0% found this document useful (0 votes)
20 views3 pages

Cryptography

The document discusses cryptography topics including encryption techniques, cryptanalysis, steganography, and substitution ciphers. Cryptography involves encrypting messages to hide them and techniques include symmetric encryption, public key encryption, block and stream ciphers. Cryptanalysis aims to break encryption while steganography hides messages in other files or communications.

Uploaded by

Jaymar Chavez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views3 pages

Cryptography

The document discusses cryptography topics including encryption techniques, cryptanalysis, steganography, and substitution ciphers. Cryptography involves encrypting messages to hide them and techniques include symmetric encryption, public key encryption, block and stream ciphers. Cryptanalysis aims to break encryption while steganography hides messages in other files or communications.

Uploaded by

Jaymar Chavez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cryptography

“krypto’s – grafein” – “hidden” and “to write” – hidden writing


Time stamping – electronic document or communication
Electronic money – digital cash – cyber cash
Secure Network Communication
SSL – Secure Socket Layer – Netscape
- Providing data security layer between TCP/IP.
- supports data encryption, server authentication,
message integrity, and client authentication for TCP/IP connections.

Conventional Encryption
- symmetric encryption or single-key encryption
- only one key to encrypt or decrypt

Cryptographic systems are generally classified along three independent


dimensions:
1. The type of operation used for transforming plaintext to ciphertext:
substitution, transposition
2. The number of keys used:
one key, two keys
3. The way in which the plaintext is processed:
block cipher, stream cipher

Cryptanalysis
 The process of attempting to discover X or K or both is known as cryptanalysis
 The strategy used by the cryptanalyst depends on the nature of the encryption
scheme and information available to the analyst.
Type of attack on encrypted message
 Ciphertext only attack
 Known plaintext attack
 Chosen plaintext attack
 Chosen ciphertext attack
STEGANOGRAPHY
A plaintext message is hidden in something.
1. Character marking
 Selected letters of printed or type written are over written in pencil.
 The marks are ordinarily not visible unless the paper held at an angle to
bright light.
2. Invisible ink
3. Pin punctures
 Small pin punctures on selected letters are ordinarily not visible unless the
paper is held up in front of a light.
4. Typewriter correction ribbon
 Used between lines typed with a black ribbon, the result of typing with the
correction tape is visible only under a strong light

Substitution Techniques
1. Caesar Cipher
a. Shift Cipher-shift the letters of the alphabet
b. Julius Caesar
2. Monoalphabetic Cipher
a. Can have a random value of key-spaces
b. Easy to break reflect the frequency data of original alphabet
3. Playfair Cipher
a. best-known multiple-letter encryption
b. use of a 5x5 matrix of letters
1. Caesar Cipher
Plain A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cypher D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

2. Monoalphabetic Cipher
Plain a b C d e f g h i j k l M n o p Q R S t u v w x y z
Cypher N O P Q R S T U V W X Y Z A B C D E F G H I J K L M

3. Playfair Cipher

M O N A R
C H Y B D
E F G I K
L P Q S T
U V W X Z

You might also like