SlideShare a Scribd company logo
CRYPTOGRAPHY
Cryptography
Encryption
Traditional Ciphers
Substitution Ciphers
Transposition Ciphers
 Cryptographic Algorithm
 DES
 RSA
Public Key Cryptography
Digital Signature
 CRYPTOGRAPHY
The word Cryptography in Greek means “secret writing”. However ,the term today
Refers to the science and art of transforming messages to make them secure and
immune to attacks . Figure 1.1 shows the components involved in cryptography.
Figure 1.1 Cryptography Components
Plaintext Plaintext
Ciphertext Ciphertext
 Plaintext :-The original message produced by the sender is called as plaintext.
 Encryption :- The plaintext is transformed into ciphertext .The encryption program
converts the plaintext into ciphertext .
 Decryption :-Decryption is a process which is exactly opposite to encryption . The
decryption algorithm at the receiver transforms the ciphertext back to plain text.
Sender
Encryption Network Decryption
Receiver
 TRADITIONAL CIPHERS
Traditional ciphers are the earliest and simplest types of ciphers in which a character is
used as a unit of data to be encrypted.The traditional ciphers are of following two types :
 Substitution Ciphers :-A substitution cipher is one in which letters are represented
by other letters; it can be deciphered by someone knowing the order of the cipher
alphabet used. To encode a message, for example:
THIS CODE WAS INVENTED BY JULIUS CAESAR
take each letter, go three along the alphabet and use that letter instead (e.g. A goes to
D).
Plaintext-A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ciphertext- D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
So the message becomes
WKLV FRGH ZDV LQYHQWHG EB MXOLXV FDHVDU
 Transposition Ciphers :-In cryptography, a transposition cipher is a method of
encryption by which the positions held by units of plaintext (which are commonly
characters or groups of characters) are shifted according to a regular system, so that
the ciphertext constitutes a permutation of the plaintext. That is, the order of the units
is changed. Mathematically a bijective function is used on the characters' positions to
encrypt and an inverse function to decrypt.Following are some implementations.
 CRYPTOGRAPHIC ALGORITHM
 DES :-Data Encryption Standard
 US encryption standard [NIST 1993]
 56-bit symmetric key, 64-bit plaintext input
 Block cipher with cipher block chaining
 How secure is DES?
o DES Challenge: 56-bit-key-encrypted phrase decrypted (brute force) in less than a day
o No known good analytic attack
 Making DES more secure:
o 3DES: encrypt 3 times with 3 different keys (actually encrypt, decrypt, encrypt)
 RSA :-Rivest,Shamir and Alderman One of the most commonly used public key
algorithms.The public key in RSA is a pair of numbers (N,e) and the private key also is a
pair of numbers (N,d).The number N is common between the private and public
keys.The algorithm used by the sender to encrypt the message is as follows:
C = Pe mod N
P = Plaintext represented as a number
C = Ciphertext represented as a number
e and N are components of public key
The algorithm used by the receiver to decrypt the message is as under :
P = Cd mod N
P = Plaintext
C = Ciphertext
d and N are components of private key
 PUBLIC KEY CRYPTOGRAPHY :
The public key cryptography is also called as the asymmetric key cryptography.
In this type of cryptography, there are two keys as under
o Public Key
o Private Key
Out of them, the private key is kept by the receiver whereas the public key is announced to
the public . Figure shows the schematic for public key cryptography.
To the public
Plaintext Receivers Public Key
Ciphertext Ciphertext Plaintext
 DIGITAL SIGNATURE :-The receiver may need to verify that a transmitted message
actually originated from the sender (signature), and didn't just come from there
(authentication). This is done using the sender's decryption key, and the signature can later
be veried by anyone, using the corresponding public encryption key. Signatures therefore
cannot be forged. Also, no signer can later deny having signed the message.
SENDER
Encryption Network Decryption Receiver

More Related Content

What's hot

3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta
 
Diffie-Hellman Key Exchange
Diffie-Hellman Key ExchangeDiffie-Hellman Key Exchange
Diffie-Hellman Key Exchange
Gürkan YILDIRIM
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Samdish Arora
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
Qualcomm
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
Shashank Mishra
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
Shafaan Khaliq Bhatti
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
Soma Subbama
 
rsa-1
rsa-1rsa-1
Rsa
RsaRsa
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 

What's hot (20)

3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Diffie-Hellman Key Exchange
Diffie-Hellman Key ExchangeDiffie-Hellman Key Exchange
Diffie-Hellman Key Exchange
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
rsa-1
rsa-1rsa-1
rsa-1
 
Rsa
RsaRsa
Rsa
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 

Viewers also liked

Cryptography by Epul
Cryptography by EpulCryptography by Epul
Cryptography by Epul
Agate Studio
 
Message digest & digital signature
Message digest & digital signatureMessage digest & digital signature
Message digest & digital signature
Dinesh Kodam
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Rsa
RsaRsa
Linux booting process
Linux booting processLinux booting process
Linux booting process
Prashant Hegde
 
Disk
DiskDisk
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
Pratik Poddar
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Ch31
Ch31Ch31
Ch31
bitistu
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 
Byte Rotation Algorithm
Byte Rotation AlgorithmByte Rotation Algorithm
Byte Rotation Algorithm
Engr0918
 
Raid_intro.ppt
Raid_intro.pptRaid_intro.ppt
Raid_intro.ppt
webhostingguy
 
Volatile memory
Volatile memoryVolatile memory
Volatile memory
Simon Paul
 
Forensic imaging tools
Forensic imaging tools Forensic imaging tools
Forensic imaging tools
Dr. Richard Adams
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
James McGivern
 
Hash function
Hash function Hash function
Hash function
Salman Memon
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
Dhaval Kaneria
 
Apprenticeship artifact
Apprenticeship  artifactApprenticeship  artifact
Apprenticeship artifact
Shooter24
 
Partitioning a Hard Drive
Partitioning a Hard DrivePartitioning a Hard Drive
Partitioning a Hard Drive
Jamaica Olazo
 

Viewers also liked (20)

Cryptography by Epul
Cryptography by EpulCryptography by Epul
Cryptography by Epul
 
Message digest & digital signature
Message digest & digital signatureMessage digest & digital signature
Message digest & digital signature
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Rsa
RsaRsa
Rsa
 
Linux booting process
Linux booting processLinux booting process
Linux booting process
 
Disk
DiskDisk
Disk
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Ch31
Ch31Ch31
Ch31
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Byte Rotation Algorithm
Byte Rotation AlgorithmByte Rotation Algorithm
Byte Rotation Algorithm
 
Raid_intro.ppt
Raid_intro.pptRaid_intro.ppt
Raid_intro.ppt
 
Volatile memory
Volatile memoryVolatile memory
Volatile memory
 
Forensic imaging tools
Forensic imaging tools Forensic imaging tools
Forensic imaging tools
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Hash function
Hash function Hash function
Hash function
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Apprenticeship artifact
Apprenticeship  artifactApprenticeship  artifact
Apprenticeship artifact
 
Partitioning a Hard Drive
Partitioning a Hard DrivePartitioning a Hard Drive
Partitioning a Hard Drive
 

Similar to Cryptography

Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Cryptography
CryptographyCryptography
Cryptography
Abhi Prithi
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
Shraddha Gupta
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
Neha Bhambu
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
desalewminale
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
Ali Habeeb
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
Tata Consultancy Services
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
Rajesh Ishida
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
Somaditya Basak
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
Suresh Thammishetty
 
Cns 1
Cns 1Cns 1
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Cryptography
CryptographyCryptography
Cryptography
Sandip kumar
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
Cryptography
CryptographyCryptography
Cryptography
Bijaya Khadka
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
ShaikSameena24
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Encryption
EncryptionEncryption
Encryption
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Cns 1
Cns 1Cns 1
Cns 1
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 

Recently uploaded

MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.
DK PAGEANT
 
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
stgq9v39
 
HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...
HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...
HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...
homendecormagazine
 
Insanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete GuideInsanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete Guide
Trending Blogers
 
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
qghuhwa
 
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
ubopub
 
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
ramaysha335
 
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
lyurzi7r
 

Recently uploaded (8)

MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.MISS RAIPUR 2024 - WINNER POONAM BHARTI.
MISS RAIPUR 2024 - WINNER POONAM BHARTI.
 
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
 
HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...
HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...
HnD_Final File - America's Trendsetting Interior Designer Showcasing Interior...
 
Insanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete GuideInsanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete Guide
 
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
 
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
 
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
2024欧洲杯比分投注-2024欧洲杯比分投注推荐-2024欧洲杯比分投注|【​网址​🎉ac99.net🎉​】
 
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
 

Cryptography

  • 1. CRYPTOGRAPHY Cryptography Encryption Traditional Ciphers Substitution Ciphers Transposition Ciphers  Cryptographic Algorithm  DES  RSA Public Key Cryptography Digital Signature
  • 2.  CRYPTOGRAPHY The word Cryptography in Greek means “secret writing”. However ,the term today Refers to the science and art of transforming messages to make them secure and immune to attacks . Figure 1.1 shows the components involved in cryptography. Figure 1.1 Cryptography Components Plaintext Plaintext Ciphertext Ciphertext  Plaintext :-The original message produced by the sender is called as plaintext.  Encryption :- The plaintext is transformed into ciphertext .The encryption program converts the plaintext into ciphertext .  Decryption :-Decryption is a process which is exactly opposite to encryption . The decryption algorithm at the receiver transforms the ciphertext back to plain text. Sender Encryption Network Decryption Receiver
  • 3.  TRADITIONAL CIPHERS Traditional ciphers are the earliest and simplest types of ciphers in which a character is used as a unit of data to be encrypted.The traditional ciphers are of following two types :  Substitution Ciphers :-A substitution cipher is one in which letters are represented by other letters; it can be deciphered by someone knowing the order of the cipher alphabet used. To encode a message, for example: THIS CODE WAS INVENTED BY JULIUS CAESAR take each letter, go three along the alphabet and use that letter instead (e.g. A goes to D). Plaintext-A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext- D E F G H I J K L M N O P Q R S T U V W X Y Z A B C So the message becomes WKLV FRGH ZDV LQYHQWHG EB MXOLXV FDHVDU  Transposition Ciphers :-In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.Following are some implementations.
  • 4.  CRYPTOGRAPHIC ALGORITHM  DES :-Data Encryption Standard  US encryption standard [NIST 1993]  56-bit symmetric key, 64-bit plaintext input  Block cipher with cipher block chaining  How secure is DES? o DES Challenge: 56-bit-key-encrypted phrase decrypted (brute force) in less than a day o No known good analytic attack  Making DES more secure: o 3DES: encrypt 3 times with 3 different keys (actually encrypt, decrypt, encrypt)  RSA :-Rivest,Shamir and Alderman One of the most commonly used public key algorithms.The public key in RSA is a pair of numbers (N,e) and the private key also is a pair of numbers (N,d).The number N is common between the private and public keys.The algorithm used by the sender to encrypt the message is as follows: C = Pe mod N P = Plaintext represented as a number C = Ciphertext represented as a number e and N are components of public key The algorithm used by the receiver to decrypt the message is as under : P = Cd mod N P = Plaintext C = Ciphertext d and N are components of private key
  • 5.  PUBLIC KEY CRYPTOGRAPHY : The public key cryptography is also called as the asymmetric key cryptography. In this type of cryptography, there are two keys as under o Public Key o Private Key Out of them, the private key is kept by the receiver whereas the public key is announced to the public . Figure shows the schematic for public key cryptography. To the public Plaintext Receivers Public Key Ciphertext Ciphertext Plaintext  DIGITAL SIGNATURE :-The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn't just come from there (authentication). This is done using the sender's decryption key, and the signature can later be veried by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. SENDER Encryption Network Decryption Receiver