Cryptography and Network Security Msme
Cryptography and Network Security Msme
NETWORK SECURITY
-BY SMITHA GV
Network Security
The security provided to the network is called network
security which at present is looming as a massive
problem.
Authentication
Transposition ciphers
Substitution Techniques
The Caesar Cipher technique is one of the
earliest and simplest methods of encryption
technique. It’s simply a type of substitution
cipher, i.e., each letter of a given text is replaced
by a letter with a fixed number of positions
down the alphabet. For example with a shift of
1, A would be replaced by B, B would become
C, and so on. The method is apparently named
after Julius Caesar, who apparently used it to
communicate with his officials.
The encryption can be represented
using modular arithmetic by first transforming
the letters into numbers, according to the
scheme, A = 0, B = 1,…, Z = 25. Encryption of a
letter by a shift n can be described
mathematically as.
Mathematical formula for ceaser cipher:
PT = (P+K) mod 26
CT = (P+K) mod 26
CEASER CIPHER
Example
1. Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI
2. Text : HELLO
Shift: 3
Cipher: ?????
Vigenere Cipher
Vigenere Cipher is a method of encrypting alphabetic
keyword
Plain Text : Hello
Key : HI
HELLO
HIHIH
Cipher Text : omstv
Playfair cipher: Poly alphabetic
The Playfair cipher was the first practical
digraph substitution cipher.
The scheme was invented in 1854 by Charles
Wheatstone but was named after Lord Playfair
who promoted the use of the cipher.
In playfair cipher unlike traditional cipher we
encrypt a pair of alphabets(digraphs) instead of a
single alphabet.
It was used for tactical purposes by British forces in
the Second Boer War and in World War I and for
the same purpose by the Australians during World
War II. This was because Playfair is reasonably fast
to use and requires no special equipment.
Encryption Technique
For the encryption process let us consider the following example:
If both the letters are in the same row: Take the letter to
the right of each one (going back to the leftmost if at
the rightmost position).
For example:
Diagraph: "st"
Encrypted Text: tl
Encryption: s -> t t -> l
Encryption of st
After Split : in st ru me nt sz