From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Desirable qualities of an algorithm and key

Desirable qualities of an algorithm and key

From the course: Ethical Hacking: Cryptography

Desirable qualities of an algorithm and key

- [Instructor] Alright. The security of a crypto system is largely dependent on two factors, the algorithm you select and the length of the key. We'll review the desirable qualities of both factors starting with algorithms. Let's explore a few concepts to aid in our understanding of what is going on behind the scenes. We'll look at what it means to apply confusion versus diffusion, permutations versus combinations. More importantly, how these concepts combine to create the grand finale of the Avalanche Effect At a high level we reviewed confusion versus diffusion earlier in this course under "Symmetric Cryptography," more specifically when discussing block ciphers. These are also older terms for substitution and transposition, respectively. Confusion changes the characters in a message. For example, A, B, C changes to 1, 2, 3. While D fusion simply rearranges or scrambles the characters into a different order. For example, A, B, C is now C, B, A. Think of confusion or substitution as…

Contents