mirror of
https://codeberg.org/openpgp/notes.git
synced 2024-11-27 01:52:06 +01:00
Merge pull request 'Minor edits for ch3' (#99) from heiko-ch3 into draft
Reviewed-on: https://codeberg.org/openpgp/notes/pulls/99
This commit is contained in:
commit
aa50f22d2c
1 changed files with 5 additions and 11 deletions
|
@ -3,17 +3,17 @@ SPDX-FileCopyrightText: 2023 The "Notes on OpenPGP" project
|
||||||
SPDX-License-Identifier: CC-BY-SA-4.0
|
SPDX-License-Identifier: CC-BY-SA-4.0
|
||||||
-->
|
-->
|
||||||
|
|
||||||
(cyrptography_chapter)=
|
(cryptography_chapter)=
|
||||||
# Cryptographic concepts and terms
|
# Cryptographic concepts and terms
|
||||||
|
|
||||||
## Cryptographic hash functions
|
## Cryptographic hash functions
|
||||||
|
|
||||||
[Cryptographic hash functions](https://en.wikipedia.org/wiki/Cryptographic_hash_function) take data strings of any length (like a text message or file) and output a fixed-size code, often called a "hash" or "digest." This hash acts like a unique identifier for the original data.
|
[Cryptographic hash functions](https://en.wikipedia.org/wiki/Cryptographic_hash_function) take data strings of any length (like a text message or file) and output a fixed-size code, a "hash digest," which is often abbreviated as either "digest" or "hash." A hash digest acts like a unique identifier for the original data.
|
||||||
|
|
||||||
Here are two important properties of cryptographic hash functions:
|
Here are two important properties of cryptographic hash functions:
|
||||||
|
|
||||||
- ["Pre-image resistance"](https://en.wikipedia.org/wiki/Preimage_attack): Given a hash value, it should be very difficult to determine the original data it represents.
|
- ["Pre-image resistance"](https://en.wikipedia.org/wiki/Preimage_attack): Given a hash digest, it should be very difficult to determine the original data it represents.
|
||||||
- ["Collision resistance"](https://en.wikipedia.org/wiki/Collision_resistance): It should be very difficult to find two distinct pieces of data that map to the same hash value.
|
- ["Collision resistance"](https://en.wikipedia.org/wiki/Collision_resistance): It should be very difficult to find two distinct pieces of data that map to the same hash digest.
|
||||||
|
|
||||||
## Message authentication codes
|
## Message authentication codes
|
||||||
|
|
||||||
|
@ -46,16 +46,10 @@ A symmetric cryptographic key (which acts as a shared secret)
|
||||||
|
|
||||||
### Benefits and downsides
|
### Benefits and downsides
|
||||||
|
|
||||||
Symmetric-key cryptography has major benefits: It is much faster than public-key cryptography (see below). Also, most current symmetric cryptographic algorithms are considered quantum-resistant[^postquantum].
|
Symmetric-key cryptography has major benefits: It is much faster than public-key cryptography (see below). Also, most current symmetric-key cryptographic mechanisms are believed to be resilient against possible advances in quantum computing[^postquantum].
|
||||||
|
|
||||||
[^postquantum]: Daniel J. Bernstein (2009). ["Introduction to post-quantum cryptography" (PDF)](http://www.pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf) states that: "many important classes of cryptographic systems", including secret-key cryptographic mechanisms like AES "[..] are believed to resist classical computers and quantum computers." (pages 1, 2).
|
[^postquantum]: Daniel J. Bernstein (2009). ["Introduction to post-quantum cryptography" (PDF)](http://www.pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf) states that: "many important classes of cryptographic systems", including secret-key cryptographic mechanisms like AES "[..] are believed to resist classical computers and quantum computers." (pages 1, 2).
|
||||||
|
|
||||||
```{admonition} TODO
|
|
||||||
:class: warning
|
|
||||||
|
|
||||||
I am not convinced that this information is helpful but, if it remains, perhaps we need this additional statement: "That is, symmetric-key cryptographic mechanisms are currently considered to be resilient against known computer threats, providing a measure of assurance in the evolving landscape of cryptography and quantum computing."
|
|
||||||
```
|
|
||||||
|
|
||||||
However, exchanging the required shared secret is a problem that needs to be solved separately.
|
However, exchanging the required shared secret is a problem that needs to be solved separately.
|
||||||
|
|
||||||
[Hybrid cryptosystems](hybrid_cryptosystems) combine the advantages of symmetric-key cryptography with a separate mechanism for managing the shared secret, using public-key cryptography.
|
[Hybrid cryptosystems](hybrid_cryptosystems) combine the advantages of symmetric-key cryptography with a separate mechanism for managing the shared secret, using public-key cryptography.
|
||||||
|
|
Loading…
Reference in a new issue