Traditional Culture Encyclopedia - Traditional virtues - What is the security goal of cryptography in information security?

What is the security goal of cryptography in information security?

Your question should be to ask what role cryptography can play in information security and give you a little introduction.

The goals of information security are confidentiality, integrity, non-repudiation and signature authentication.

Cryptography is the foundation of information security. As long as security is involved, professional basic courses will involve passwords and protocols.

Cryptography is widely used:

1. System password protection, which is not only a computer system, but also many embedded systems. This is very common, just like our bank password;

2. Information encryption is generally used, such as data transmission on wired or wireless networks, which is particularly important in the Ministry of National Defense;

3. Security protocol, which is a part of cryptography, such as signature authentication, is applied to this knowledge just like Alipay.

4. Hide information such as viruses, and some advanced hackers will encrypt viruses;

The main purposes are confidentiality, integrity, non-repudiation and signature authentication.

Confidentiality: prevent others from obtaining the contents of the information. For example, if you send your bank account number and password to others, you don't want a third party to obtain it;

Integrity: I don't want the information to be tampered with. For example, if you send an email, the information will be intercepted by others and then disrupted;

There is no denying: for example, if you are a confidential person and need confidential information, if one day it is found that this secret has been leaked, then it is you who leaked it, which requires some skills;

Signature authentication: When someone asks you for information, you need to make sure that this person is trustworthy, and you need to take your identity seriously.

These are the core of information security and the goal of cryptography, which can be expanded according to the application.