SlideShare a Scribd company logo
1 of 4
Download to read offline
1
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
NAVDEEP KAUR1
RUCHIKA JERATH2
1M.Tech (cse) pursuing, RIMT, Mandi Gobindgarh.
2Asst. Professor, Dept. of CSE, RIMT, Mandi Gobindgarh, Punjab, India
ABSTRACT: Cryptography is a technique which
provides security to the messages sent between sender
and receiver on a network. Only authorized users can
access the message. It helps to maintain the integrity of
communication on a network. There are two main term
of cryptography which are encryption and decryption.
Encoding of message provided by Encryption and
decoding of message provided by Decryption.
Cryptography is a technique which provides security to
our data by using two methods which are substitution
and transposition encryption method. There are two
main types of cryptography schemes used one is
symmetric key cryptography which depends on single
key value and asymmetric key cryptography which
depends on pair of keys.
Keywords: Cryptography, Substitution Techniques,
Transposition Techniques, Symmetric Key
Cryptography, Asymmetric Key Cryptography.
1. INTRODUCTION
Cryptography is a technique to provide the security to
data communication in the presence of third party.
Every user wants a secure network to communicate
that data should be secure and there is no intruder can
read their data. Cryptography is used in
Wireless and wired network for providing secure data
communication. Cryptography converts the plain text
into cipher text and cipher text into a plain text. Plain
text is converted into a cipher text which is at a
sender side known as encryption and cipher text is
converted into a plain text which is at a receiver side
known as decryption.
Encryption converts readable form of message into
unreadable form. Decryption converts unreadable
form of message to readable form. Cryptography is
divided into two types’ symmetric key cryptography
and asymmetric key cryptography.
Symmetric key cryptography use single key for
encryption and decryption hence it is called as secret
key cryptography and asymmetric key use pair of
public and private key so it is called as public key
cryptography.
Cryptography services
. A service that improve the security of the data
processing systems. There are four type of services
provided by Cryptography such as confidentiality,
integrity, authentication, non-repudiation
1.1 Basics of Cryptography
Cryptography provides security to the data during the
transmission by performing some operations. The
main aim of cryptography is to help user to hide
information from unauthorized user.
1.1.1 ENCRYPTION
Encryption is a technique which is converting a
readable form of message into unreadable form
which means conversion of plain text into cipher text.
Encryption is performed when message is send by
sender. The process of encryption is shown below
fig.
fig.process of encryption
2
1.1.2 DECRYPTION
It is a technique of cryptography which is converting
an unreadable form of message into readable form
which means that conversion of cipher text into a
plain text known as decryption. Decryption is
performed when message is received by receiver. The
process of decryption is shown below fig.
fig. process of decryption
2. ANALYSIS OF CRYPTORAPHICS
TECHNIQUES:
2.1 Secret Key & Public Key Cryptography
There are two keys are used in the cryptography
which is secret key (symmetric cipher) and public
key (asymmetric cipher).
2.2 SYMMETRIC KEY CRYPTOGRAPHY
It is the one type of encryption algorithm which
converts plain text into cipher text. It provides the
security of data when data is transmission from one
to another by using single secrete key. This secrete
key is same to perform encryption and decryption.
This key is known to only those users who are
sending and receiving the message on that network.
Secret key maintain the security of data therefore no
other person access the data.
Fig. process of symmetric key cryptography.
Encryption algorithm is divided into two parts:
 Block Cipher :
When messages are too long then it is difficult to
encrypt the data then block cipher overcome this
problem by the dividing the data into the fixed size of
blocks. which are maybe 64 bit or 128 bit size of
blocks. Encryption is performed on individual block
by using same key.
There are various modes of block cipher which are
Electronic Code Book (ECB), Cipher Block Chaining
(CBC), Cipher Feedback (CFB), and Output
Feedback (OFB).
 Stream Cipher
But in the stream cipher the data is encrypt within
one digit block. It does not encrypt the whole digits
within the block in one time, it encrypt only one digit
at particular one time encryption.
2.3. ASYMMETRIC KEY CRYPTOGRAPHY
It is also called as public key cryptography. Rather
than using single key for encryption and decryption
two different key are use for encryption and
decryption. Where one key encrypt and other can
decrypt. If sender sends a message then encryption is
perform on sender side by using receiver public key
and sends a message to the receiver. Only receiver
can able to see a message and receiver decrypt a
message by using receiver
Private Key so security is maintained. Here key
management is required. [1]
Fig. Process of Asymmetric Key Cryptography.
3
Table.1 advantage and disadvantage of symmetric
cipher and asymmetric cipher [2]
2.4 DES (Data Encryption Standard): DES
defined as a block encryption algorithm. It was the
first encryption standard published by NIST
(National Institute of Standards and Technology). It
is a symmetric algorithm, means same key is used for
encryption and decryption. It uses one 64-bit key.
Out of 64 bits, 56 bits make up the independent key,
which determine the exact cryptography
transformation; 8 bits are used for error detection.
The main operations are bit permutations and
substitution in one round of DES. Six different
permutation operations are used both in key
expansion part and cipher part. Decryption of DES
algorithm is similar to encryption, only the round
keys are applied in reverse order. The output is a 64-
bit block of cipher text. Many attacks and methods
recorded the weaknesses of DES, which made it an
insecure block cipher key [3]
2.5. 3DES (Triple DES): 3DES is an enhancement
of Data Encryption Standard. It uses 64 bit block size
with 192 bits of key size. The encryption method is
similar to the one in the original DES but applied 3
times to increase the encryption level and the average
safe time. 3DES is slower than other block cipher
methods. [4]
2.6 AES (ADVANCED ENCRYPTION
STANDARDS)
The Advanced Encryption Standard (AES) is a
symmetric-key block cipher algorithm, U.S.
government standard for secure data and classified
data for encryption and decryption.[5]
In December 2001, the National Institute of
Standards (NIST) approved the AES as Federal
Information Processing Standards Publication (FIPS
PUB) 197, which specifies application of the
Rijndael algorithm to all sensitive classified data.[6]
The AES has three fixed 128-bit block ciphers with
cryptographic key sizes of 128, 192 and 256 bits. Key
size is unlimited, whereas the block size maximum is
256 bits. The AES design is based on a substitution-
permutation network (SPN) and does not use the
Data Encryption Standard (DES) Feistel network.[7]
The AES replaced the DES with new and updated
features:
 Block encryption implementation
 128-bit group encryption with 128, 192 and
256-bit key lengths
 Symmetric algorithm requiring only one
encryption and decryption key
 Data security for 20-30 years
 Worldwide access
 No royalties
 Easy overall implementation
2.7 RSA (Rivest-Shamir-Adleman)
RSA is a cryptosystem for public-key encryption,
and is widely used for securing sensitive data,
particularly when being sent over an insecure
network such as the Internet.
RSA was first described in 1977 by Ron Rivest, Adi
Shamir and Leonard Adleman of the Massachusetts
Institute of Technology. Public-key cryptography,
also known as asymmetric cryptography, uses two
different but mathematically linked keys, one public
and one private. The public key can be shared with
everyone, whereas the private key must be kept
secret. In RSA cryptography, both the public and the
private keys can encrypt a message; the opposite key
from the one used to encrypt a message is used to
decrypt it. This attribute is one reason why RSA has
become the most widely used asymmetric algorithm:
It provides a method of assuring the confidentiality,
integrity, authenticity and non-reputability of
electronic communications and data storage.[8]
3. CONCLUSION
In this paper I have studied about cryptographic
techniques and provide the security to data by hiding
original data. It is prevent unauthorized user to access
the data. It provide authentication to user to protect
from unauthorized user. Cryptography is a best way
for secure data. The process of encryption and
decryption is the main mechanism which is working
and guiding the flow of data.
Reference:
[1] Saykhede, A. et al. “A Survey Paper on Type and
Method of Cryptography Technique”
INTERNATIONAL JOURNAL FOR RESEARCH
E-ISSN: 2349-7610 VOLUME-2, SPECIAL ISSUE-
1, MARCH-2015
[2] http://disp.ee.ntu.edu.tw
4
[3] Juneja, M. et al. “A Review of Cryptography
Techniques and Implementation of AES for Images”
International Journal of Computer Science and
Electronics Engineering (IJCSEE) Volume 1, Issue 4
(2013) ISSN 2320-401X; EISSN 2320-4028
[4] Juneja, M. et al “A Review of Cryptography
Techniques and Implementation of AES for Images”
International Journal of Computer Science and
Electronics Engineering (IJCSEE) Volume 1, Issue 4
(2013) ISSN 2320-401X; EISSN 2320-4028
[5] https://www.techopedia.com
[6] https://www.techopedia.com
[7] https://www.techopedia.com
[8] http://searchsecurity.techtarget.com

More Related Content

Similar to A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES

DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 

Similar to A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES (20)

DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
network security
network securitynetwork security
network security
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Data encryption
Data encryptionData encryption
Data encryption
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 

More from Valerie Felton

Teach For America Essay
Teach For America EssayTeach For America Essay
Teach For America EssayValerie Felton
 
Frederick Douglass Essay Questions
Frederick Douglass Essay QuestionsFrederick Douglass Essay Questions
Frederick Douglass Essay QuestionsValerie Felton
 
PPT - United States Constitution Day September 17, 1787 PowerPoint
PPT - United States Constitution Day September 17, 1787 PowerPointPPT - United States Constitution Day September 17, 1787 PowerPoint
PPT - United States Constitution Day September 17, 1787 PowerPointValerie Felton
 
Qualities Of The Best Online Paper Writing Services - EssayMin
Qualities Of The Best Online Paper Writing Services - EssayMinQualities Of The Best Online Paper Writing Services - EssayMin
Qualities Of The Best Online Paper Writing Services - EssayMinValerie Felton
 
Law School Outlines Law School, Writing Lesson Plan
Law School Outlines Law School, Writing Lesson PlanLaw School Outlines Law School, Writing Lesson Plan
Law School Outlines Law School, Writing Lesson PlanValerie Felton
 
😝 International Essay Writing Competitio.pdf
😝 International Essay Writing Competitio.pdf😝 International Essay Writing Competitio.pdf
😝 International Essay Writing Competitio.pdfValerie Felton
 
Scholarship Statement Example - Sanox
Scholarship Statement Example - SanoxScholarship Statement Example - Sanox
Scholarship Statement Example - SanoxValerie Felton
 
Mla Essay Heading. MLA Heading Format And Writin
Mla Essay Heading. MLA Heading Format And WritinMla Essay Heading. MLA Heading Format And Writin
Mla Essay Heading. MLA Heading Format And WritinValerie Felton
 
Amp-Pinterest In Action Persuasi
Amp-Pinterest In Action PersuasiAmp-Pinterest In Action Persuasi
Amp-Pinterest In Action PersuasiValerie Felton
 
6 Best Images Of Snowflake Writing Paper Printable - S
6 Best Images Of Snowflake Writing Paper Printable - S6 Best Images Of Snowflake Writing Paper Printable - S
6 Best Images Of Snowflake Writing Paper Printable - SValerie Felton
 
Free Full Essay On Global Warming. Research Essay. 2022-10-27
Free Full Essay On Global Warming. Research Essay. 2022-10-27Free Full Essay On Global Warming. Research Essay. 2022-10-27
Free Full Essay On Global Warming. Research Essay. 2022-10-27Valerie Felton
 
Pencil Reviews ThriftyFun
Pencil Reviews ThriftyFunPencil Reviews ThriftyFun
Pencil Reviews ThriftyFunValerie Felton
 
WRITING TASK 1 GENERAL IELTS TOPICS SYDMITI
WRITING TASK 1 GENERAL IELTS TOPICS SYDMITIWRITING TASK 1 GENERAL IELTS TOPICS SYDMITI
WRITING TASK 1 GENERAL IELTS TOPICS SYDMITIValerie Felton
 
How To Write A Strong Essay
How To Write A Strong EssayHow To Write A Strong Essay
How To Write A Strong EssayValerie Felton
 
Essay On Terrorism In India Terrorism In India Essay Fo
Essay On Terrorism In India Terrorism In India Essay FoEssay On Terrorism In India Terrorism In India Essay Fo
Essay On Terrorism In India Terrorism In India Essay FoValerie Felton
 
Sunset Writing Paper Set, Optional Storage Box Pen
Sunset Writing Paper Set, Optional Storage Box PenSunset Writing Paper Set, Optional Storage Box Pen
Sunset Writing Paper Set, Optional Storage Box PenValerie Felton
 
Research Paper Hook Examples. How To Write A Hook For A Research
Research Paper Hook Examples. How To Write A Hook For A ResearchResearch Paper Hook Examples. How To Write A Hook For A Research
Research Paper Hook Examples. How To Write A Hook For A ResearchValerie Felton
 
Write A Short Essay On LibraryImportance Of LibraryEssay Writing
Write A Short Essay On LibraryImportance Of LibraryEssay WritingWrite A Short Essay On LibraryImportance Of LibraryEssay Writing
Write A Short Essay On LibraryImportance Of LibraryEssay WritingValerie Felton
 

More from Valerie Felton (20)

Essay About Reading
Essay About ReadingEssay About Reading
Essay About Reading
 
Teach For America Essay
Teach For America EssayTeach For America Essay
Teach For America Essay
 
College Essays Com
College Essays ComCollege Essays Com
College Essays Com
 
Frederick Douglass Essay Questions
Frederick Douglass Essay QuestionsFrederick Douglass Essay Questions
Frederick Douglass Essay Questions
 
PPT - United States Constitution Day September 17, 1787 PowerPoint
PPT - United States Constitution Day September 17, 1787 PowerPointPPT - United States Constitution Day September 17, 1787 PowerPoint
PPT - United States Constitution Day September 17, 1787 PowerPoint
 
Qualities Of The Best Online Paper Writing Services - EssayMin
Qualities Of The Best Online Paper Writing Services - EssayMinQualities Of The Best Online Paper Writing Services - EssayMin
Qualities Of The Best Online Paper Writing Services - EssayMin
 
Law School Outlines Law School, Writing Lesson Plan
Law School Outlines Law School, Writing Lesson PlanLaw School Outlines Law School, Writing Lesson Plan
Law School Outlines Law School, Writing Lesson Plan
 
😝 International Essay Writing Competitio.pdf
😝 International Essay Writing Competitio.pdf😝 International Essay Writing Competitio.pdf
😝 International Essay Writing Competitio.pdf
 
Scholarship Statement Example - Sanox
Scholarship Statement Example - SanoxScholarship Statement Example - Sanox
Scholarship Statement Example - Sanox
 
Mla Essay Heading. MLA Heading Format And Writin
Mla Essay Heading. MLA Heading Format And WritinMla Essay Heading. MLA Heading Format And Writin
Mla Essay Heading. MLA Heading Format And Writin
 
Amp-Pinterest In Action Persuasi
Amp-Pinterest In Action PersuasiAmp-Pinterest In Action Persuasi
Amp-Pinterest In Action Persuasi
 
6 Best Images Of Snowflake Writing Paper Printable - S
6 Best Images Of Snowflake Writing Paper Printable - S6 Best Images Of Snowflake Writing Paper Printable - S
6 Best Images Of Snowflake Writing Paper Printable - S
 
Free Full Essay On Global Warming. Research Essay. 2022-10-27
Free Full Essay On Global Warming. Research Essay. 2022-10-27Free Full Essay On Global Warming. Research Essay. 2022-10-27
Free Full Essay On Global Warming. Research Essay. 2022-10-27
 
Pencil Reviews ThriftyFun
Pencil Reviews ThriftyFunPencil Reviews ThriftyFun
Pencil Reviews ThriftyFun
 
WRITING TASK 1 GENERAL IELTS TOPICS SYDMITI
WRITING TASK 1 GENERAL IELTS TOPICS SYDMITIWRITING TASK 1 GENERAL IELTS TOPICS SYDMITI
WRITING TASK 1 GENERAL IELTS TOPICS SYDMITI
 
How To Write A Strong Essay
How To Write A Strong EssayHow To Write A Strong Essay
How To Write A Strong Essay
 
Essay On Terrorism In India Terrorism In India Essay Fo
Essay On Terrorism In India Terrorism In India Essay FoEssay On Terrorism In India Terrorism In India Essay Fo
Essay On Terrorism In India Terrorism In India Essay Fo
 
Sunset Writing Paper Set, Optional Storage Box Pen
Sunset Writing Paper Set, Optional Storage Box PenSunset Writing Paper Set, Optional Storage Box Pen
Sunset Writing Paper Set, Optional Storage Box Pen
 
Research Paper Hook Examples. How To Write A Hook For A Research
Research Paper Hook Examples. How To Write A Hook For A ResearchResearch Paper Hook Examples. How To Write A Hook For A Research
Research Paper Hook Examples. How To Write A Hook For A Research
 
Write A Short Essay On LibraryImportance Of LibraryEssay Writing
Write A Short Essay On LibraryImportance Of LibraryEssay WritingWrite A Short Essay On LibraryImportance Of LibraryEssay Writing
Write A Short Essay On LibraryImportance Of LibraryEssay Writing
 

Recently uploaded

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES

  • 1. 1 A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES NAVDEEP KAUR1 RUCHIKA JERATH2 1M.Tech (cse) pursuing, RIMT, Mandi Gobindgarh. 2Asst. Professor, Dept. of CSE, RIMT, Mandi Gobindgarh, Punjab, India ABSTRACT: Cryptography is a technique which provides security to the messages sent between sender and receiver on a network. Only authorized users can access the message. It helps to maintain the integrity of communication on a network. There are two main term of cryptography which are encryption and decryption. Encoding of message provided by Encryption and decoding of message provided by Decryption. Cryptography is a technique which provides security to our data by using two methods which are substitution and transposition encryption method. There are two main types of cryptography schemes used one is symmetric key cryptography which depends on single key value and asymmetric key cryptography which depends on pair of keys. Keywords: Cryptography, Substitution Techniques, Transposition Techniques, Symmetric Key Cryptography, Asymmetric Key Cryptography. 1. INTRODUCTION Cryptography is a technique to provide the security to data communication in the presence of third party. Every user wants a secure network to communicate that data should be secure and there is no intruder can read their data. Cryptography is used in Wireless and wired network for providing secure data communication. Cryptography converts the plain text into cipher text and cipher text into a plain text. Plain text is converted into a cipher text which is at a sender side known as encryption and cipher text is converted into a plain text which is at a receiver side known as decryption. Encryption converts readable form of message into unreadable form. Decryption converts unreadable form of message to readable form. Cryptography is divided into two types’ symmetric key cryptography and asymmetric key cryptography. Symmetric key cryptography use single key for encryption and decryption hence it is called as secret key cryptography and asymmetric key use pair of public and private key so it is called as public key cryptography. Cryptography services . A service that improve the security of the data processing systems. There are four type of services provided by Cryptography such as confidentiality, integrity, authentication, non-repudiation 1.1 Basics of Cryptography Cryptography provides security to the data during the transmission by performing some operations. The main aim of cryptography is to help user to hide information from unauthorized user. 1.1.1 ENCRYPTION Encryption is a technique which is converting a readable form of message into unreadable form which means conversion of plain text into cipher text. Encryption is performed when message is send by sender. The process of encryption is shown below fig. fig.process of encryption
  • 2. 2 1.1.2 DECRYPTION It is a technique of cryptography which is converting an unreadable form of message into readable form which means that conversion of cipher text into a plain text known as decryption. Decryption is performed when message is received by receiver. The process of decryption is shown below fig. fig. process of decryption 2. ANALYSIS OF CRYPTORAPHICS TECHNIQUES: 2.1 Secret Key & Public Key Cryptography There are two keys are used in the cryptography which is secret key (symmetric cipher) and public key (asymmetric cipher). 2.2 SYMMETRIC KEY CRYPTOGRAPHY It is the one type of encryption algorithm which converts plain text into cipher text. It provides the security of data when data is transmission from one to another by using single secrete key. This secrete key is same to perform encryption and decryption. This key is known to only those users who are sending and receiving the message on that network. Secret key maintain the security of data therefore no other person access the data. Fig. process of symmetric key cryptography. Encryption algorithm is divided into two parts:  Block Cipher : When messages are too long then it is difficult to encrypt the data then block cipher overcome this problem by the dividing the data into the fixed size of blocks. which are maybe 64 bit or 128 bit size of blocks. Encryption is performed on individual block by using same key. There are various modes of block cipher which are Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), and Output Feedback (OFB).  Stream Cipher But in the stream cipher the data is encrypt within one digit block. It does not encrypt the whole digits within the block in one time, it encrypt only one digit at particular one time encryption. 2.3. ASYMMETRIC KEY CRYPTOGRAPHY It is also called as public key cryptography. Rather than using single key for encryption and decryption two different key are use for encryption and decryption. Where one key encrypt and other can decrypt. If sender sends a message then encryption is perform on sender side by using receiver public key and sends a message to the receiver. Only receiver can able to see a message and receiver decrypt a message by using receiver Private Key so security is maintained. Here key management is required. [1] Fig. Process of Asymmetric Key Cryptography.
  • 3. 3 Table.1 advantage and disadvantage of symmetric cipher and asymmetric cipher [2] 2.4 DES (Data Encryption Standard): DES defined as a block encryption algorithm. It was the first encryption standard published by NIST (National Institute of Standards and Technology). It is a symmetric algorithm, means same key is used for encryption and decryption. It uses one 64-bit key. Out of 64 bits, 56 bits make up the independent key, which determine the exact cryptography transformation; 8 bits are used for error detection. The main operations are bit permutations and substitution in one round of DES. Six different permutation operations are used both in key expansion part and cipher part. Decryption of DES algorithm is similar to encryption, only the round keys are applied in reverse order. The output is a 64- bit block of cipher text. Many attacks and methods recorded the weaknesses of DES, which made it an insecure block cipher key [3] 2.5. 3DES (Triple DES): 3DES is an enhancement of Data Encryption Standard. It uses 64 bit block size with 192 bits of key size. The encryption method is similar to the one in the original DES but applied 3 times to increase the encryption level and the average safe time. 3DES is slower than other block cipher methods. [4] 2.6 AES (ADVANCED ENCRYPTION STANDARDS) The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm, U.S. government standard for secure data and classified data for encryption and decryption.[5] In December 2001, the National Institute of Standards (NIST) approved the AES as Federal Information Processing Standards Publication (FIPS PUB) 197, which specifies application of the Rijndael algorithm to all sensitive classified data.[6] The AES has three fixed 128-bit block ciphers with cryptographic key sizes of 128, 192 and 256 bits. Key size is unlimited, whereas the block size maximum is 256 bits. The AES design is based on a substitution- permutation network (SPN) and does not use the Data Encryption Standard (DES) Feistel network.[7] The AES replaced the DES with new and updated features:  Block encryption implementation  128-bit group encryption with 128, 192 and 256-bit key lengths  Symmetric algorithm requiring only one encryption and decryption key  Data security for 20-30 years  Worldwide access  No royalties  Easy overall implementation 2.7 RSA (Rivest-Shamir-Adleman) RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet. RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. Public-key cryptography, also known as asymmetric cryptography, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. In RSA cryptography, both the public and the private keys can encrypt a message; the opposite key from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the most widely used asymmetric algorithm: It provides a method of assuring the confidentiality, integrity, authenticity and non-reputability of electronic communications and data storage.[8] 3. CONCLUSION In this paper I have studied about cryptographic techniques and provide the security to data by hiding original data. It is prevent unauthorized user to access the data. It provide authentication to user to protect from unauthorized user. Cryptography is a best way for secure data. The process of encryption and decryption is the main mechanism which is working and guiding the flow of data. Reference: [1] Saykhede, A. et al. “A Survey Paper on Type and Method of Cryptography Technique” INTERNATIONAL JOURNAL FOR RESEARCH E-ISSN: 2349-7610 VOLUME-2, SPECIAL ISSUE- 1, MARCH-2015 [2] http://disp.ee.ntu.edu.tw
  • 4. 4 [3] Juneja, M. et al. “A Review of Cryptography Techniques and Implementation of AES for Images” International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 4 (2013) ISSN 2320-401X; EISSN 2320-4028 [4] Juneja, M. et al “A Review of Cryptography Techniques and Implementation of AES for Images” International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 4 (2013) ISSN 2320-401X; EISSN 2320-4028 [5] https://www.techopedia.com [6] https://www.techopedia.com [7] https://www.techopedia.com [8] http://searchsecurity.techtarget.com