virtual Private Networks may still be viewed as "fixed connections" in that they do provide connectivity between two or more organizations. This is a fact that does not change even though Cryptography is deployed to implement the "Virtual" side of the "Private Network". 20.2 Introduction to Cryptography Cryptography provides a means to create "Virtual Private Networks" across the Internet with no additional investments in cables, leased lines, or other connectivity. It is an umbrella expression covering three basic techniques and benefits: Confidentiality No one but the intended recipients is able to intercept and understand the communication. Confidentiality is accomplished by encryption. Authentication & Integrity Proof for the recipient that the communication was actually sent by the expected sender, and that the data has not been modified in transit. This is accomplished by authentication, often by use of cryptographic keyed hashes. Non-repudiation Proof that the sender actually sent the data; the sender cannot later deny having sent it. Non-repudiation is usually a benign side-effect of authentication. 20.2.1 Encryption Encryption is a process of encoding sensitive information from plaintext to unreadable ciphertext through some mathematical algorithms. The operation of the algorithms is varied and usually parameterized by a large random number, known as a key. The ciphertext is encrypted by the key and it needs the same key or a related key to perform the reverse procedure - decryption, to return to the original plaintext. The algorithms of Encryption can be categorized into three types - symmetric, asymmetric, and hybrid encryption. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

20.2. Introduction to Cryptography
195
Another solution is required.
From a connectivity and security perspective, Virtual Private Networks
may still be viewed as ”fixed connections” in that they do provide
connectivity between two or more organizations. This is a fact that does
not change even though
Cryptography
is deployed to implement the
”Virtual” side of the ”Private Network”.
20.2
Introduction to Cryptography
Cryptography provides a means to create ”Virtual Private Networks”
across the Internet with no additional investments in cables, leased lines, or
other connectivity. It is an umbrella expression covering three basic
techniques and benefits:
Confidentiality
No one but the intended recipients is able to intercept and understand
the communication. Confidentiality is accomplished by encryption.
Authentication & Integrity
Proof for the recipient that the communication was actually sent by
the expected sender, and that the data has not been modified in
transit. This is accomplished by authentication, often by use of
cryptographic keyed hashes.
Non-repudiation
Proof that the sender actually sent the data; the sender cannot later
deny having sent it. Non-repudiation is usually a benign side-effect of
authentication.
20.2.1
Encryption
Encryption is a process of encoding sensitive information from
plaintext
to
unreadable
ciphertext
through some mathematical algorithms. The
operation of the algorithms is varied and usually parameterized by a large
random number, known as a
key
. The ciphertext is encrypted by the key
and it needs the same key or a related key to perform the reverse procedure
decryption
, to return to the original plaintext.
The algorithms of Encryption can be categorized into three types –
symmetric
,
asymmetric
, and
hybrid
encryption.
D-Link Firewalls User’s Guide