0% found this document useful (0 votes)
107 views16 pages

NIS Unit - 3 Notes

The document discusses various concepts related to cryptography, including plaintext, ciphertext, and different encryption techniques. It highlights the importance of keys in encryption and the methods used to secure messages. Additionally, it touches upon steganography and its applications in hiding information within other media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
107 views16 pages

NIS Unit - 3 Notes

The document discusses various concepts related to cryptography, including plaintext, ciphertext, and different encryption techniques. It highlights the importance of keys in encryption and the methods used to secure messages. Additionally, it touches upon steganography and its applications in hiding information within other media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 16
asl Aue Define sere —plainvewh $3 Plaioyesns the Known es eat Mens cinyone who UAORS The = lang Uerge, exeny ead thei wmedseqy 2 Pl\viorext iis also eet (corn -The | omgincd MESSage is KNOWN AS Pla nreAh Bake De fine term Ciphertexs » —Uihen? ne: Plaine © iS CodiHed ait the of Weng et any Suisawie Scheme, then the pesultant “mes Sage 1S. Known as. \ Phere exp_ Sac. eo aene message «is Known as. cipher Aue, fWnay> te {QYprodaaphy 9 Stare prs Aeplicatfors =5i| (= Coyoso @hy te sete issan canciemoscot & | sSchente "ot ‘Losliting in, seoeh omesemge: 2a | OVEnS V\iKE dara ASVEComMMUDIEAHNOAS , Sy poJseF) al PAPMNCOIATY Nhe arprxexneha” US Smee amoosteunte pohen .coMenUMIeAKnn yp over ANY AN=t2usted Mediums IF Include s- any Alws 5 = CayprogouPhy snor ON\y PROtectSs Auta teom avreration, loud f+ Can Also be Used fox aurtnenticeog Of Useas. (2 IRA 49 SS cette, 269425 pete mMessccje | i Vass Pe e. ne J CayOrousaphy 1S to has ween Wwaitten, (Corti — Zz Cayprogeagn can alse took Applied to software we AriohicS (OF = ure rhaleea | a Doean we neplied ago say Matage Fah Cnn —" Eas dans peste: 2 seerseis fap als (2. Adismipess OAT sas = Lo. Pecksonic CaNenenria Linen heckeontc ie Seams reo h ok NL, SI Widest a BWSR oe The Nhne) Payment message = of WOT) WSK KE FO bequs messages poreoduced Sagan! SM eMemthelr! caeene2-coclo: hese t eas mej. BE Minor Sigaificante PAyerEnHS aXe @meseage. AVsbentication Alen ON Cannot =| enxr\e-ely. preven+ Sameene, fee? amp C2 AY 4253 ee ee ee ae ee ARIS Deippens mit cen idemrenmy BS detected SWS Lape eeS Ss at achechind AS rl CGR mee the oencet Median Message Ls) often cated) message Burhenricerton, Thao mosey secedr 4 «usefully edevetop- meAt ANE ME ses Joh ocayproyoaPhy. jeithe: dighky | 2 5 i narare s > m Nemen Press, Coy PHaNalY sis jue hea aAhe EET iokfoSn : L a= =i H weerdeibVe Coy pte analy.cl Recidot blo { | ee ohn, se message = T T (iol _ Pees eos ee eee EN a ciphertext WMEssage ato, obtaines tne caigitd| messaye itS@\F 4S Keown 25 caypromaly sis. - » | Ep Saclowtie technique ot SEH H0n~ geadavole _Foomaf —waouk — kaowsing how _*hey ave = os Non- gxeadarie feamah, ca a. | nee ae main she Nena CYPYo\eqy . Met {== _16 + the comp} qarion at c@ypregraphy 8 | & cayprancnysia. oe | | | Ca qoaphy | +t [eaypreanatyes = feyete goa 1 eee urine = fou geen za [=n Ceyproq=aphny , ar. cipher Cor cy phey) iS an | aigeoitnas Roa eerrorming eASyericg & decay Hin, oa 1 [eeu pranay is| 1 “ | jmeseage | Eneoupnian | _5 |Pewyerion Hes [| ae Algortthe | 4 a =e ; To ia cues, hance Jig) Conventional coyprasy sre m_ tradal er metine e Eney PHO » og Zine hs ae Se eS oe Geried Aepending an ane Key, which changes Ahe detailed epesarisa of Ane alqoaithm. A Key must be Slecked pelore using a cipher Ao nay) Pb a eressage : Vino rT knoweldge ot ne ae ae Mould we dithicult pat fet _nedely Tmpessible fe ee at rhe Besuting phen 1Mho secadetblo Plaimtext + “< she echaiques Tory Janstem ao Aehestexy) ExMain any Sree ciphers. beh ene poestitution cipher xechniques 4 Onplat amy ay Fedonjque Ltxplain cacsaris Apher Suypeaitu ton coith excrnple « a ss \ D Sp 8 Substituyoas Fechniaue 5 letters oF, Claigr ent r of SSMS we placed iby another \exters) oF Dumber Ss ax | Sym bola” : Emer Soeee Cehert 5 a A\e0 _nown ag a Cdesas's ciphers T+ is — ‘ple JF wer\ Knowa eoeyerion teen niques. = eves Never sol Ane ouplaintern ist 23a E= \ersex Witt) Seme Mned number ois pesinions Joom ; Yohei pvets . (a Tae 2] —~——_Plataterr = =Witor mATEoN ‘ees = Milrnieicniuemer aes genes 1 ciphertex; _ Lerevpoutpa, f Explain Simple calumnar Touspositions Peunaiquell with example . vale TERPlaio Simpre _cetumnar Munspesitfen — Fecdanique af vA Algvaitha 4 example. Q 12) Nummer Th-anseosihion t= ca = TWeanspesitinn technique dees Oot Deplate Alphabets oom Pieaiarery With other ANhereas, Vt performs _Seme Permutation en alphabets of al Plas ax ext - -— cn a columnar ADEN SCSI} 08) Ahe Message {eo vopithen pew 30 eae sok alMxed length, £ anen BQead our, Ageia Celumo wy columo, 2h 2. conn gece AIT 19 Somes Scrambled ey ee + the F the ‘al ode z= 7 q r CoN ns Are suc\ly permu radio? gor nS oS define d by A et ywerd : ; we aan MESSagqe dex ef Cipher + | Compasi ne 5 ab Sa |.ssion gre-delined Columns by. column. Woo ever the Ciphestent ti0@ cipher 6) Teansmi Suvstirunen of cipher | Transenission cipher O30 Coy Pregouphy) a [Oo Suproazaphy, & | SWoFUNeg Apher isa APUISROsiNOM — C\pher fea Memmed? of Teneyosina Method oF Cncayp3iod oxo pit Gohemie dh oy nuicheamnes sGeeeonS _s| Plaintext ase vepluced hela Ry wnte et Plaine [PMH eiphesteock crccoacting | Feo. pho: CMB ea\ceaia Gone EE 1 @| mMerhoa ot “Savsrinarion D method of Jeanesosinen a 'S used+ oe io Used , - @ Pleinyexr: OPMaintery | AecVEE GH IU fait Aee Orscove Ren, FLEE AT oNCe- a| Ap Kerben> 4 cipherrert + | Ett KL No? WiECRL TEERD SOEPE SS vig yeieali aes E@ocA TT vDEN 1 * easy pe UNdeasteaNed - Diiticurt he _underskond . fi... a ‘aad aioe [Canalio rege 4 : SRT ner jo SHeganoepenny 2 Sie Bee ates APLC ona a — sai Ver |B eregancgenphy ie a decnaigue oF brain. magi mace adi Net: , df emmnount pt “séevey ‘message Lota ay 7 ae mesade . & . rhedenectuanae am idriaie ee t | desrinnrtion. k IK Steganoyeaphy takes cay POS? , Ruprner by Siding co ensypred jh ens: Sheth nv one suseecks Fail +e | Seanning Your der Will F iG > she enaypyen 5 darres pocefiyhes St satan modes Ai gite Sreganoareen cul oaithn + nto. cover medie - [pena@ypred — usings® Eayonion SEneyered dour is \nceated Biodtiedidieced Hoi Be called imufSV OF cred ig est Cawiashed 0 ey set The Se\\ocolng Keacnuter peovid + -Shegane geuPhic peocess? — ea crane or Dane) iS oye ke] “eo Le coyer nedia 'Sarhe Mye 19 Mhth. we wil) Hide whe | MAACRa dara, Linch. May oadiso Me en@ypied —“Ualag Stego ~Key- sia i =qhe Pesusany Hie is Sstego- medium. | cover— media. cag PE image om audio- File. leaking OF aN ane bis Nhat Ve paesents he SAMe , Colom anPinels Vepeated. 10 A Bow, * = Disadvanhage* \e Ye aecuiees ct lot ot overhead se Wide a feo bis oF |nteomatton | 7 AMernatve te, Most ensyet The message = 4 | ahen Wade Using Steqanvgraph 0 . (| OO Goer Chea ua en On when ae ee -_ | = Terminologies Weed Mn megane acaphy 1. cle "Slo - Salta soe ecg Medium 20?" “ave Sie = dund unt Rise 7, Sirs of ee MCA SHeuh SEQ bes/, co Com ditied Vitnout ———_} _@eseectives date tn cover ak PWC mMNMeletc Tee S| 2s egouphy | po har ie some eneystion 1 Expial a” Ane | Componente es eney prion . ui ¥h, Suisrble eliagqaam, Ag eritners 9 ExpraiaLeach, step Xa Aetal) with herve of ica, . - 2am, > coypheaoaghia Algsatthant a es FNMMEtaic A\doaithan Lis Agmaeisic Alyoaithay , Lae Symmekeic Re Key lay preyoephy ra +o Syenmeteto Algorithm, the Same key vs s| “SOS Soa | encwsyax oa desypriog . Wence thi AS also known AS ingle Key og Secothe ke dx Shaved ¥*Y | ctlgovitnan, 5: “Wis Key dase +o kept secaet, Sender a yuer Useg The: scare key to ead EN@YP? eee key 16 “any Known te Sender £ al date + “Woe i weceiver & Mo one else. = beer eoawee etgeee [ze NS Sender & wmecewer ae A _arkey, loehoro. They . ceemendinicabe Te ee 2 ee eee |= Encayorion Tiatavmrmeanass Sueded fate 3 jeencoos AIeSS™. xeioas = [G4 Mourns | encaypHion _ Function + ener ?- oe YO Seow oth Au a camneletess — ciehea? 5 ee a A Bice ctehewe enay ers OP devel 5G?! = encoyere ER ANET @ vrean of PledAexr deter pUSUANY | Sender “tole oa eyes -— Eneey pri Ag oath 1 Re OF ex 2 MEGS e il fe cook vey Shared (pac is Yep by sender 4. veceiver pea) DES C Date Ene yeiie te whe classic meng ne -| The SE xf DES | ne. SYM erDIe was dcvelsped in Steundaod tes Jafoamarion & wes Epfoameah oo encay EFS contzo) ering WRK Siete renee DES the latos AS ec US-Jevernmey yl prerecting jnon= cltssiFied pulrighed as a Fede@rey famceseing Stunde» 64-bit Clear teat lbleckS! under | oh =6 bit keys- [ecco meee ties exiended by a Parity bute to E ps a Guabit wooing key pial Euit | [ele nent [> = a | eSgesure eS. | Pras + t ; SO sen) oe Beek Burst lia02 aae S : 2 — ae Go Peeomusari ot) — = : aa | ea a = i tigi Rounde In DE: [que-Poecaibe digital Zignarse mechantom with Mae wf Alagaam + i L-expraia. jnredaity 4S poo- wepudiahion With | zescecr *e coyProgaciphy - Z| LE Sesw@ipe Ahe caking Of cligital Sig DAPUTE [wove Neott Aicteyaem + a = Asymmersio Encw@ypriod AS aA Noa of Entoyphing [lkere. Faye geomen toh wales dhe 9S By Tenyere, omy whe othens dun dewypr= — Feequenmy the VeyS see inverchangeable 5 14 the | Sense Ye iF. Key A ene@yprs a message [Shen @) can decoyer it) 5 oe key © enioypis. le message, Yeo key A can deewyph it: [-pcymmeeie En@yprion 1s ales Known as Pubbe | Sy Ley cepheqpaephy Since wsers sAypicay Coeate q [matching wey Pain, Make one public While. me 4 ee ne user's Serpek Key is, 19 Tuck ,Seteh, | Meo, i* | Fotlowre Ahet The. User, 4 nok aA | 4eme \mPostv> » Seay “Sent ane cmeserge« = + |Decey prion ranseen ee ai T [_ Algaattna Secpe, Mes seye ce with the weci pienr?s Key Sn THIS case, ony The intended can decoyey the Message , Since Jomy hay see Sheuld have acess 40 the Pan wee J Secaey, key. [= The main AAVeintaqes of ASY MNeIDI}c Coylprago-ap Wy GS letwe Security ob aA key, sender's aaa Pip | diges}- | Tigi. @lecu Aiuqacim of migita| | Sd Neate . [= Advent ovals, ee O Non- Pepudiahon ar 5 : = ia DYsence pes 1 Sy mmekat £ asymoe a Cas, prodgaeip hy: Sioagve ! 64 Sy ke usod O me Se pciaerkt - | ee ee ene aien eee ae sed Sow enaypioa < A ipeiog ad __deco-stp pte |@ “tenorao 4S publicg | wey +P Piso Varig i Sing) aganp hy lucite “jee: pas|* ASeke pia toy loo L Kty Shows be aggeed ~sendeor 4& @ no need te agoce on Keys. PO CONE es Yess Security Zimple to implemen}. @D More Secu} QE aed +o _Impiem fe @ eg.) Digiber| i= Shg naryr€

You might also like