Hey Girish thanks for a good share.. Hope to learn some algorithms
der... If possible pls share some theoretical material and links with
regard to the same... In had Tried to dig deep in the linux source to
understand stuff... Thanks in advance...

On 4/5/13, Girish Venkatachalam <[email protected]> wrote:
> Crypto is something I left long ago.
>
> But it is still in my bloodstream since I dabbled with it for a very long
> time.
>
> Basically crypto is not the only way to implement security.
>
> It is a very important building block but not the only one.
>
> We find that authentication algorithms and protocols normally employ
>  crypto. We find crypto in integrity checks or preserving the data
>  from being tampered. And of course we employ crypto in confidentiality
> or encryption.
>
> There are many things that do not at all depend on crypto.
>
> If you are doing biometric scanning or facial recognition or voice
> recognition
>  then some crypto may be there in the form of doing a match
>  against the fingerprint or message digest.
>
> But crypto as is generally understood is used for encryption when we
>  use SSL, VPN(secure one, we can have VPN without security)  or SSH.
>
> Encryption is used for protecting the data from being seen.
>
> You also have file system encryption and you can even encrypt a file
>  using vim or openssl.
>
> Anyway crypto alone does not ensure security.
>
> If a machine does not have physical security then any amount of
>  crypto will not save it.
>
> One can always get to it in single user mode and reset the root password.
>
> The most important component of crypto at a serious level is a
> sound random number generator.
>
> At a simpler level the most oft used method is a message digest
>  algorithm like MD5 or SHA1.
>
> All complicated crypto systems employ message digest in one form
>  or other.
>
> Message digest itself is not secure. Once you add a secret key to
>  it it then becomes HMAC and that is secure.
>
> But message digests can be encrypted with a cipher like AES
>  and then used.
>
> PKI implementation uses crypto in the form of RSA, DSA or ESS
>  and also uses message digest and finally a symmetric cipher
>  like AES or DES3.
>
> -Girish
>
> --
> Gayatri Hitech
> http://gayatri-hitech.com
> _______________________________________________
> ILUGC Mailing List:
> http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
>


-- 



With Regads,

Guru Prashanth S
9578922641
_______________________________________________
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to