From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Desirable qualities of an algorithm and key
From the course: Ethical Hacking: Cryptography
Desirable qualities of an algorithm and key
- [Instructor] Alright. The security of a crypto system is largely dependent on two factors, the algorithm you select and the length of the key. We'll review the desirable qualities of both factors starting with algorithms. Let's explore a few concepts to aid in our understanding of what is going on behind the scenes. We'll look at what it means to apply confusion versus diffusion, permutations versus combinations. More importantly, how these concepts combine to create the grand finale of the Avalanche Effect At a high level we reviewed confusion versus diffusion earlier in this course under "Symmetric Cryptography," more specifically when discussing block ciphers. These are also older terms for substitution and transposition, respectively. Confusion changes the characters in a message. For example, A, B, C changes to 1, 2, 3. While D fusion simply rearranges or scrambles the characters into a different order. For example, A, B, C is now C, B, A. Think of confusion or substitution as…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.