0% found this document useful (0 votes)
20 views4 pages

Study On Cryptography and Techniques

Uploaded by

zaina.benkrimi43
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Study On Cryptography and Techniques

Uploaded by

zaina.benkrimi43
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

© 2017 IJSRCSEIT | Volume 2 | Issue 1 | ISSN : 2456-3307

Study on Cryptography and Techniques


Shivani Sharma, Yash Gupta
Tata Consultancy Services, Noida, Uttar Pradesh, India

ABSTRACT
In today’s information age, communication play a very important role which help in growth of new technologies. So
security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that
is sent. The process of transforming the original information into an unreadable format is known as encryption. The
process of again converting the unreadable format in to the original information is known as decryption. The study
of both encryption and decryption is known as cryptography. This paper focuses on analysing different types of
cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are
taking about security of information then following services come in mind i.e. Confidentiality (privacy of
information), Authentication, Integrity (has not been altered) .This paper provides a detailed description of all these
cryptography techniques and a public key cryptography algorithm RSA.
Keywords : Information, cryptography, symmetric key, asymmetric key, Cipher text, Plain text, RSA Algorithm

I. INTRODUCTION

A plain or normal text, which is send over the network


is firstly get transformed into cipher text so that only
the sender and the recipient can use the information. In
technical terms, the process of encoding plain text
messages into cipher text messages is known as
encryption. Transformation process of cipher text again
into plain text is known as decryption. Decryption is
just opposite to encryption. In computer to computer
communications, the computer at sender’s end usually
transforms a plain text messages into cipher text
messages by performing encryption. Then this message
is sent to the receiver over the network. The receiver’s
computer takes the encrypted message and performs
the decryption process to obtain plain text. The process
of encryption and decryption is known as cryptography.
Figure1. Cryptography Process
In general cryptography is the art and science of
achieving security by encoding message to make them
Cryptography is the art of secret coding. The basic
non readable. It can be used to hide the meaning of
service provided by cryptography is the ability to send
information in any form. It can also be applied to
the information between participants in a way that
software, graphics or voice.
prevents others reading it. The main purpose of the
cryptography is used not only to provide confidentiality,
but also to provide solutions for other problems like:
data integrity, authentication, non-repudiation.

CSEIT172150 | Received: 20 Feb 2017 | Accepted: 28 Feb 2017 | January-February-2017 [(2)1: 249-252] 249
Cryptography is the methods that allow information to encrypted into cipher text, which will in turn (usually)
be sent in a secure from in such a way that the only be decrypted into usable plaintext.
receiver able to retrieve this information. Presently
continuous researches on the new cryptographic IV.ENCRYPTION APPROACH
algorithms are going on. However, it is a very difficult
to find out the specific algorithm, because we have In an encryption scheme, the message or information,
already known that they must consider many factors referred to as plaintext, is encrypted using an
like: security, the features of algorithm, the time encryption algorithm, generating cipher text that can
complexity and space complexity. only be read if decrypted Encryption has long been
used by militaries and governments to facilitate secret
II. TERMINOLOGIES communication. It is now commonly used in protecting
information within many kinds of civilian systems.
1) Plain text ‐original message Encryption is also used to protect data in transit, for
2) Cipher text‐ coded message example data being transferred via networks (e.g. the
3) Encrypt -convert plain text into coded text Internet, e-commerce), mobile telephones, wireless
4) Decrypt - convert coded text into plain text microphones, wireless intercom systems, Bluetooth
5) Cryptography‐study of encryption principles and devices and bank automatic teller machines.
methods.

III. PURPOSE OF CRYPTOGRAPHY

In data and telecommunications, cryptography is


necessary when communicating over any non-trusted
medium, which includes just about any network,
particularly the Internet.

Within the context of any application-to-application


communication, there are some specific security
requirements, including: Figure 2. Encryption Method

1) Authentication: The process of proving one's In the proposed technique we have a common key
identity. (The primary forms of host-to-host between sander and receiver, which is known as private
authentication on the Internet today are name-based key. Basically private key concept is the symmetric key
or address based, both of which are notoriously concepts where plain text is converting into encrypted
weak.) text known as cipher text using private key where
2) Privacy/confidentiality: Ensuring that no one can cipher text decrypted by same private key into plane
read the message except the intended receiver. text. The encryption key is trivially related to the
3) Integrity: Assuring the receiver that the received decryption key.
message has not been altered in any way from the
original. V. CRYPTOGRAPHY TECHNIQUES
4) Non-repudiation: A mechanism to prove that the
sender really sent this message. There are two basic techniques for encrypting
Cryptography, then, not only protects data from theft or information: symmetric encryption (also called secret
alteration, but can also be used for user authentication. key encryption) and asymmetric encryption (also called
There are, in general, three types of cryptographic public key encryption).
schemes typically used to accomplish these goals:
secret key (or symmetric) cryptography, public-key (or
asymmetric) cryptography, and hash functions, each of
which is described below. In all cases, the initial
unencrypted data is referred to as plaintext. It is

Volume 2 | Issue 1 | January-February-2017 | www.ijsrcseit.com 250


VI.ALGORITHMS:

For cryptography techniques, different types of


algorithms are used for both symmetric and asymmetric
key techniques. The algorithms for private (symmetric)
key are DES (Data Encryption Standard), AES etc. and
for public(asymmetric)key are RSA (Rivest , Shamir ,
Adlemen ), Diffie-Hellman: etc.
Figure 3. Techniques
A. RSA Algorithm
Symmetric encryption is the oldest and best-known
technique. A secret key, which can be a number, a RSA stands for Rivest Shamir and Adleman name of
word, or just a string of random letters, is applied to the three inventors. RSA is one of the first practical public-
text of a message to change the content in a particular key cryptosystems and is widely used for secure data
way. Asymmetric encryption, in which there are two transmission. In such a cryptosystem, the encryption
related keys--a key pair. A public key is made freely key is public and differs from the decryption key which
available to anyone who might want to send you a is kept secret. In RSA, this asymmetry is based on the
message. A second, private key is kept secret, so that practical difficulty of factoring the product of two large
only you know it. prime numbers, the factoring problem. RSA stands for
Ron Rivest, Adi Shamir and Leonard Adleman, who
A. Symmetric Key Cryptography first publicly described the algorithm in 1977.

Symmetric-key cryptography refers to encryption B. Key Generation:


methods in which both the sender and receiver share
the same key .Symmetric key ciphers are implemented RSA involves a public key and a private key. The
as either block ciphers or stream ciphers. A block public key can be known by everyone and is used for
cipher enciphers input in blocks of plaintext as opposed encrypting messages. Messages encrypted with the
to individual characters, the input form used by a public key can only be decrypted in a reasonable
stream cipher. Symmetric are much faster than amount of time using the private key. The keys for the
asymmetric cryptography. RSA algorithm are generated the following way:
1) Choose two distinct prime numbers p and q.
2) For security purposes, the integers p and q should
be chosen at random.
3) Compute n = pq.
4) n is used as the modulus for both the public and
Figure4. Symmetric key Used
private keys. Its length, usually expressed in bits, is
the key length.
B. Asymmetric Key Cryptography- 5) Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1) = n - (p
+ q -1), where φ is Euler's totient function. This
Asymmetric-key cryptography refers to encryption value is kept private.
methods in which both the sender and receiver share 6) Choose an integer e such that 1 < e < φ(n) and
the different key. One key is used for encryption and gcd(e, φ(n)) = 1; i.e., e and φ(n) are coprime.
another for decryption. This provides more stability 7) e is released as the public key exponent.
than symmetric systems. 8) Determine d as d ≡ e−1 (mod φ(n)); i.e., d is the
modular multiplicative inverse of e (modulo φ(n)).
9) d is kept as the private key exponent.

Encryption
Figure 5. Asymmetric key Used
Ciphertext c corresponding to calculated as:

Volume 2 | Issue 1 | January-February-2017 | www.ijsrcseit.com 251


2010 held at Las Vegas(USA) 12-15 July,2010,
Decryption Vol-2,P-239-244.
Plain text can be calculated as: [3] Data Hiding and Retrieval, A.Nath, S.Das,
A.Chakrabarti, Proceedings of IEEE International
conference on Computer Intelligence and
Computer Network held at Bhopal from 26-28
C. Disadvantages
Nov, 2010.
[4] Neal Koblitz “A Course in Number Theory and
In RSA encryption that is a deterministic encryption Cryptography” Second Edition Published by
algorithm (i.e., has no random component) an attacker Springer-Verlag.
can successfully launch a chosen plaintext attack [5] T Morkel, JHP Eloff “ ENCRYPTION
against the cryptosystem. TECHNIQUES: A TIMELINE APPROACH”
published in Information and Computer Security
RSA has the property that the product of two cipher Architecture (ICSA) Research Group proceeding.
texts is equal to the encryption of the product of the [6] Text book William Stallings, Data and Computer
respective plaintexts. That is m1em2e ≡ (m1m2)e (mod Communications, 6eWilliam 6e 2005.
n). Because of this multiplicative property a chosen- [7] Md. Nazrul Islam, Md. Monir Hossain Mia,
cipher text attack is possible. Muhammad F. I. Chowdhury, M.A. Matin “Effect
of Security Increment to Symmetric Data
VII. CONCLUSION AND FUTURE WORK: Encryption through AES Methodology” Ninth
ACIS International Conference on Software
Cryptography is a very interesting field in computer
Engineering, Artificial Intelligence, Networking,
science area because the amount of work done is only
and Parallel/Distributed Computing 978-0-7695-
kept secret. There are various techniques and algorithm
3263-9/08 DOI 10.1109/SNPD.2008.101 IEEE
studied and different types of research have been done.
2008.
The best algorithms are those which are well
[8] Joan Daemen and Vincent Rijmen, AES
documented and well known because the algorithms
submission document on Rijndael, Version 2,
are well tested and well studied. This paper further
September 1999.
studied that symmetric key cryptography are more
faster than asymmetric systems. But asymmetric key
cryptography are more scalable and provide more
authentication and non- repudiation easily. But there us
still need to develop such an algorithm that makes the
encryption decryption process more easier than RSA,
DES and many more algorithms.

VIII. REFERENCES

[1] Dripto Chatterjee, Joyshree Nath, Suvadeep


Dasgupta, Asoke Nath “A new Symmetric key
Cryptography Algorithm using extended MSA
method: DJSA symmetric key algorithm”
published in 2011 International Conference on
Communication Systems and Network
Technologies, 978-0-7695-4437-3/11 $26.00 ©
2011 IEEE.
[2] Symmetric key cryptography using random key
generator, A.Nath, S.Ghosh, M.A.Mallik,
Proceedings of International conference on SAM-

Volume 2 | Issue 1 | January-February-2017 | www.ijsrcseit.com 252

You might also like