Cryptography
Cryptography
Conventional Encryption
- symmetric encryption or single-key encryption
- only one key to encrypt or decrypt
Cryptanalysis
The process of attempting to discover X or K or both is known as cryptanalysis
The strategy used by the cryptanalyst depends on the nature of the encryption
scheme and information available to the analyst.
Type of attack on encrypted message
Ciphertext only attack
Known plaintext attack
Chosen plaintext attack
Chosen ciphertext attack
STEGANOGRAPHY
A plaintext message is hidden in something.
1. Character marking
Selected letters of printed or type written are over written in pencil.
The marks are ordinarily not visible unless the paper held at an angle to
bright light.
2. Invisible ink
3. Pin punctures
Small pin punctures on selected letters are ordinarily not visible unless the
paper is held up in front of a light.
4. Typewriter correction ribbon
Used between lines typed with a black ribbon, the result of typing with the
correction tape is visible only under a strong light
Substitution Techniques
1. Caesar Cipher
a. Shift Cipher-shift the letters of the alphabet
b. Julius Caesar
2. Monoalphabetic Cipher
a. Can have a random value of key-spaces
b. Easy to break reflect the frequency data of original alphabet
3. Playfair Cipher
a. best-known multiple-letter encryption
b. use of a 5x5 matrix of letters
1. Caesar Cipher
Plain A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cypher D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
2. Monoalphabetic Cipher
Plain a b C d e f g h i j k l M n o p Q R S t u v w x y z
Cypher N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
3. Playfair Cipher
M O N A R
C H Y B D
E F G I K
L P Q S T
U V W X Z