0% found this document useful (0 votes)
183 views4 pages

Cryptography Answer

This document discusses cryptography concepts including: 1. The main goals of cryptography are data privacy, authenticity, and integrity. Confidentiality is achieved through encryption with a cryptographic key. Data integrity ensures the message is not altered through hashing and message digests. 2. Transposition cipher rearranges the order of letters in the plaintext. An example uses a columnar transposition cipher that writes the plaintext horizontally and reads the ciphertext vertically. 3. Diffusion means changing one plaintext character changes several ciphertext characters. Confusion means the key does not relate simply to the ciphertext and the entire key changes if one ciphertext character changes. 4. Private key cryptography uses a single shared key for

Uploaded by

normall useingg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views4 pages

Cryptography Answer

This document discusses cryptography concepts including: 1. The main goals of cryptography are data privacy, authenticity, and integrity. Confidentiality is achieved through encryption with a cryptographic key. Data integrity ensures the message is not altered through hashing and message digests. 2. Transposition cipher rearranges the order of letters in the plaintext. An example uses a columnar transposition cipher that writes the plaintext horizontally and reads the ciphertext vertically. 3. Diffusion means changing one plaintext character changes several ciphertext characters. Confusion means the key does not relate simply to the ciphertext and the entire key changes if one ciphertext character changes. 4. Private key cryptography uses a single shared key for

Uploaded by

normall useingg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cryptography

Short Questions with answers


1) Cypher in cryptography-- encrypted msg

2) Where the cryptanalys is used-- to find some insecurity

3) What alternative term can be used to describe asymmetric cryptography


algorithm-- public key

4)What id md4 and md5 -- # algorithm

5)What is data encryption standard(des)-- block cypher

6)Who is/are responsible for private key in asymmetric key cryptography -- sender
receiver both

Q.1)Goals of Cryptography
The Main Goals of cryptography

• Data Privacy(confidentiality)
• Data Authenticity(it came from from where it claims)
• Data integrity(it has not been modified on the way) in the digital world

Confidentiality

• Confidentiality is most commonly addressed goal


• The meaning of a message is concealed by encoding it
• The sender encrypts the message using a cryptographic key
• The recipient decrypts the message using a cryptographic key that may
or may not be the same as the one used by the sender

Data Integrity

• Integrity Ensures that the message received is the same as the message
that was sent
• Uses hashing to create a unique message digest from the message that
is sent along with the message
• Recipient uses the same technique to create a second digest from the
message to compare to the original one
• This technique only protects against unintentional alteration of the
message
• A variation is used to create digital signatures to protect against
malicious alteration

Authentication

• A user or system can prove their identity to another who does not have
personal knowledge of their identity
• Accomplished using digital certificates
• Kerberos is a common cryptographic authentication system

Q.2) Explain transposition cypher with an example


Transposition Cipher is a cryptographic algorithm where the order of alphabets in the
plaintext is rearranged to form a cipher text. In this process, the actual plain text
alphabets are not included.

Example
A simple example for a transposition cipher is columnar transposition cipher where
each character in the plain text is written horizontally with specified alphabet width. The
cipher is written vertically, which creates an entirely different cipher text.
Consider the plain text hello world, and let us apply the simple columnar transposition
technique as shown below

The plain text characters are placed horizontally and the cipher text is created with
vertical format as : holewdlo lr. Now, the receiver has to use the same table to decrypt
the cipher text to plain text.
Explanation
• Using the function split_len(), we can split the plain text characters, which can be
placed in columnar or row format.
• encode method helps to create cipher text with key specifying the number of
columns and prints the cipher text by reading characters through each column.

Q.3) What is diffusion and confusion in cryptography


Diffusion:
Diffusion means that if we change a character of the plaintext, then several
characters of the ciphertext should change, and similarly, if we change a character
of the ciphertext, then several characters of the plaintext should change. We saw
that the Hill cipher has this property. This means that frequency statistics of letters,
[digraphs], etc. in the plaintext are diffused over several characters in the
ciphertext, which means that much more ciphertext is needed to do a meaningful
statistical attack.

Confusion:
Confusion means that the key does not relate in a simple way to the
ciphertext. In particular, each character of the ciphertext should depend on several
parts of the key. For example, suppose we have a Hill cipher with an n*n matrix,
and suppose we have a plaintext-ciphertext pair of length n2 with which we are
able to solve for the encryption matrix. If we change one character of the
ciphertext, one column of the matrix can change completely. Of course, it would
be more desirable to have the entire key change. When a situation like that
happens, the cryptanalyst would probably need to solve for the entire key
simultaneously, rather than piece by piece.

Q.4) Compare private key cryptography, and public key cryptography


Private Keys and Public Keys terms are used in encryption and decryption.
These keys are used to encrypt/decrypt sensitive information.
The following are some of the important differences between Private Key
and Public Key.
Sr. Key Private Key Public Key
No.

Algorithm Private Key is used to both encrypt and The public key is only used to encrypt
1 decrypt the data and is shared between the data and to decrypt the data, the
sender and receiver of encrypted data. private key is used and is shared.

2 Performance The private key mechanism is faster. The public key mechanism is slower.

Secret The private key is kept secret and not The public key is free to use and the
3 public to anyone apart from the sender and private key is kept secret only.
receiver.

Type The private key mechanism is called The public key mechanism is called
4 symmetric being a single key between two asymmetric being two keys for
parties. different purposes.

Sharing The private key is to be shared between The public key can be used by anyone
5 two parties. but the private key is to be shared
between two parties only.

Targets Performance testing checks the reliability, Load testing checks the sustainability
6
scalability, and speed of the system. of the system.

You might also like