Skip to Main Content
Cybersecurity of Industrial Systems
book

Cybersecurity of Industrial Systems

by Jean-Marie Flaus
July 2019
Intermediate to advanced content levelIntermediate to advanced
420 pages
8h 47m
English
Wiley-ISTE
Content preview from Cybersecurity of Industrial Systems

Appendix 1Cryptography Basics

A1.1. Introduction

Cryptography is one of the basic techniques for securing information systems. Content is encrypted using a method or algorithm that transforms a message to make it unintelligible. This technique is old and has existed since ancient times. Its weak point was the need to transmit the encryption and decryption method to all parties. In 1976, Whitfield Diffie and Martin Hellman (Diffie et al. 1976), of Stanford University, proposed an entirely new encryption principle: public key or asymmetric cryptography. This technique allows you to distribute a key to encrypt a message, but this key does not allow you to decrypt it. This principle has been incorporated into the RSA system (Rivest–Shamir–Adleman, names of inventors).

A1.1.1. Definitions of the terms

Encryption is about transforming a message in such a way that it becomes incomprehensible. Only authorized correspondents will be able to decipher it.

Data encryption consists of applying a function F configurable by a key k to a message M, so that the message cannot be decrypted.

Decryption consists of transforming a previously encrypted message to reconstitute the original message. The objective is that only authorized correspondents can carry out this action.

Unauthorized correspondents aims at reconstituting the original message by trying to “break” the cryptographic code or algorithm.

Signing a document consists of creating an electronic signature unique to the document and ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity for Industrial Control Systems

Cybersecurity for Industrial Control Systems

Tyson Macaulay, Bryan L. Singer
Handbook of SCADA/Control Systems Security

Handbook of SCADA/Control Systems Security

Robert Radvanovsky, Jacob Brodsky

Publisher Resources

ISBN: 9781786304216Purchase book