Applications of Cryptography

ASCII Encoding and Decoding

ASCII encoding and decoding is required when you need to send encrypted or signed data using communication protocols that allow transmission of printable characters only. In this case, the application must convert the encrypted 8-bit values to a string of printable characters. Crypto-C uses the Internet RFC1113 method for implementing ASCII-encoding. The Internet Draft RFC1113 is a publication that describes this system.

Applications of Cryptography

Crypto-C offers application developers the tools to add privacy and authentication features to software and hardware systems. This section discusses a number of areas where such features are useful.

Historically, privacy has been the main use of cryptographic techniques. In these applications, cryptography is used to hide critical information from attackers or unauthorized personnel. Crypto-C provides algorithms and methods for encrypting data in a variety of applications.

Authentication is a cornerstone of the forever-pursued paperless office. Authentication enables users to prove authenticity and authorship of messages and non-tampering of data.

Cryptography can be useful in any of the following situations:

Local applications, to control access and prevent tampering

Point-to-point applications, to protect the privacy of communications

Client/server applications, to control access and provide authentication

Peer-to-peer applications, to protect privacy between nodes

Local Applications

One of the most basic applications of cryptography is local file encryption. There are many reasons why one would find it useful to encrypt files even if they are not being transmitted. For example, you can use cryptographic techniques to:

Save files in encrypted form to protect against unauthorized access.

C h a p t e r 3 C r y p t o g r a p h y

8 3

Page 105
Image 105
RSA Security 5.2.2 manual Applications of Cryptography, Ascii Encoding and Decoding, Local Applications