SlideShare a Scribd company logo
1 of 29
 Plaintext:
This is often the initial intelligible message
or information that's fed into the algorithmic
program as input.
 Encryption algorithm:
 The cryptography algorithmic
program performs numerous substitutions
and transformations on the plaintext.
 Secret key:
The key key's conjointly input to
the coding algorithmic program.
The key's a worth freelance of the plaintext
and of the algorithmic program.
The algorithmic program can turn out a
special output betting on the
precise key getting used at the time. the
precise substitutions and transformations
performed by the algorithmic program rely
on the key.
 Cipher text:
It depends on the plaintext and also
the secret key. For a given
message, 2 totally different completely
different} keys can turn out 2 different cipher
texts. The cipher text is Associate in
Nursing apparently random stream of
knowledge and, because it stands, is
unintelligible.
 Decryption algorithm: This
is primarily the cryptography rule run in
reverse. It takes the ciphertext and also
the secret key and produces the
first plaintext.
 Thisis primarily the cryptography rule run
in reverse.
 It takes the ciphertext and also the secret
key and produces the first plaintext.
 Cryptographic systems area
unit characterized 3 freelance dimensions.
The type of operation is
employed for remodeling plaintext to cipher
text.
 All encoding algorithmic rule area
unit supported 2 general principles:
substitution. within which every
component within the plaintext(bit,
letter, cluster of bits or letter) is mapped into
another component and transposition. within
which components within the plaintext area
unit rearranged. the basic demand is that
no info be lost(i.e., that each
one operations area unit reversible). Most
system, reffered to as product systems, involve
multiple stages of substitution and
transpositions.
 The number of keys used. If each sender
and receiver use identical key, the system
is stated as symmetrical , single-key,
secret-key, or standard encoding. If the
sender and receiver use totally
different keys, the system
is stated as uneven, two-key, public-
key encoding.
 The means within which the plaintext is
processed. A block cipher processes the input
one block of parts at a
time, manufacturing Associate in
Nursing output block for every input block. A
stream cipher processes the
input parts ceaselessly. manufacturing outp
ut one part at a time, because it goes on.
 Cryptanalysis:
cryptology attacks have faith in the
character of the algorithmic
program and maybe some information of the
overall characteristics of the plaintext or
maybe some sample plaintext-cipher text
pairs.
 This sort of attacks exploits the characteristics
of the algorithmic programto aim to deduce a
particular plaintext or to deduce the
key getting used.
 Brute-Force attack:
The attacker tries every possible key on a
piece of cipher-text until an intelligible
translation into plaintext is obtained. On
average, half of all possible keys must be
tried to achieve success.
 Is one during which the letters of
plaintext are replaced by alternative letters
or by numbers or symbols.
 If the plaintext is viewed as a sequence of
bits, then substitution
involves exchange plaintext bit patterns with
ciphertext bit patterns
 Simplest and earliest best-known use of a
substitution cipher used by general.
 Involves replacement every letter of the
alphabet with the letter
standing 3 places additional down the alphabet
 Alphabet is wrapped around in order that the
letter following Z may be a
 plain: meet me after the toga
party
 cipher: PHHW PH DIWHU WKH WRJD
SDUWB
 Can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
 Mathematically give each letter a number
a b c d e f g h i j k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
 Algorithm can be expressed as: c = E(3, p) = (p + 3) mod (26)
› A shift may be of any amount, so that the general Caesar algorithm
is:
C = E(k , p ) = (p + k ) mod 26
 Where k takes on a value in the range 1 to 25;
 the decryption algorithm is simply:
 p = D(k , C ) = (C - k ) mod 26
 With only 25 possible keys, the caeser cipher is
so far from secure. A dramatic increase in the
key space can achieved by allowing arbitrary
substitution. Before proceeding, we define the
term permutation. A Permutation of finite set of
elements S is an ordered sequence of all the
elements of S, with each element appearing
exactly once. For example, if S={a, b, c}, there
are six permutations of S.
abc, acb, bac, bca, cab, cba,
 If the “cipher” line may be any permutation of
the twenty six alphabetic characters, then
there square measure 26!
or larger than 4x1026 potential keys. this is
often ten orders of magnitude larger than
the key house for DES
 Approach is named as a monoalphabetic
substitution cipher as a result of one cipher
alphabet is employed per message
 The known multiple
letter cryptography cipher is that
the playfair, that treats diagrams within
the plaintext as single units
and interprets these units into ciphertext
diagrams
 The playfair algorithm is based on the use of
5x5 matrix of letters constructed using a
keyword.
 Hill cipher is developed by the man of
science Lester Hill in 1929. Strength is that
it fully hides single-letter frequencies.
 The use of a bigger matrix hides a lot
of frequency info
 A 3x3 Hill cipher hides not solely single-
letter however additionally two-letter
frequency info try other relevant Tools
 This example will rely on some linear
algebra and some number theory.
The key for a hill cipher is a matrix e.g.
 In the higher than case, we've got taken the
dimensions to be 3×3, but it will be any size
(as long because it is square).
 Assume we wish to inscribe the message
ATTACK AT DAWN. To inscribe this, we'd
like to interrupt the message into chunks of
three. we tend to currently take the
primary three characters from our plaintext, ATT
and produce a vector that corresponds to the
letters (replace A with 0, B with 1 ... Z with 25
etc.) to get: [0 nineteen 19] (this is ['A' 'T' 'T']).
 To get our ciphertext we perform a matrix
multiplication (you may need to
revise matrix multiplication if this doesn't
make sense):
 This method is performed for
all three letter blocks within the plaintext.
The plaintext might have to be
compelled tobe soft with
some further letters to
create positive that there's a
full range of blocks.
 Now for the tricky part, the decryption.
We need to find an inverse matrix modulo
26 to use as our 'decryption key'. i.e.
we want something that will take 'PFO'
back to 'ATT'. If our 3 by 3 key matrix is
called K, our decryption key will be the 3
by 3 matrix K-1, which is the inverse of K.
To find K-1 we have to use a bit of maths.
It turns out that K-1 above can be calculated
from our key
M.Sridevi II-M.Sc (computer science)

More Related Content

What's hot

Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2AfiqEfendy Zaen
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersAswathi Nair
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Password Cracking with Rainbow Tables
Password Cracking with Rainbow TablesPassword Cracking with Rainbow Tables
Password Cracking with Rainbow TablesKorhan Bircan
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answersprdpgpt
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniquesSHUBHA CHATURVEDI
 

What's hot (20)

Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Ch05
Ch05Ch05
Ch05
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Crypto
CryptoCrypto
Crypto
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Password Cracking with Rainbow Tables
Password Cracking with Rainbow TablesPassword Cracking with Rainbow Tables
Password Cracking with Rainbow Tables
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
Unit i
Unit iUnit i
Unit i
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Mid term
Mid termMid term
Mid term
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 

Similar to M.Sridevi II-M.Sc (computer science)

Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptxRavikumarVadana
 
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Saif Kassim
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmIJERD Editor
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.pptutsavkakkad1
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Saif Kassim
 
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...praveenaS25
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptxDrAnilKannur1
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxGauriBornare1
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY Santosh Naidu
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfParshantYadav13
 

Similar to M.Sridevi II-M.Sc (computer science) (20)

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
 
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
G0423538
G0423538G0423538
G0423538
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

M.Sridevi II-M.Sc (computer science)

  • 1.
  • 2.
  • 3.  Plaintext: This is often the initial intelligible message or information that's fed into the algorithmic program as input.  Encryption algorithm:  The cryptography algorithmic program performs numerous substitutions and transformations on the plaintext.
  • 4.  Secret key: The key key's conjointly input to the coding algorithmic program. The key's a worth freelance of the plaintext and of the algorithmic program. The algorithmic program can turn out a special output betting on the precise key getting used at the time. the precise substitutions and transformations performed by the algorithmic program rely on the key.
  • 5.  Cipher text: It depends on the plaintext and also the secret key. For a given message, 2 totally different completely different} keys can turn out 2 different cipher texts. The cipher text is Associate in Nursing apparently random stream of knowledge and, because it stands, is unintelligible.
  • 6.  Decryption algorithm: This is primarily the cryptography rule run in reverse. It takes the ciphertext and also the secret key and produces the first plaintext.
  • 7.
  • 8.  Thisis primarily the cryptography rule run in reverse.  It takes the ciphertext and also the secret key and produces the first plaintext.  Cryptographic systems area unit characterized 3 freelance dimensions. The type of operation is employed for remodeling plaintext to cipher text.
  • 9.  All encoding algorithmic rule area unit supported 2 general principles: substitution. within which every component within the plaintext(bit, letter, cluster of bits or letter) is mapped into another component and transposition. within which components within the plaintext area unit rearranged. the basic demand is that no info be lost(i.e., that each one operations area unit reversible). Most system, reffered to as product systems, involve multiple stages of substitution and transpositions.
  • 10.  The number of keys used. If each sender and receiver use identical key, the system is stated as symmetrical , single-key, secret-key, or standard encoding. If the sender and receiver use totally different keys, the system is stated as uneven, two-key, public- key encoding.
  • 11.  The means within which the plaintext is processed. A block cipher processes the input one block of parts at a time, manufacturing Associate in Nursing output block for every input block. A stream cipher processes the input parts ceaselessly. manufacturing outp ut one part at a time, because it goes on.
  • 12.  Cryptanalysis: cryptology attacks have faith in the character of the algorithmic program and maybe some information of the overall characteristics of the plaintext or maybe some sample plaintext-cipher text pairs.  This sort of attacks exploits the characteristics of the algorithmic programto aim to deduce a particular plaintext or to deduce the key getting used.
  • 13.  Brute-Force attack: The attacker tries every possible key on a piece of cipher-text until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
  • 14.
  • 15.  Is one during which the letters of plaintext are replaced by alternative letters or by numbers or symbols.  If the plaintext is viewed as a sequence of bits, then substitution involves exchange plaintext bit patterns with ciphertext bit patterns
  • 16.  Simplest and earliest best-known use of a substitution cipher used by general.  Involves replacement every letter of the alphabet with the letter standing 3 places additional down the alphabet  Alphabet is wrapped around in order that the letter following Z may be a  plain: meet me after the toga party  cipher: PHHW PH DIWHU WKH WRJD SDUWB
  • 17.  Can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  Mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25  Algorithm can be expressed as: c = E(3, p) = (p + 3) mod (26) › A shift may be of any amount, so that the general Caesar algorithm is: C = E(k , p ) = (p + k ) mod 26  Where k takes on a value in the range 1 to 25;  the decryption algorithm is simply:  p = D(k , C ) = (C - k ) mod 26
  • 18.
  • 19.  With only 25 possible keys, the caeser cipher is so far from secure. A dramatic increase in the key space can achieved by allowing arbitrary substitution. Before proceeding, we define the term permutation. A Permutation of finite set of elements S is an ordered sequence of all the elements of S, with each element appearing exactly once. For example, if S={a, b, c}, there are six permutations of S. abc, acb, bac, bca, cab, cba,
  • 20.  If the “cipher” line may be any permutation of the twenty six alphabetic characters, then there square measure 26! or larger than 4x1026 potential keys. this is often ten orders of magnitude larger than the key house for DES  Approach is named as a monoalphabetic substitution cipher as a result of one cipher alphabet is employed per message
  • 21.  The known multiple letter cryptography cipher is that the playfair, that treats diagrams within the plaintext as single units and interprets these units into ciphertext diagrams
  • 22.  The playfair algorithm is based on the use of 5x5 matrix of letters constructed using a keyword.
  • 23.  Hill cipher is developed by the man of science Lester Hill in 1929. Strength is that it fully hides single-letter frequencies.  The use of a bigger matrix hides a lot of frequency info  A 3x3 Hill cipher hides not solely single- letter however additionally two-letter frequency info try other relevant Tools
  • 24.  This example will rely on some linear algebra and some number theory. The key for a hill cipher is a matrix e.g.
  • 25.  In the higher than case, we've got taken the dimensions to be 3×3, but it will be any size (as long because it is square).  Assume we wish to inscribe the message ATTACK AT DAWN. To inscribe this, we'd like to interrupt the message into chunks of three. we tend to currently take the primary three characters from our plaintext, ATT and produce a vector that corresponds to the letters (replace A with 0, B with 1 ... Z with 25 etc.) to get: [0 nineteen 19] (this is ['A' 'T' 'T']).
  • 26.  To get our ciphertext we perform a matrix multiplication (you may need to revise matrix multiplication if this doesn't make sense):
  • 27.  This method is performed for all three letter blocks within the plaintext. The plaintext might have to be compelled tobe soft with some further letters to create positive that there's a full range of blocks.  Now for the tricky part, the decryption. We need to find an inverse matrix modulo 26 to use as our 'decryption key'. i.e.
  • 28. we want something that will take 'PFO' back to 'ATT'. If our 3 by 3 key matrix is called K, our decryption key will be the 3 by 3 matrix K-1, which is the inverse of K. To find K-1 we have to use a bit of maths. It turns out that K-1 above can be calculated from our key