View, compare, or restore historical versions of this page. Older versions may be automatically deleted based on rules set by your administrator.

  Version Published Changed By Comment Actions
CURRENT (v. 50) Dec 06, 2017 17:48  
v. 49 Dec 05, 2017 22:43
v. 48 Sep 13, 2017 21:45
v. 47 Oct 25, 2016 15:46
v. 46 Sep 14, 2016 18:33
v. 45 Sep 12, 2016 17:28
v. 44 Sep 12, 2016 17:26
v. 43 Sep 12, 2016 16:47
v. 42 Sep 12, 2016 16:44
v. 41 Sep 12, 2016 16:25
v. 40 Apr 28, 2015 20:08
v. 39 Apr 28, 2015 19:52
v. 38 Mar 13, 2015 22:38
v. 37 Mar 13, 2015 22:37
v. 36 Feb 13, 2015 00:40
v. 35 Feb 13, 2015 00:38
v. 34 Aug 22, 2014 16:36 Migrated to Confluence 4.0
v. 33 Aug 22, 2014 16:36
v. 32 Aug 22, 2014 14:12
v. 31 Aug 22, 2014 14:11
v. 30 Aug 21, 2014 20:19
v. 29 Aug 21, 2014 20:01
v. 28 Jul 30, 2014 00:27
v. 27 Jul 30, 2014 00:14
v. 26 Jul 30, 2014 00:14
v. 25 Jul 27, 2014 23:48
v. 24 May 22, 2014 12:37
v. 23 May 22, 2014 12:27
v. 22 Apr 30, 2014 11:53
v. 21 Apr 30, 2014 11:52
v. 20 Apr 30, 2014 11:50
v. 19 Apr 30, 2014 07:13
v. 18 Apr 30, 2014 07:10
v. 17 Apr 28, 2014 01:43
v. 16 Apr 23, 2014 18:12
v. 15 Apr 22, 2014 14:08
v. 14 Apr 22, 2014 14:03 Cryptography: The art of secret writing underpins many of the controls used in computer and communication systems to achieve the various requirements for data and communication security and privacy; confidentiality, integrity, and availability. Cryptographic protocol usually require the use of cryptographic keys which may be shared, and are used in encryption protocols to encrypt data and or communication channels, and also to decrypt encrypted data or communication channels. Cryptographic protocols are typically measured by the effective length of the cryptographic keys. Prior to the early 1980s and the widespread use of public key cryptography, the same cryptographic key is usually used for both encryption and decryption of data. This creates challenge for key exchange necessary for practical applications from military use to banking. With the advent of public key cryptography, and the elegant solution of key exchange using RSA, and later various other protocols, secure data communication has become tremendously easier, benefiting the explosive growth of the internet and its application in many industry including in higher education. However, as cryptographic protocols gain more currency, defeating them has become more lucrative for attackers who will benefit from gaining unauthorized access to information ranging from personal PHIs, PHIs and other private data, as well as organization and government secret. The strength of cryptographic protocols, defined in terms of the equivalent synchronous cryptography protocol key strength is a measure of the level of difficulty in deciphering an encrypted text, without first gaining access to the key. The most common approach to breaking cryptographic protocols, or cryptanalysis is by use of brute force. This technique relies on the number of trials that can be conducted in a given amount of time, and the sample space of the key, which is a measure of the number of bits of the equivalent synchronous key. Today, given the advances in computing and cryptanalysis techniques, 128 bit is considered a floor for cryptographic key strengths and 256 bits is usually considered acceptable. Cryptographic standards are designed to optimize encryption, while making brute force attack the only likely attack that can break an encryption system, also making sure that brute force attack is expensive, in terms of how long it will take to exhaust a given key space. For example, AES-128 has a key space of 2^(128) bits or 3.4x10^(14).
v. 13 Apr 15, 2014 08:40
v. 12 Apr 14, 2014 21:55
v. 11 Apr 09, 2014 20:02
v. 10 Apr 09, 2014 14:42
v. 9 Apr 09, 2014 14:36
v. 8 Apr 09, 2014 14:33
v. 7 Apr 09, 2014 14:33
v. 6 Apr 03, 2014 16:19
v. 5 Apr 02, 2014 19:50
v. 4 Mar 07, 2014 18:47
v. 3 Mar 05, 2014 17:59
v. 2 Jan 21, 2014 18:53
v. 1 Jan 21, 2014 18:49

Return to Page Information