Cryptography 1
Cryptography 1
2. Authentication:
Authentication is the mechanism to identify the user or system or the entity. It
ensures the identity of the person trying to access the information. The
authentication is mostly secured by using username and password. The authorized
person whose identity is preregistered can prove his/her identity and can access the
sensitive information.
3. Integrity:
Integrity gives the assurance that the information received is exact and accurate. If the
content of the message is changed after the sender sends it but before reaching the
intended receiver, then it is said that the integrity of the message is lost.
4. Non-Repudiation:
Non-repudiation is a mechanism that prevents the denial of the message content sent
through a network. In some cases the sender sends the message and later denies it. But
the non-repudiation does not allow the sender to refuse the receiver
Encryption Technique
For the encryption process let us consider the
following example:
The Playfair Cipher Encryption Algorithm:
The Algorithm consists of 2 steps:
1. Generate the key Square(5×5): The key square is a
5×5 grid of alphabets that acts as the key for
encrypting the plaintext. Each of the 25 alphabets must
be unique and one letter of the alphabet (usually J) is
omitted from the table (as the table can hold only 25
alphabets). If the plaintext contains J, then it is
replaced by I.
If both the letters are in the same column: Take the letter
below each one (going back to the top if at the bottom).
For example:
Diagraph: "nt“
Encrypted Text: rq
Encryption:
n -> r
t -> q
For example:
The initial alphabets in the key square are the unique alphabets of the
key in the order in which they appear followed by the remaining
letters of the alphabet in order.
CipherText: "gatlmzclrqtx" After Split: 'ga' 'tl' 'mz' 'cl' 'rq' 'tx'
Rules for Decryption:
If both the letters are in the same column: Take the letter above
each one (going back to the bottom if at the top).
For example: