Understanding encryption
Put simply, encryption is about making a document unreadable to everyone except its intended recipient. To achieve this, an encryption key is used (more on that later).
The document in question can take many forms: a message, an image, any kind of file, or even your entire hard drive. The purpose of encryption is to protect data, particularly when it needs to be transported or transmitted. In the latter case, the carrier (a service provider or internet provider, for example) cannot access the content -- only the intended recipient can.
Our cybersecurity reference, ANSSI (the French National Cybersecurity Agency), tells us that: "the only accepted term in French is 'chiffrement' (encryption). However, one often hears 'cryptage' (an anglicism), or even 'chiffrage', but these words are incorrect. The reverse operation of encryption is decryption. 'Decryptage' or 'decryptement' refers to the operation of recovering the plaintext from a ciphertext without knowing the secret key, after finding a flaw in the encryption algorithm."
I love answering a question with another question.
Do you put your letters in envelopes?
You don't display your credit card number and PIN on a t-shirt, do you?
Do you lock your doors?
Do you chat with your friends in private conversations, rather than in the comments section of a public post?
If you still don't see where I'm going with this -- you do have things to hide, you just don't realize it.
Etymologically, cryptology is the science (logos) of secrecy (kryptos). It brings together cryptography ("secret writing") and cryptanalysis (the study of attacks against cryptographic mechanisms). "Don't worry, Google helped me write the Greek."
Cryptology today extends far beyond simply ensuring the confidentiality of secrets. It has expanded to mathematically guarantee other properties: authenticating a message (who sent this message?) or ensuring its integrity (has it been modified?).
Guaranteeing that your message remains unchanged
Imagine you upload your favorite photos to an online storage space, like the cloud. How can you be sure the download completed without errors? Or how do you know which files have changed when you sync your folders, so you only back up what's necessary? This is where cryptology comes into play. It can detect whether a message or file has been modified, even accidentally. A "hash function" creates a kind of digital fingerprint for each message, file, or folder. This fingerprint is unique, and anyone can compute it to check whether something has changed. It typically appears as a long string of numbers and letters, preceded by the name of the method used, such as "SHA2" or "SHA256".
Just like a signature on a paper document, a digital signature confirms that the message comes from the person who holds a certain "public key". This cryptographic system allows anyone to verify who authored a document and to ensure it has not been tampered with.
To sign a message, you need two keys:
In practice, you use your private key to create the signature. Anyone with access to your public key, like Bob, can verify this signature without needing to share a secret.
Symmetric encryption uses the same key to encrypt and decrypt messages. This "secret key" must be shared or transmitted securely between the sender and the recipient, because if it falls into the wrong hands, the confidentiality of the message is no longer guaranteed. This type of encryption is fast but requires good coordination for the secret key.
Asymmetric encryption, on the other hand, relies on a pair of keys: a private key and a public key. The recipient shares their public key with people who want to send them messages. The sender uses this public key to encrypt the message, and only the recipient can decrypt it with their private key.
AES
AES is a symmetric encryption algorithm. The same key is used to encrypt and decrypt a text. https://www.pandasecurity.com/fr/mediacenter/cryptage-aes-guide/
DES: https://web.maths.unsw.edu.au/~lafaye/CCM/crypto/des.htm
The Padlock: DES takes your treasure (the message you want to protect) and divides it into small pieces. Then, it uses a key, much like a padlock key, to lock (encrypt) these pieces. This key is a secret code that both you and the person you're sending the message to know.
The Key: The key used by DES is like a combination on a bicycle lock. It has a specific size of 56 bits, meaning it consists of a series of 56 "0"s and "1"s. This key is what allows your message to be scrambled securely.
Locking and Unlocking: When you lock (encrypt) your message with DES, it becomes a mystery to anyone who doesn't have the key. When the person you're sending it to receives the message, they use the same key to unlock (decrypt) it, making the message readable again.
Blowfish: Blowfish can turn a letter into incomprehensible gibberish for anyone who doesn't have the key to decrypt it.
Here's how it works, simplified:
Locking: Blowfish takes your message and cuts it into small pieces. Then, it uses a secret key, like a special password, to shuffle these pieces in a very complex way. It's as if you had a secret code for each piece of your message.
The Secret Key: This key is the heart of the system. You and the person you want to send the message to know this key, but nobody else does. This key is what allows the message to be shuffled securely and also to be reassembled so it can be read again.
Unlocking: When the person receives your shuffled message, they use the same secret key to run the message through Blowfish in reverse.
RSA: It's a bit like having a mailbox with a slot where anyone can drop in messages (public key), but only you have the key to open it and read them (private key). RSA is widely used to secure communications over the Internet.
Key Creation: First, you create a set of keys -- a public key and a private key. The public key is like the address of your magic mailbox that you share with your friends so they can send you messages. The private key is secret and only you know it.
Sending a Message: When someone wants to send you a secret message, they use your public key to "lock" or encrypt the message. Once the message is locked with the public key, no one else can read it except you.
Receiving and Reading the Message: The encrypted message arrives in your magic mailbox. To read it, you use your secret private key to "unlock" or decrypt the message. And there you go -- you can read the secret message!
Encrypts data bit by bit or byte by byte.
RC4: Imagine a river that flows and constantly changes. RC4 works bit by bit or byte by byte, mixing data like flowing water, making it difficult to predict the next movement. It was widely used in the past, particularly in secured Wi-Fi networks. https://lazaarsaiida.files.wordpress.com/2015/11/algorithme-rc4-slazaar2015.pdf
Salsa20: Think of a fast and unpredictable dance. Salsa20 encrypts data in small chunks, making each step unique and hard for intruders to follow. It is known for its speed and security.
Uses public identity information as a public key.
IBE (Identity-Based Encryption): Imagine being able to use your email address as a key to open your secret messages. IBE allows the use of public information, such as your email, as a key to encrypt and decrypt messages. This simplifies cryptographic key management by eliminating the need to exchange secret keys.
The Caesar cipher is a monoalphabetic substitution cipher, where each letter is replaced by another letter located a fixed number of positions further in the alphabet (shifted but always the same for a given message).
The shift distance is chosen based on a number called the offset, which can go to the right (A to B) or to the left (B to A).
For any rightward shift (+N), there is an equivalent leftward shift (26-N) because the alphabet wraps around. This is why the Caesar cipher is sometimes called a rotation cipher.
The Vigenere cipher is a decisive improvement over the Caesar cipher. Its strength lies in using not one, but 26 shifted alphabets to encrypt a message. These shifts can be summarized with a Vigenere square.
The Assyrian encryption technique is arguably the earliest evidence of the use of encryption methods, in Greece around 600 BC, to conceal messages written on strips of papyrus.
The technique involved:
The message, once unwound, becomes incomprehensible ("cecaeonar mt c m mh"). The recipient simply needs a cylinder of the same diameter to decrypt the message. In reality, a codebreaker (they existed back then too!) could decrypt the message by trying cylinders of successively different diameters, which amounts to saying the method can be broken statistically (by taking characters one by one, spaced at a certain distance).
This article is the 3rd in a series of 11.
Membre de l'équipe Reboot à Strasbourg, Erin intervient sur les projets IT et conseil dans le Grand Est. Un profil qui préfère laisser parler ses résultats plutôt que son LinkedIn.
LinkedInGet our best articles every month.
Le RGPD et les cookies en BtoB Voici un article qui résume mes recherches sur la conformité RGPD et les conformité politique de Cookies. Il ne rem...
ArticleHier, j'ai eu le grand plaisir d'écouter un webinaire C2C (la communauté des utilisateurs de Google Cloud) sur l'état des lieux des menaces de l'IA...
ArticleDerrière le terme \"spam\" 📩 (également appelé \"junk mail\" ou \"courrier indésirable\") se cache un courrier électronique non sollicité 🚫 par le destin...
ArticleAvec l'avènement de la directive NIS 2, l'Union européenne renforce sa législation pour assurer une meilleure protection contre les cyberattaques. ...
ProjectVoir en temps réel ce qui se passe dans les entrailles de la production. Un projet de visibilité critique.
ProjectSécuriser la transformation digitale bancaire. Un expert transformant les contraintes réglementaires en avantages.