3. CRYPTOGRAPHY
SUBSTITUTION CIPHERS
(replaces the original text with secret text, keeping the order as it is)
TRANSPOSITION CIPHERS
(replaces the original text with secret text, but changing its order)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
4. Plain Text Letters:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher Text Letters:
Q W R T Y U I O P A S D F G H J K L Z X C V B N M
The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM
Bh Durga Adithya Varma , CSE-A , 12N31A0532
5. The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO
Bh Durga Adithya Varma , CSE-A , 12N31A0532
13. SECURITY THREATS
PASSIVE ATTACKS
(In this the goal of the attacker is to obtain information that is
being transmitted)
ACTIVE ATTACKS
(These attacks involve some modification of the Original Data Stream or
creation of False Stream)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
14. CONCLUSION
Security is to be given to each and every Environments whether it is our
Personal Computing Environment
(or)
Time Sharing Environment
(or)
Client-Server Environment
(or)
Distributed Computing Environment.
Bh Durga Adithya Varma , CSE-A , 12N31A0532