0% found this document useful (0 votes)
103 views

Cryptography: Submitted By:-Jiya Jagadeesh Bca Department ROLL NO:-16

Cryptography involves encrypting messages to make them secure and immune to attacks. There are two main types of cryptography: symmetric key cryptography which uses the same key for encryption and decryption, and asymmetric key cryptography which uses a public key for encryption and a private key for decryption. Modern encryption algorithms like the Data Encryption Standard (DES) and Advanced Encryption Standard (AES) combine simple cipher operations like substitution, transposition, and XOR in multiple rounds, using a different derived key for each round to strengthen security.

Uploaded by

Alan Varghese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views

Cryptography: Submitted By:-Jiya Jagadeesh Bca Department ROLL NO:-16

Cryptography involves encrypting messages to make them secure and immune to attacks. There are two main types of cryptography: symmetric key cryptography which uses the same key for encryption and decryption, and asymmetric key cryptography which uses a public key for encryption and a private key for decryption. Modern encryption algorithms like the Data Encryption Standard (DES) and Advanced Encryption Standard (AES) combine simple cipher operations like substitution, transposition, and XOR in multiple rounds, using a different derived key for each round to strengthen security.

Uploaded by

Alan Varghese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

CRYPTOGRAPHY

SUBMITTED BY:-
JIYA JAGADEESH
BCA DEPARTMENT
ROLL NO:-16
DEFINITIONS
• Cryptography :- The term refers to the science and
art of transforming messages to make them secure
and immune to attacks

• Plaintext and cipher text :-


 The original message before being transformed, it is called cipher text
 after the message is transformed, it is called cipher text
 An encryption algorithm transformed the plain text in to cipher text
 A decryption algorithm transforms the cipher text back to the plain
text
 The sender use an encryption algorithm
 The receiver uses an decryption algorithm

• Cipher :- encryption and decryption algorithm as cipher

• Key :-
 A key is a number that the cipher as an algorithm operates on
- To encrypt a message we need an encryption algorithm, an
encryption key, and the plain text .These creates the cipher text
 To decrypt a message we need a decryption algorithm a decryption
key, and the cipher text .these reveal the original plain text.

Alice ,, bob and eve;-

o Alice is the person who needs to send secure data


o Bob is the recipient of the data
o Eve is the person who some how disturbs the communication
between Alice and Bob- by intercepting messages to uncover the
data or by sending her own disclosed messages .
 These three names represent computers or processes that actually send or
receive data or intercept or change data.

• Two categories :-
 Symmetric key
 Asymmetric key

• Symmetric key cryptography :-


 In this cryptography, the same key is used by both parties
 The sender uses the key and an encryption algorithm to encrypt data
 The receiver uses the same key and the corresponding decryption
algorithm to decrypt the data
• Asymmetric key cryptography :-
 In the cryptography, there are two keys :-
o A private key
o A public key
 A private key is kept by the receiver
 A public key is announced to the public
 In public key encryption / decryption , the public key that is used for
encryption is different from the private key that is used for decryption. The
public key is available to the public , the private key is available to the
individuals

• Three types of keys :-


1. Secret key
2. Private key
3. Public key
 Secret key is the shared in symmetric key cryptography.
 Private and public key is used in asymmetric cryptography

• Symmetric key cryptography


 Traditional ciphers:-
 Substitution ciphers:-
 a substitution ciphers replaces one symbol with another
 Mon alphabetic cipher :-
 A character in the plain text regardless of its position in the text.
 Poly alphabetic cipher :-
 Each occurrence of character can have a different substitute.
 The relationship between a character in the plain text to the
character in the clip text is a 1 – to many relationship

 Transposition ciphers :-
 A transposition cipher reorders symbols in the block of symbols
Key :- In a transposition cipher , the key is a mapping between the
position of the symbol in the plain text and cipher text
 Simple modern cipher :-
 XOR cipher :-Modern cipher today are normally made of a set of simple
cipher , which are simple predefined function in mathematics or
computer science

 Rotation cipher :- In which the input bits are rotated the left or right. The
rotation cipher can be keyed or keyless
 Substitution cipher :- S-box
An S-box parallels the traditional substitution cipher
for character. S-box is normally keyless and is used as
a intermediate stage of encryption or decryption.
 Transposition cipher :- P-box
a P-box for bits parallel the traditional
transposition cipher for character

Modern round cipher :-


 Data encryption standard (DES) :-
 DES has two transposition block and 16 complex round
cipher.
 Although the 16 round ciphers are conceptually the
same , each uses a different key derived from the
original key.
 The initial and final permutation that are the inverse of
each other .
 The permutation takes a –bit input and permutes them
according to pre defined values.
Advanced encryption standard (AES) :-
 The AES was designed because DES’s key was too small
 The structure and operation of the other configuration are
similar
 The difference lies in the key generation
 Fig. shows , there is an internal XOR operation followed by
round ciphers
 The last round is slightly different from the preceding round
; it is missing one operations.
 Although the 10 iteration blocks are almost identical ,
each uses a different key derived from the orginial key
THANK YOU

You might also like