Study On Cryptography and Techniques
Study On Cryptography and Techniques
ABSTRACT
In today’s information age, communication play a very important role which help in growth of new technologies. So
security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that
is sent. The process of transforming the original information into an unreadable format is known as encryption. The
process of again converting the unreadable format in to the original information is known as decryption. The study
of both encryption and decryption is known as cryptography. This paper focuses on analysing different types of
cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are
taking about security of information then following services come in mind i.e. Confidentiality (privacy of
information), Authentication, Integrity (has not been altered) .This paper provides a detailed description of all these
cryptography techniques and a public key cryptography algorithm RSA.
Keywords : Information, cryptography, symmetric key, asymmetric key, Cipher text, Plain text, RSA Algorithm
I. INTRODUCTION
CSEIT172150 | Received: 20 Feb 2017 | Accepted: 28 Feb 2017 | January-February-2017 [(2)1: 249-252] 249
Cryptography is the methods that allow information to encrypted into cipher text, which will in turn (usually)
be sent in a secure from in such a way that the only be decrypted into usable plaintext.
receiver able to retrieve this information. Presently
continuous researches on the new cryptographic IV.ENCRYPTION APPROACH
algorithms are going on. However, it is a very difficult
to find out the specific algorithm, because we have In an encryption scheme, the message or information,
already known that they must consider many factors referred to as plaintext, is encrypted using an
like: security, the features of algorithm, the time encryption algorithm, generating cipher text that can
complexity and space complexity. only be read if decrypted Encryption has long been
used by militaries and governments to facilitate secret
II. TERMINOLOGIES communication. It is now commonly used in protecting
information within many kinds of civilian systems.
1) Plain text ‐original message Encryption is also used to protect data in transit, for
2) Cipher text‐ coded message example data being transferred via networks (e.g. the
3) Encrypt -convert plain text into coded text Internet, e-commerce), mobile telephones, wireless
4) Decrypt - convert coded text into plain text microphones, wireless intercom systems, Bluetooth
5) Cryptography‐study of encryption principles and devices and bank automatic teller machines.
methods.
1) Authentication: The process of proving one's In the proposed technique we have a common key
identity. (The primary forms of host-to-host between sander and receiver, which is known as private
authentication on the Internet today are name-based key. Basically private key concept is the symmetric key
or address based, both of which are notoriously concepts where plain text is converting into encrypted
weak.) text known as cipher text using private key where
2) Privacy/confidentiality: Ensuring that no one can cipher text decrypted by same private key into plane
read the message except the intended receiver. text. The encryption key is trivially related to the
3) Integrity: Assuring the receiver that the received decryption key.
message has not been altered in any way from the
original. V. CRYPTOGRAPHY TECHNIQUES
4) Non-repudiation: A mechanism to prove that the
sender really sent this message. There are two basic techniques for encrypting
Cryptography, then, not only protects data from theft or information: symmetric encryption (also called secret
alteration, but can also be used for user authentication. key encryption) and asymmetric encryption (also called
There are, in general, three types of cryptographic public key encryption).
schemes typically used to accomplish these goals:
secret key (or symmetric) cryptography, public-key (or
asymmetric) cryptography, and hash functions, each of
which is described below. In all cases, the initial
unencrypted data is referred to as plaintext. It is
Encryption
Figure 5. Asymmetric key Used
Ciphertext c corresponding to calculated as:
VIII. REFERENCES