1 / 21

Characteristics of Cryptography:

Characteristics of Cryptography:. (1)Substitution cipher : In substitution cipher each element in the plain text is mapped into (replaced by) another element to generate the cipher text. (2)Transposition cipher:

desma
Télécharger la présentation

Characteristics of Cryptography:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Characteristics of Cryptography: (1)Substitution cipher: • In substitution cipher each element in the plain text is mapped into (replaced by) another element to generate the cipher text. (2)Transposition cipher: • In transposition cipher the elements of the plain text are rearranged to generate the cipher text.

  2. (3)Product systems: Product systems involve multiple stages of substitution and transposition. (4)Cryptanalysis: The process of trying to break any cipher text message to obtain the original plaintext message itself is called as cryptanalysis. (5)Cryptanalyst: Cryptanalysis is the breaking of codes. The person attempting a cryptanalysis is called as a cryptanalyst.

  3. (6)Brute force attack: The attacker tries every possible key on a piece of cipher text until an intelligible translation into plaintext is obtained.

  4. Monoalphabetic Cipher: • Monoalphabetic cipher substitutes one letter of the alphabet with another letter of the alphabet. • However, rather than substituting according to a regular pattern, any letter can be substituted for any other letter, as long as each letter has a unique substitute left and vice versa.

  5. For example: Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: m n b v c x z a s d f g h j k l p o i u y t r e w q Plaintext message : hello how are you Cipher text message : acggk akr moc wky • Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet

  6. Homophonic Substitution Cipher • It provides multiple substitutes for a single letter. • For example, A can be replaced by D, H, P, R; • B can be replaced by E, Q, S, T etc.

  7. Playfair Cipher: • The Playfair algorithm is based on the use of a 5x5 matrix of letters constructed using a keyword. • In the case of keyword monarchy, matrix is as follows:

  8. The matrix is constructed by filling in the letters of the keyword (minus duplicates) from left to right and from top to bottom, and then filling in the remainder of the matrix with the remaining letters in alphabetic order. • The letters I and J count as one letter.

  9. Polyalphabetic Substitution • In polyalphabetic substitution, each occurrence of a character can have a different substitute. • The relationship between a character in the plaintext and a character in the cipher text is always one-to-many

  10. An example of polyalphabetic substitution is the Vigenere Cipher. • 26 Caesar ciphers are used, with shifts of 0 through 25. • Each cipher is denoted by a key letter (from a to z). • For example : Let the message be THE BOY HAS THE BAG and the key be VIG

  11. Key = VIG VIGVIGVIGVIG Plaintext = THE BOY HAS THE BAG Cipher text = OPKWWECIYOPKWIM • The strength of this cipher is that there are multiple ciphertext letters for each plaintext letter, one for each unique letter of the keyword

  12. One Time Pad (Vernam cipher): • The key is a random string that is at least as long as the plaintext. • Each new message requires a new key of the same length as the new message. It produces random output that bears no statistical relationship to the plaintext. • Vernam cipher uses a one time pad, which is discarded after a single use, and therefore is suitable only for short messages.

  13. The one time pad offers complete security but, in practice, has two fundamental difficulties. • 1. There is the practical problem of making large quantities of random keys. • 2. Key distribution and protection is also major problem with one time pad

  14. Transposition Techniques. • In transposition cipher the elements of the plain text are rearranged to generate the cipher text. • The letters are not changed. • The rail fence cipher is composed by writing the plaintext in two rows, proceeding down, then across and reading the cipher text across, then down. • For example, to encipher the message “meet me after this party” with a rail fence of depth 2, we write the following

  15. m e m a t r h s a t e t e f e t i p r y The cipher text is MEMATRHSATETEFETIPRY • Attacking a transposition cipher requires rearrangement of the letters of the ciphertext. • A pure transposition cipher is easily recognized because it has the same letter frequencies as the original plaintext

  16. Plaintext : The book is suitable for self study. • Key : 5 6 4 1 3 2 • Plaintext : t h e b o o k i s s u i t a b l e f o r s e l f S t u d y 5 6 4 1 3 2 • Plain text :- t h e b o o k I s s u i t a b l e f o r s e i f s t u d y • Ciphertext: BSLEDOIFFOUELYESBSUTKTOSHIART

  17. Steganography • It is a technique that facilitates hiding of a message that is to be kept secret inside other messages. • Steganography is derived from the Greek for covered writing and essentially means “to hide in plain sight”. • It is simple form , but one that is time-consuming to construct, is one in which an arrangement of words or letters within an real message

More Related