The document discusses encryption and decryption techniques. It describes substitution and transposition as two types of encryption techniques. It then discusses symmetric key cryptography which uses a single key for encryption and decryption, providing examples of algorithms like DES, Triple DES, and Blowfish. It proceeds to describe the DES algorithm in more detail, outlining its key generation process and the steps involved, including initial permutation, expansion, substitution using S-boxes, and final permutation. Finally, it briefly introduces asymmetric key algorithms like RSA which use public and private key pairs.
3. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
4. Data encryption and Decryption
Encryption – The process of converting plain text message
into unintelligible format in known as encryption .
5. Decryption – The process of converting
unreadable message i.e cipher text into
plain text is called data decryption.
6. There are two types of technique used for
encryption i.e
1. Substitution
2. Transposition
7. Symmetric key Cryptography
In this we use only one key for both
encryption and decryption of data.
There are various algorithms such as DES,
Triple
DES,RC4,RC5,Blowfish,Twofish….etc.
17. Asymmetric Key Algorithm
Public-key cryptography, also known as asymmetric cryptography, is a class of
cryptographic algorithms which requires two separate keys, one of which is secret (or
private) and one of which is public. Although different, the two parts of this key pair are
mathematically linked.
18.
19. 1.Choose two large prime numbers P & Q.
2.Calculate N= P*Q
3.Select public key (i.e encryption key) E such that it is not a factor of (P-1) and (Q-1)
4.Select the private key D such that following equation is true
(D * E) mod (P-1)(Q-1) = 1
5.For encryption ,calculate the cipher text “CT” from the plain text “PT” as follows
CT = 𝑃𝑇 𝐸
𝑚𝑜𝑑 𝑁
6.Send CT as cipher text to the receiver
7.For decryption ,calculate the plain text “PT” from cipher text “CT” as follows
PT = 𝐶𝑇 𝐷
𝑚𝑜𝑑 𝑁
20. Five Basic steps
Large Prime Number Generation: Two large prime numbers p and
q need to be generated. These numbers are very large: At least 512
digits, but 1024 digits is considered safe.
Modulus: From the two large numbers, a modulus n is generated by
multiplying p and q.
Totient: The totient of n,ϕ(n) is calculated.
Public Key: A prime number is calculated from the range [3,ϕ(n))
that has a greatest common divisor of 1 with ϕ(n).
Private Key: Because the prime in step 4 has a gcd of 1 with ϕ(n),
we are able to determine it's inverse with respect to modϕ(n).
Editor's Notes
Security means all about cryptography. So what does cryptography means???