Sie sind auf Seite 1von 13

CRYPTOGRAPHY

SUBMITTED BY:-
JIYA JAGADEESH
BCA DEPARTMENT
ROLL NO:-16
DEFINITIONS
• Cryptography :- The term refers to the science and
art of transforming messages to make them secure
and immune to attacks

• Plaintext and cipher text :-


 The original message before being transformed, it is called cipher text
 after the message is transformed, it is called cipher text
 An encryption algorithm transformed the plain text in to cipher text
 A decryption algorithm transforms the cipher text back to the plain
text
 The sender use an encryption algorithm
 The receiver uses an decryption algorithm

• Cipher :- encryption and decryption algorithm as cipher

• Key :-
 A key is a number that the cipher as an algorithm operates on
- To encrypt a message we need an encryption algorithm, an
encryption key, and the plain text .These creates the cipher text
 To decrypt a message we need a decryption algorithm a decryption
key, and the cipher text .these reveal the original plain text.

Alice ,, bob and eve;-

o Alice is the person who needs to send secure data


o Bob is the recipient of the data
o Eve is the person who some how disturbs the communication
between Alice and Bob- by intercepting messages to uncover the
data or by sending her own disclosed messages .
 These three names represent computers or processes that actually send or
receive data or intercept or change data.

• Two categories :-
 Symmetric key
 Asymmetric key

• Symmetric key cryptography :-


 In this cryptography, the same key is used by both parties
 The sender uses the key and an encryption algorithm to encrypt data
 The receiver uses the same key and the corresponding decryption
algorithm to decrypt the data
• Asymmetric key cryptography :-
 In the cryptography, there are two keys :-
o A private key
o A public key
 A private key is kept by the receiver
 A public key is announced to the public
 In public key encryption / decryption , the public key that is used for
encryption is different from the private key that is used for decryption. The
public key is available to the public , the private key is available to the
individuals

• Three types of keys :-


1. Secret key
2. Private key
3. Public key
 Secret key is the shared in symmetric key cryptography.
 Private and public key is used in asymmetric cryptography

• Symmetric key cryptography


 Traditional ciphers:-
 Substitution ciphers:-
 a substitution ciphers replaces one symbol with another
 Mon alphabetic cipher :-
 A character in the plain text regardless of its position in the text.
 Poly alphabetic cipher :-
 Each occurrence of character can have a different substitute.
 The relationship between a character in the plain text to the
character in the clip text is a 1 – to many relationship

 Transposition ciphers :-
 A transposition cipher reorders symbols in the block of symbols
Key :- In a transposition cipher , the key is a mapping between the
position of the symbol in the plain text and cipher text
 Simple modern cipher :-
 XOR cipher :-Modern cipher today are normally made of a set of simple
cipher , which are simple predefined function in mathematics or
computer science

 Rotation cipher :- In which the input bits are rotated the left or right. The
rotation cipher can be keyed or keyless
 Substitution cipher :- S-box
An S-box parallels the traditional substitution cipher
for character. S-box is normally keyless and is used as
a intermediate stage of encryption or decryption.
 Transposition cipher :- P-box
a P-box for bits parallel the traditional
transposition cipher for character

Modern round cipher :-


 Data encryption standard (DES) :-
 DES has two transposition block and 16 complex round
cipher.
 Although the 16 round ciphers are conceptually the
same , each uses a different key derived from the
original key.
 The initial and final permutation that are the inverse of
each other .
 The permutation takes a –bit input and permutes them
according to pre defined values.
Advanced encryption standard (AES) :-
 The AES was designed because DES’s key was too small
 The structure and operation of the other configuration are
similar
 The difference lies in the key generation
 Fig. shows , there is an internal XOR operation followed by
round ciphers
 The last round is slightly different from the preceding round
; it is missing one operations.
 Although the 10 iteration blocks are almost identical ,
each uses a different key derived from the orginial key
THANK YOU

Das könnte Ihnen auch gefallen