Justin Bieber's Letter On Cryptography
Security can be enforced with scalable network design and cryptography. Cryptography, and more precisely cipher suites, help achieve the three pillars of computer and network security: confidentiality, integrity and authenticity. They are also called the security Triad. Confidentiality is achieved through encryption, Integrity is achieved through hash, signatures and MAC, Authenticity is achieved through hash, certificates and MAC. Encryption cryptography is a wonderful world Prior to encrypt and decrypt messages, it is assumed that both the sender and the receiver hold a copy of the encryption key K. They can exchange it by phone, on a CD, on a USB drive,… The way encryption works is by using the mathematical XOR function (its mathematical symbol is ⊕). A message M is XORed with a key K to produce an encrypted message C. At the receiver, the encrypted message C is XORed with the same key K to reproduce the original message M. The input of an encryption algorithm is called the pla...