Professional Documents
Culture Documents
Cryptography
Marks = 16
3.1 Introduction : Cryptography, Cryptanalysis, Cryptology,
Substitution techniques: Caesar’s cipher, monoalphabetic and polyalphabetic,
one-time pad.
3.2 Transposition techniques – Rail fence technique, simple columnar, steganography.
3.3 Hashing – concept
3.4 Symmetric and asymmetric cryptography: Introduction to Symmetric encryption,
DES ( Data encryption Standard ) algorithm,
Asymmetric key cryptography : Digital Signature.
Plain Text :
Plain text is nothing but a original text which is in readable form and to which we want to
convert into unreadable form before transmission.
CipherText :
Unreadable text OR Ununderstandable text.
Enciphering or encryption:
The process by which plaintext is converted into ciphertext.
Encryption algorithm:
The sequence of data processing steps that go into transforming plaintext into ciphertext.
Various parameters used by an encryption algorithm are derived from a secret key. In
cryptography for commercial and other civilian applications, the encryption and decryption
algorithms are made public.
Deciphering or Decryption:
Recovering plaintext from ciphertext.
Decryption algorithm:
The sequence of data processing steps that go into transforming ciphertext back into
plaintext. In classical cryptography, the various parameters used by a decryption algorithm
are derived from the same secret key that was used in the encryption algorithm.
Cryptography
Area of study in which we study the different encryption schemes.
Characteristics
o Substitution
o Transposition
• Mode of Cipher
o Block Cipher
o Stream Cipher
ONE TIME PAD
Rail-fence Cipher (transposition techniques)
• It is a transposition cipher that follows a simple rule (that we can understand using
following example) for mixing up the characters in the plain-text to form the ciphertext.
• It is a weak cipher that can be broken easily and doesn't provide any communication
security alone , but we can use it with other ciphers.
• Many security professionals claim that the rail-fence cipher is a simpler "write down the
columns, read along the rows" cipher.
Example
The key for the Railfence cipher is just the number of rails. To encrypt a piece of text, e.g.
D N E T L H S
E E D H E S W L O T E A T E
F T A A F C L