M7L1 Summary

docx

School

Arizona State University, Polytechnic Campus *

*We aren’t endorsed by this school

Course

30555

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by CaptainIbex3617

Report
IFT 510 - Module 7: Lab 1- Hashing VS Encryption Keerthana Yadavali Dinesh Sthapit 12 th November, 2023. 1
Tables of content: Part 1: One-way Hashing vs Encryption 3 - Introduction - One-way hashing code & output - One-way hashing use case - Encryption code & output - Encryption use case. - Hashing vs encryption - Use case of hashing & encryption combined 3 3 4 5 5 6 6 Part 2: Non – Repudiation 6 - Introduction - Non-repudiation code & output - Non-repudiation process - Use case of non-repudiation 6 7 8 8 Summary & Conclusion 9 References 10 2
Part 1: One-Way Hashing vs. Encryption Introduction:   One-way Hashing: A technique called one-way hashing transforms a variable-length input string into a fixed- length binary sequence, known as a hash value or message digest. This cryptographic process, also called message digesting, ensures that it is practically impossible to reverse the transformation and deduce the original input string from the hash value. One-way hash functions serve as a powerful cryptographic tool with diverse applications, playing a crucial role in ensuring the security of digital data. Program Code: 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Output: Use Cases: a. Digital Signatures heavily rely on one-way hashing for assuring the genuineness and unaltered state of digital documents. In this process, the sender utilizes a one-way hash function to generate a hash value from the document, subsequently encrypting it with their private key. The recipient then receives both the encrypted hash value and the document. They decrypt the hash value using the sender's public key and compare it to the hash value calculated from the received document. If the two hash values align, it serves as verification that the document is authentic and has not undergone any unauthorized modifications during transmission. 4
Encryption: Encryption involves converting readable data, or plaintext, into unreadable data, known as ciphertext, using a confidential key. Only the corresponding secret key can decrypt the ciphertext back to plaintext. Encryption is employed to secure data from unauthorized access, whether stored on a computer or transmitted over a network. There are two main types of encryption: symmetric and asymmetric. Code: Output: Use-case: a. Safeguarding Information while It's Being transmitted: Encryption is essential for preventing interception and eavesdropping while sending sensitive information over 5
networks like the Internet. Data in transit is shielded against unauthorized access by malevolent actors or third-party interference via encryption, which guarantees that only authorized parties can access the information. One-way Hashing vs Encryption: One-way hashing is used to confirm the integrity and validity of data, while encryption is used to shield data from unwanted access. Digital signatures, password storage, file integrity checking, and data deduplication are a few applications for one-way hashing. Secure communication, data protection in transit, and data protection at rest are a few application cases for encryption. Use case of hashing & encryption combined. a. Password Storage with Message Authentication Codes (MACs): While one-way hashing is frequently employed for password storage, message authentication codes (MACs) can improve the process. b. Data Integrity Verification with Encrypted Hash Values: Data integrity can be checked using one-way hashing, however encryption can improve this procedure by preventing manipulation with the hash values. Part 2: Introduction & significance: In the world of digital communication and secure transactions, non-repudiation is a key idea that offers a way to guarantee the accountability and integrity of electronic interactions. The core tenet of this concept is that parties to a communication or transaction cannot dispute the veracity of the information they shared or the authenticity of their actions. 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Code: Output: 7
Non-repudiation process: 1. Authentication: The communication or document's sender needs to be verified. It follows that their identity needs to be confirmed. Many techniques, including passwords, digital certificates, and biometric authentication, can be used to accomplish this. 2. Integrity: The document or message needs to be shielded from manipulation. Digital hashing or encryption can be used for this. The communication or document can only be viewed by the intended recipient thanks to encryption. Digital hashing guarantees that the document or message hasn't been changed. 3. Proof of origin: The communication or document must be able to be verified by the receiver as coming from the sender. Electronic seals or digital signatures can be used for this. Cryptography is used in digital signatures to provide a distinct signature that is connected to the sender's identity. Similar to digital signatures, electronic seals are granted by a reputable third party, such a certificate authority. Use cases of non-repudiation: a. Electronic signatures: The legitimacy of an electronic signature depends on non- repudiation. A digital signature from the signer confirms that they actually signed the document and that it hasn't been tampered with when it is signed electronically. Ensuring the legitimacy and integrity of electronic contracts, financial papers, and other sensitive documents is imperative. b. Digital banking: To shield clients from fraud, digital banks employ non-repudiation. For instance, the bank employs non-repudiation to confirm a customer's identity and stop illegal access when the customer registers into their online bank account. Additionally, non-repudiation guards against fraudulent transactions—like unsanctioned wire transfers—for clients. 8
Summary & Conclusion: There are various connections between non-repudiation, one-way hashing, and encryption. Encryption, for instance, can be used to safeguard the privacy of information saved on a disk or sent over a network. Data that is transferred over a network or kept on a disk can have its integrity checked via one-way hashing. Moreover, digital signatures—which are made by combining one-way hashing and encryption—can be used to establish non-repudiation. Asymmetric or symmetric encryption algorithms are used by the sender to encrypt the data. The sender then uses a one-way hash algorithm to create a hash of the encrypted data. Next, using their private key, the sender digitally signs the hash of the encrypted material. Subsequently, the sender transmits to the recipient the digital signature, the encrypted contents, and their hash. Using either a symmetric or asymmetric encryption scheme, the recipient decrypts the encrypted data. The recipient then uses the one-way hash function to create a hash of the encrypted data. Afterwards, the recipient uses the sender's public key to confirm the digital signature. The recipient can be sure that the material was transmitted by the intended recipient and hasn't been altered if the digital signature is legitimate. Data protection can be achieved by this procedure in many different contexts, including financial transactions, digital contracts, and electronic signatures. 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Bryant, R. E., & O'Hallaron, D. R. (2016). Computer Systems: A Programmer's Perspective . Pearson. Englander, I. (2014). The Architecture of Computer Hardware, Systems Software, and Networking: An Information Technology Approach . Wiley. Patterson, D. A., & Hennessy, J. L. (2005). Computer organization and design : the hardware/software interface . Elsevier/Morgan Kaufmann. Patterson, D. A., & Hennessy, J. L. (2012). Computer Organization and Design: The Hardware/Software Interface . Elsevier Science. 10