Information Security: Department of Information Technology University of The Punjab Gujranwala Campus
Information Security: Department of Information Technology University of The Punjab Gujranwala Campus
Information Security
Assignment
Submitted to:
Mr. M. Aleem
Submitted by:
Hafiz Muavia
BCS21001
BSCS morning (7th semester)
2. Cipher Text
Cipher text is the result of encrypting plain text using an encryption algorithm. It looks like a
random set of characters and cannot be read without the proper decryption key. Think of cipher
text as a coded message that only those with the correct "decoder ring" can understand. Cipher text
provides security by making the original message unintelligible to unauthorized viewers.
Examples:
• "Wkh txlfn eurzq ira mxpsv ryhu wkh odcb grj" is cipher text for the plain text "The quick
brown fox jumps over the lazy dog" using the Caesar cipher.
• An encrypted email could turn "Pay $100 to account 12345" into a string like
"gJ7!p8Kx5sQh#" depending on the encryption algorithm.
3. Encryption
Encryption is the process of converting plain text into cipher text using a specific algorithm and
key. This ensures the data is protected from unauthorized access during transmission or storage.
Encryption can be seen as putting your message in a locked box where only the intended recipient,
with the correct key, can open it. It's essential for online transactions, messaging, and safeguarding
personal information.
Examples:
• When you send a credit card number online, encryption scrambles it so hackers can’t
intercept and read it.
• Your computer password is encrypted and stored securely, so if someone accesses the
storage, they can’t easily retrieve it.
4. Decryption
Decryption is the reverse of encryption. It’s the process of taking cipher text and converting it back
into readable plain text using the correct key. Decryption allows the recipient to unlock the
message that was secured through encryption. Without the proper key, the cipher text remains
scrambled and indecipherable. It’s like unlocking a safe that holds a secret document.
Examples:
• Decrypting "gJ7!p8Kx5sQh#" with the right algorithm and key would turn it back into the
original message, like "Pay $100 to account 12345."
• A VPN decrypts internet traffic, making it readable to the destination server, while keeping
it protected from prying eyes during transmission.
5. Cryptography
Cryptography is the science of securing communication by transforming information into codes
and ciphers. It involves techniques for encrypting data to protect it from unauthorized access and
for decrypting data when needed. Cryptography is like creating secret languages only certain
people can understand. It includes not only the encryption process but also ways to verify message
authenticity and integrity.
Examples:
• SSL certificates used by websites for secure transactions rely on cryptography to ensure
that sensitive information is protected.
• Digital signatures are created using cryptographic algorithms to verify that a document or
email comes from a trusted sender.
6. Cryptanalysis
Cryptanalysis is the practice of examining and breaking encryption methods to reveal the hidden
plain text without having the decryption key. It’s essentially the art of code-breaking.
Cryptanalysts try to find weaknesses in encryption systems and figure out how to decipher
messages without authorized access. In history, cryptanalysis has played a significant role in
warfare and intelligence gathering.
Examples:
• During World War II, the breaking of the German Enigma code by cryptanalysts helped the
Allies intercept and decipher critical enemy communications.
• Modern cryptanalysts might attempt to find vulnerabilities in outdated encryption
algorithms, making it easier to crack messages encrypted using weak keys.
7. Cryptologist
A cryptologist is an expert in cryptography and cryptanalysis. Their job is to create secure
communication systems and also test existing ones for weaknesses. Cryptologists ensure that
messages are both safely encrypted and impossible to crack. They need a deep understanding of
mathematics, algorithms, and cybersecurity to work effectively in fields like government
intelligence or digital security.
Examples:
• A cryptologist at a bank may develop encryption methods to protect customer financial
data.
• Cryptologists working for tech companies like Google design protocols to secure email
communications and prevent unauthorized access.
C H Y B D
E F G I K
L P Q S T
U V W X Z