What are “Primitives”?

Cryptography systems are largely based off of well-established algorithms, hence the name primitives. These primitives are typically combined or built off of in order to create more complex and more secure algorithms. The following two are some of the more common ones to encounter:

Symmetric Algorithms

In symmetric algorithms: the sender and receiver both have a copy of the same key used to be encrypt and decrypt the information. The single-key encryption/decryption makes it very useful for tasks such as transmitting bulk data securely (provided the key is strong enough.)

Do be warned, however, that if either key is compromised so is all data they have encrypted.

Common Symmetric Algorithms:

  • Advanced Encryption System (AES)

  • Blowfish and TwoFish

  • Triple Data Encryption Standard (3DES)

Asymmetric Cryptography

In asymmetric algorithms, also known as public-key encryption, there is a public key that can be seen by anyone and a related private key. Anyone can send or encrypt data through the public key’s encryption but only the owner of the private key can decrypt that data.

If need be, this can be implemented alongside a digital signature system so that the private key certifies the authenticity of the sender to any one of the receivers with the corresponding public key.

This can also be used in one-to-many schemes for distribution of apps or other software. Anyone who installs the software would receive the public key as well as certified updates from the holder of the private key.

Some Modern Implementations

Transport Layer Security (TLS):

  • This protocol is used in email, IM, HTTPS, and Voice Over IP (VOIP).

  • This protocol requires that both sides have a “certificate” validating who they are when communicating.

  • Combines symmetric and asymmetric encryption.

Secure Shell Protocol (SSH):

  • This protocol allows remote access to secure data over a potentially unsecure network by associating the user’s public key with their identity (password may still be required).

  • Combines symmetric and asymmetric encryption.