Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Imbricate cryptography


Published on

download Documentation and Slides at

Published in: Education

Imbricate cryptography

  1. 1. IMBRICATE CRYPTOGRAPHY For Documentation and Downloads Visit
  2. 2. <ul><li>Security and privacy are critical for electronic communication and e-business. </li></ul><ul><li>Network security measures are needed to protect data during its transmission. </li></ul><ul><li>Cryptography, being the science of information security fulfills our need. </li></ul>
  3. 3. <ul><li>The word Cryptography means ‘hidden writing’ </li></ul><ul><li>‘ Hidden’ for ‘Crypto’ and ‘Writing’ for ‘graphy’. </li></ul><ul><li>It plays an important role in exchanging the confidential information between two parties in a secured manner. </li></ul><ul><li>The process involves Encryption and Decryption. </li></ul>
  4. 4. <ul><li>Symmetric Cryptography. </li></ul><ul><li>Asymmetric Cryptography. </li></ul>
  5. 5. <ul><ul><li>If the sender and receiver use different keys, </li></ul></ul><ul><li> it is called Asymmetric or multiple key , </li></ul><ul><li>public key encryption . </li></ul>
  6. 6. <ul><li>If the sender and the receiver use the same key, it is called Symmetric or single key, secret key or conventional Encryption. </li></ul>
  7. 7. <ul><li>Type of symmetric cryptography. </li></ul><ul><li>Key is implanted in the message. </li></ul><ul><li>Uses layered approach in encrypting and decrypting the message. </li></ul>
  8. 8. <ul><li>It converts the plain text into un understandable cipher text. </li></ul><ul><li>It involves three layers. </li></ul><ul><li>Layer1: </li></ul><ul><li>It is also called ‘mapping’ layer as it maps or replaces with every character in the message with the other character from the same set. </li></ul><ul><li>IF SOURCE CODE IS ‘kits’ </li></ul><ul><li>THEN EQUIVALENT MAPPING CODE IS ‘jsea’ </li></ul>Source file characters Equivalent mapping characters a/e/i/o/s/t/ {repeated} o/t/s/i/a/e/ b/c/d/e/f/g/h/j/k/l/m/n/ p/q/r/u/v/w/x/y/z/{non-repeated} h/f/b/d/g/c/l/n/j/k/m/u/y/ p/z/q/v/w/x 0/1/2/3/4/5/6/7/8/9/ 4/6/9/7/0/8/1/3/2/5/ Special characters Same characters
  9. 9. <ul><li>code_encoding layer </li></ul><ul><li>makes use of ASCII characters and bitwise operations. </li></ul><ul><li>Earlier ‘kits’ was converted to ‘jsea’ and if the key is ‘ hai ’. </li></ul><ul><li>Now the message will be converted as (j^~ASCII(h),s^~ASCII(a),e^~ASCII(i),a^~ASCII(h)) </li></ul><ul><li>This operation can be represented as </li></ul><ul><li>Char_new=(char_old)^(~key[i] ) </li></ul>
  10. 10. <ul><li>Bitmap_conversion layer. </li></ul><ul><li>Each character of the code generated in layer2 is converted to its equivalent binary value(8-bit representation). </li></ul><ul><li>Binary values are stored in the o/p bitmap file </li></ul>
  11. 11. <ul><li>It converts the encrypted message into normal plain text. </li></ul><ul><li>It has 3 layers . </li></ul><ul><li>Layer1: </li></ul><ul><li>re_structuring layer </li></ul><ul><li>Layer2: </li></ul><ul><li>It is called code_decoding layer. </li></ul><ul><li>Decoding of character and key </li></ul><ul><li>Ch=ch^~ASCII(K) </li></ul><ul><li>This reveals that algorithm used in encryption (layer2) can also be used for decryption also. </li></ul><ul><li>Generated characters are equivalent mapping characters </li></ul>
  12. 12. <ul><li>It called re_mapping layer. </li></ul><ul><li>It is exactly the reverse process of the layer1 in the encryption . </li></ul><ul><li>Equivalent mapping characters to source code. </li></ul><ul><li>‘ jsea’ is converted to </li></ul><ul><li>‘ kits’ </li></ul>
  13. 13. <ul><li>Any person who wants to crack this system must: </li></ul><ul><li>Know that the binary values in the bitmap </li></ul><ul><li>Binary values to ASCII characters </li></ul><ul><li>To break the second layer, find the logic that the key is XORed with the characters. </li></ul><ul><li>Equivalent mapping characters to source code characters. </li></ul><ul><li>Key cannot be found. </li></ul>
  14. 14. <ul><li>Confidentiality: </li></ul><ul><li>Simplicity: </li></ul><ul><li>Security: </li></ul><ul><li>Protection: </li></ul><ul><li>Incorporated key: </li></ul>
  15. 15. <ul><li>Secure communication over insecure channels is the main criteria of this concept. </li></ul><ul><li>Whatever may be the generation the communication between the people belonging to different places always plays the major role in the development process and it is highly important to make the communication flawless and effective. </li></ul>
  16. 16. THANK YOU