Your SlideShare is downloading. ×
Imbricate  cryptography
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Imbricate cryptography

1,706
views

Published on

download Documentation and Slides at www.presentationslive.blogspot.com

download Documentation and Slides at www.presentationslive.blogspot.com

Published in: Education

1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
1,706
On Slideshare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
0
Comments
1
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. IMBRICATE CRYPTOGRAPHY For Documentation and Downloads Visit
  • 2.
    • Security and privacy are critical for electronic communication and e-business.
    • Network security measures are needed to protect data during its transmission.
    • Cryptography, being the science of information security fulfills our need.
  • 3.
    • The word Cryptography means ‘hidden writing’
    • ‘ Hidden’ for ‘Crypto’ and ‘Writing’ for ‘graphy’.
    • It plays an important role in exchanging the confidential information between two parties in a secured manner.
    • The process involves Encryption and Decryption.
  • 4.
    • Symmetric Cryptography.
    • Asymmetric Cryptography.
  • 5.
      • If the sender and receiver use different keys,
    • it is called Asymmetric or multiple key ,
    • public key encryption .
  • 6.
    • If the sender and the receiver use the same key, it is called Symmetric or single key, secret key or conventional Encryption.
  • 7.
    • Type of symmetric cryptography.
    • Key is implanted in the message.
    • Uses layered approach in encrypting and decrypting the message.
  • 8.
    • It converts the plain text into un understandable cipher text.
    • It involves three layers.
    • Layer1:
    • It is also called ‘mapping’ layer as it maps or replaces with every character in the message with the other character from the same set.
    • IF SOURCE CODE IS ‘kits’
    • THEN EQUIVALENT MAPPING CODE IS ‘jsea’
    Source file characters Equivalent mapping characters a/e/i/o/s/t/ {repeated} o/t/s/i/a/e/ b/c/d/e/f/g/h/j/k/l/m/n/ p/q/r/u/v/w/x/y/z/{non-repeated} h/f/b/d/g/c/l/n/j/k/m/u/y/ p/z/q/v/w/x 0/1/2/3/4/5/6/7/8/9/ 4/6/9/7/0/8/1/3/2/5/ Special characters Same characters
  • 9.
    • code_encoding layer
    • makes use of ASCII characters and bitwise operations.
    • Earlier ‘kits’ was converted to ‘jsea’ and if the key is ‘ hai ’.
    • Now the message will be converted as (j^~ASCII(h),s^~ASCII(a),e^~ASCII(i),a^~ASCII(h))
    • This operation can be represented as
    • Char_new=(char_old)^(~key[i] )
  • 10.
    • Bitmap_conversion layer.
    • Each character of the code generated in layer2 is converted to its equivalent binary value(8-bit representation).
    • Binary values are stored in the o/p bitmap file
  • 11.
    • It converts the encrypted message into normal plain text.
    • It has 3 layers .
    • Layer1:
    • re_structuring layer
    • Layer2:
    • It is called code_decoding layer.
    • Decoding of character and key
    • Ch=ch^~ASCII(K)
    • This reveals that algorithm used in encryption (layer2) can also be used for decryption also.
    • Generated characters are equivalent mapping characters
  • 12.
    • It called re_mapping layer.
    • It is exactly the reverse process of the layer1 in the encryption .
    • Equivalent mapping characters to source code.
    • ‘ jsea’ is converted to
    • ‘ kits’
  • 13.
    • Any person who wants to crack this system must:
    • Know that the binary values in the bitmap
    • Binary values to ASCII characters
    • To break the second layer, find the logic that the key is XORed with the characters.
    • Equivalent mapping characters to source code characters.
    • Key cannot be found.
  • 14.
    • Confidentiality:
    • Simplicity:
    • Security:
    • Protection:
    • Incorporated key:
  • 15.
    • Secure communication over insecure channels is the main criteria of this concept.
    • Whatever may be the generation the communication between the people belonging to different places always plays the major role in the development process and it is highly important to make the communication flawless and effective.
  • 16. THANK YOU
  • 17.  

×