You are on page 1of 25
\ Nis B. Cr ygpogta ph 14 marks ¥ Plaintert :- The Plaintext is also known as clear teat mean anyone Who knawsthe language @n Casily Yead +he message. : — The original message is Knoen as plaintert. * Ciphertexnt = cohen the Bainter is Gdified withthe helpof ond suitable Scheme then the yesuhant message is known as ciphertext. — The Coded message js known aS Cipherter+. * CY pogtaphy [coded Forrnot) - ery pte Ya phy is most important Shen Cron? over any “un-Husted medium; i+ Includes nan ni particular ig the internet. — Cig prography. not ong protects data From, alter -ation , pu i+ Can ol he used for authentication of user. ae Cryptogra Unreada message ~ phic — by messae Ss, y Stee Figr Cryptographic Systeny @ scanned with OKEN Scanner “Appin of Crypto raphy. In [coded Format | 0 Cae Hiding '- the original use oF Cry Pog raphy isto hide Sorpething that has been coritHen, 2) Digitally Code Cy pte raphy Can alse Can be applied to Slw, graphics ar voice that is it Can be applied to angthing that con be digitalh Coded . d 3) Elechonic payment:- ahen alecronic Payrnents are Sent through a nlw, the biggest visk is Hot the pa crent rnessage iM alter or bogus message introduced & the risk that Someone yeads the messages may be minor Significance. EJ message Authentication = one Gannat entirel prevent Someone Fron tampering @ith the nle £ the message but if this happens 17 Can charg Certainig be detected. this process of Che Ching the inteyrity ofthe dransmitted message is often e authentiGabon. The most yecent £ Called © messag useful development in the uses 0 the digital Signature. CT prano\; SiS tr [ origine\ Format) e crgPlog raphy is 4o break any Cipherteut yi : é — the process orn the original messoge vasele mess as crgpranalyss: : ecoding message Yom a ; d \ sechnique of able forrrat ois ie ck pe fead ° gable format re Converted into an) tot Knataing Noe Heeg B veadable forrrat: @ scanned with OKEN Scanner swans) epee] Tie rner [ Ciphertent fgr Encygption a decrgphan ¥ substitution And TWersposition Technique ;~ el Technique er aways by which printed esa9 can be Gnverted wid ciprestes meSsage. we jubion and ctrangposiion TEChnave. ipher 3 3, Caesat's SE pown a ual) now © ) substi ' iS esas Cipherv Fr 5h is alse F Boe neypton techolaue vey empe cind _ were Yener OF @ scanned with OKEN Scanner lh Sane. Fyed na. of positions fine he alphabeds ‘ Cor Cay AShifd OF A. Here & NM Cold he replaced by Db, B Could he Lepltced by €, ard So on, VhIs roetbad is inverded be Julius Caesar WS who used ilo Comsrnn cold the name caesat's Cipher. genewals hence. _ the Wansformation Can be. Te prese ie the position OF two alphabets. 1 be, Cipher al phates bul the plain abphabe 4 solated left fe, eof 4 arronginy is pothing oF tighs b4 same no-OF Positions. eg A Caesor Cipher ed a (eth rotation) ye: Shift =3 of three Places ; ‘ o12 345 673 8 lo NB IS Rein ABC pEFGHTIKLEM|N g 19 2 2122 23 24257 € s 6 I? | jas ) + UN x Ye oPpa@ RS es) «esky m S Om” 2) plaiseAB co EFOHTIE eee Cipher’ DEF GATT K LMN 0 PERS TOV W x¥2ABC *) plainter® © Come HANE “TOIMORRow " ‘) H KRPH wRe RUURZ" 8 . - RPI ciph® nent F @ scanned with OKEN Scanner €} @) glainiers © “the quick, brown Foy jumps overthe Cipherress laces 3g " WWEH TXLEN EUR2@ ERA MHxPSV wkH 6OCB GR" ey 6) plainer” cipheriert = "Free \RPN we “ Come Home Ta(No RROW" pRuuRe” —To encyph O message Sirmply look Up each leHer of 442 He SSa in the “Pplain® line and ae own The corres pordirgy \etter in the “Cipher \ine- To geciprer 40° the yenere. The ence phon Con also be ves Sense givgk 4¥ans eS wat sn according 7 the Scheme iG on of 4 lee athe nnatsca Ws 2 os. encry Ph he desceuped J 26 as go 2 ™ = sg perfored sheng SONATE @ scanned with OKEN Scanner trerli Pied Caesar's Cipher Yn Vhs yesien an alprabe\ '®\' can be ree Wy ora, o\het alphabe} in \he english alphabet cer pe. B10 2 soos each alphabet in SMing we yeve 25 posibidines of veplacereent: ~ fy adtacl on A Ciphortent message ‘ahercin Ane aliacker atempls 0 use all Possible priviations and CGninations 1S RreeN asa piuie- Forcee a\lack- A. Trarspositiaa Techniaue - ————o Transpasthon yechnique clees nok Teplace a\pnatbers fram plaintest arth other wheres iy per forms some pecmuration of alphabets of plainiest- ) simple ColurnoY Trane position - ssan “Khe, He SSE is t Jura rare postion pn 0 yous oF ered length and thers : ¥ ee “pak agai? cclurnn by, Glurnn Lthe Aumns th SOTNE scrambled order, Both are chee? (o pocrosttertion OF ethe ors he iene iv are usually defined by a eyo! C4 ye etd ee aRAs is oF Jensth6 (so the yous are oF Vent 6) aP8 the. ‘Porrrtatehen 1S defined By the. alprabe ical ardes of leHers inthe key vod: @ scanned with OKEN Scanner Inths (ase the oder cwuld he 632 440" ercome HamME with key = zeEBRAS Clengtats.6) My 6 Glumns because plaintest = Wi _ Consider the Yectangle wy the \ergsh oF key is 6 ye S8849% pn YE chang in VOLS “hy - vote _ write Ahe yranner: oer oF *b calth some Tandor® C4 61257 noe ¥ ead 2 ciphertext 5 “ Cpamwe € HoeLo" pointes = Comme Home with keg 26 i hal AS | th of Ke iS6 we ry on d uti plaintext ye SSO9e in S. to 6 Coun wo rex cours Te A Car) C3 Cae eS | Th rerpnner To ynarrow le should be oF Cat é | 6 @ scanned with OKEN Scanner NO Yead the text oF Colurnn 1) . (1 Yahok order like C4, 6/112.873) n Gj u ipheytexnt = “ EOWOOCMRAER YpmTa" Algorthrn ie ‘DY orite the Pointert message Tow by 70% ina yecrangle of @ pre-defined Size az) Read wes $ AGE Column - he Coluran . However i+ can be ane cader \ike 23 eFC. 3\ The message +pus obtained isthe Cipher ee MESSAGE: * seqe. regret ~procenere *- 4 proces ag a technique oFh eq message within an praction oF it OF sd idi ne large ordinary eshination, _ SA aon graphs, AakeS cryproy7P acsep Farther Fig an ening ple mre SSa3e Jeg that re ene yt exists. tn modern digital % Encry pha A apres ust encrgnel °F insertes § Cover med gdded incre? Suspects anes rae data iS \gout ™. ia C TPES trr09e8) edia @ scanned with OKEN Scanner Cover medi ; [ Gover masta } +]uidenrcleta } + (stepe-Key) — Covers media isthe file “Bee the hidden ~clata which mg aa eee using Ste go- key oqhe vestitant File is: ’ Sego -mediam . Quer - media can be image or audio File — pSadvanta is ik Yeduires alotaf Overhead to hide a Few bits oF info. _ pyienative is fivsh encrypt the message & then hide using. creganogrPry- Ly Peaminorgyres used in Segarogrophy ') Cover —reediun + cata within enich a message \sto be hidden 2) sheqo — medium 1 pata Within which @ message has been aa ne pidden iinin 1. pata ‘that is or ©! A 8) message “vege nO diana or cover mein Yespec 4) pedusiaon Bis !- pris of daia in Cver _rediua modi Fied without Cory promis that mediums ipregeity. @ scanned with OKEN Scanner Sgmmetic And Psyrmme AvIC cypegrery Cy plegia phic algorithms cre rerthing but the SQqUENC Of Praressey cr iules Which Gre Used to encede Ldecde message ina Cuyployorhic Sj. Types Cryptographic Aljorithoy a) symnebic Alapsitian b) asymmenic Alpprithn ly Sgrome tiie enc: pion key is uSed Summedric algpiihr +hese sare Lov = oer & en Pon . Hence Anis }s se known as woe key or secrete key % key algorithm, this key haste keept secret , Sendewt ca oO" read encigets dat aa a ig some ey a Sender a vecciver & MMe “ ugh agree On? ki ee he sender § vecelyer ve Tous NOE Can becorne ae Gfrend gore a ‘ree aus secret Key @ scanned with OKEN Scanner Encryption algorittens SSS Brock Stream Cipher cipher a ’ . H) Block Cipher i A beck cipher encoyPis sabi Packs of data vith A Gmeler ene Mon Function Es woe -Hhese Ciphers Aolally. dedends onthe eSigN OF The ene Yon Fan Cian? A BIOS. cipher nary ers WOcKS patnging AO the Carne Aocuwent ol umdes Xe sare Key: 8) Strearn Cipher '~ TA encryeis Smalles pices of ead) CipVer Do i AA Painters doo, usucl PASEO carts Crect : raera cantinusys J Boinied a Ciprens & ands oy) ENCryPrs tHe vay of These curity oO 7 Son be wredeey enrenty Gereretor sender receiver > \p ty ~ secret key shored secret I oe cm Sender ond ye cave | poesyrion [5 = encryption | +? | plopiith Age! : fainter message poinres* essay Figy ey enrerts® Erergpion @ scanned with OKEN Scanner Data Ency yption Slardord CDES) + — DES was develped inthe {dtos as a US-Jave armen Sjardavd for pete cring non-c\assiFied inks. = DES erewyph 64 bit Clear tert blacks Under the Grr of “56 bit keys. Each Key ts exended BY Parity bye to give 4 Ga bid eerking key Gigi Block diagram 40 DES — pes based an Awe Fundomertal ahiwibuies of Cyplege caphy. — +) Substitution iW) Trans position — pes Gapsist oF 16 SHePS each af ehich is alled as 4 of substitution Ltvanteta C-Hhe Charmclers. staan cach ound pecerms +he Steps OF ~ eStKen Yednrique for Scrambling © * Steps i> - » eq bid plainiert block is handed over to an Inia per martation Crp) Function 4) Trifi\ per muration is parformed on plaintent @ scanned with OKEN Scanner paint ar Coa bits) . Tr jal Ot |’ nivale t cin) key => ae Figs Steps fn DES sp produce +wo levels ak Perm tert planters Creer. #) Right planters RPT) a 6 4) Gach LPT RPT O°SS, Yhrcug A ! ) pieces. each A vs auin KEY S) inthe erd LPT 2 RPT are vajoined ginal Perenete on CFP) is perorrned onthe Cornbined pleck. The result is 64 Dit cipherterd Ly Inisial Perrnutertinn (2°) happens only once. 1p TePlaces Aho Eins bit OF original printer! block. wlth SS th bi) of origina) Pinter block, second bi} wilh The cath by f SoM, — Complete Nanspositien Aable- js used bo Ip Shalt Vead from Jer+ to tight. ated plac k Fourds OF e ncayerion @ scanned with OKEN Scanner \ ~ Prtec 3p is dore the resuty . . 1 IpkD Awe Fath bioc eee lock. is divi - Gis a2 bes CLpTe RED - & _ enh Rounds ave, per fosrred on these AWwo blocks. bio Rornds-are-- Consist 24 S- Box gubstituten by x-oR LSwop Fig: Rounds 1 DES is available Fr D kes eansfourgasion ?- A 56 bis Key 3 EVery scand, cd uring Gren yaurd a separate 88 pit SUb -keyis genesied cron “sé bit KG using Aransteimraton process. - this is s siple huiding, &6 FEY snp 2 nalher of 26 oe coe Seok Kyecore Clary apitied by SM ons, depending upon ‘sound, or xwe pos - Tot C8 pound 21,219 ord shft=4- remaining Ane shrift iS ofz position. 0) Expansion? perros? oa ; parting his prase The pprisenraee From) 32 bis Av &8 48 bis: © scanned with OKEN = ~ Then | ; oe a2 bit RPT is divided inte & differen’ S and Cach block Consisting of 4 bits dYiginal RAE P laine + (ppt) oF 22 bis / Block Block 2 Block 8 C4 bids) Cpabits) C4 bits) Fig:- expansion Permutation. ert each 4-be Block of yewious Step is ©* ded 40. eC 4ep pa Cots espansing e bit block 1-@ per ¢ bit block prrere pits are OO eB reco) pits are aetiallg He 1e pe First ond fourth bits OF abe 4 bit plock- pal -— this process results ite enpem gellas Porm jor ot ire inpurs Bis: cine Creag +e output - , g bit epté gesulliag output _ ag bits keg ys xoRed cath © is giv? ao peat SHEP: 5) sox Se he. +8 bit input bsorthe %R — This process ac ePi Ley ard expanded a al ; Lahn inne! Oo our sing upside we ehnrg Ye ated & oduces ve tut 9 be cupstitution 1 pectorre! g sepsituten ‘ it ye ou C and jt has 6 bit inp ‘ \ : - je beck bit D ig div! i ee rip each SP is Gornbired to For a2 bit ou ” pe ack eg yo net gaye @ scanned with OKEN Scanner 48 bit input block 6 bit Subbloo Figi- S~ Box Substitution ©) P-bax Permutation = _ the 32 bit outpurs at perrrutored using Ct P-Boy — This invalyes imple permutation fer eg'= 1.6 in Ye Diack jpaicates that the. pit ad postion 46 of The asighral INP ayes toa bit ot positon 4 jp output 3) xen _ord SUSE - Leer pale P. on of the yppial 6& bit ent block iS yoked wlth + produced by -BO% permutation . result iS wp the ne? night pale be: RPT _ the od Rept peornes eto left nalé in process of swappirg ig per forrned ony ante, aktheend ~ Final permutation of 16 Rounds The ouapuy of Fina\ perro ecceyption block. yaton isthe 6 bit @ scanned with OKEN Scanner a a Viginal 64 bit Plaintest block] e LG [32 bis Let block] [22 bis PPT Bock] S2bt LPT block (Resi Round Fig:- KOR and Swap ae Asyrmmeni< keg cry pregrorha - —_— Asymmewvic encry pion y¢.a form of encary pen aire, eat ON key encygps keys core in P whe Ye Sher con decngPh Je. in the Sense Frequently Ape. keys ave interchangap that Te Key ACD prs @ message tren B an dectypy eee a key 8 enuryprs o rye ssaje trenkeyA Can decrypt a4. nile Comer” Apis prepestg isNer \ KO essential ASSYATOAAE entaypton. __psyminestic encrypren is also knevn OS pubye Kt, Cayprog erry since Uses AYN oe 0 mHArENYy Key pow £ marke ane public WM! ieeping the other geet. @ scanned with OKEN Scanner Users Can "Si renee Sign’ messoge by entry pins them orth ' Faas Feys. TRS IS effective sinte ane ynessage Necipent yecipienh Can verify Aped re users pubic Key con decrypt She ime teage £ Thus wwe trad JRE USES “Secer Key cas ysedto enetyp it. — 1 the user's secret yA Fallows Hhat Ane Users 2 pok Some. ieMpestor Teaily seny He message. key IS in Fact SEACH hep receives ; pecaver a key ' paiva 5 Ena ' a as : >| plaintest \ Plaintest message \ message 2 sender stg Receiver. > Rigi psymrnesvic cagprogeor hy by ere ers Can send SEIT message “4, . ereypang a. message Own He AeipientS pubic °y apis Case on\ age inrended qecipient Candecry pA the 3 ec aos a Anat soe Should haveaccess to ny Ape veauired secre key. _ the teey 0 success Fal use. ak managenreny syslemn which Implements a public teey a ngyasnucers - cowpact this iris cligercalt AO esebih Go yeuatiling oF PIC vers, ar ever to Conver! s> 4 Cind ‘Kinavie ayes: of Asymmedvic enctyption @ scanned with OKEN Scanner Phe main advon\a ¢ . . ge. 0 asyrnmmedsie City PHOT TY is We secarity of akey fe] POT 0 ) Digital Signature = -—A cigs aignalure \s an elechanic cale the. identite a. Ape s igneture. — qyis used to authenti sender oy Abe Signer © = ay has aaliya 1° ensure hat the 0 igina Gnienk of the message or docmnent hol has Ween Sent ‘Ss unchonged. Hy cing Icinel oF pigital signatures AC used wi can be. rnessagye and easil ayyanspariable- auctonrenticall, Mme Slamped. ~ rh a message means hot Ape. Serer CONN lover » — A digtal sig praintest message yed ee the \dentity eceived is OW with digital signature arsed or 2aSily repudiate i+ nature Can be used eaithency pred or so that the yecer ver Gn be ersu oe the sendeg and the message ¥ ginal or tampered . p digital ceorhficare koniains the digital signature of the Corhi cate issuing acethorG Ce) HEA pente anyone @n verify sat the Cer h hice is veoh oF fake egsyal Oi based eipan bath ashing yal aignarres axe ba 8 ons “¢ a mrHerw Cc cayprog raph Both ancy ener Arods Pad an tporiant we qe pen signin “digital documon’ - @ scanned with OKEN Scanner Dal essare Fig: Aloc signing Hash using sendess private key we Yash r. Venere Ainstn- | 5 [ye ih Es ; ——— Fasrdtion frorioot roi] Energy hesh | sepleris privies Yer acid >, Sigpe Message digest Is Diagy ann af ygital signakiye . verification pigiially signed data Signartuye. Da\q Ho'sh ; Functor} Q pecryp} Using Senden S pubyic Key rp ponoolis)e) Mash Hash If the hashes are equal She Signatere FS Valid vA igned Dignalys he Rig Creation an 9 Verification of Dgital sigre\ure- @ scanned with OKEN Scanner aa oF Mach message digest is generar using Fandion Caygpaithn) )p message dige is Patuerie. kee) Sthe resulting Cnc" dioest js Knaton a8 digital signe lure . signature ig cached coirth dhe date Ww enciy? cd using seadons Ned tre ore. 190. 3) Digital Message. “and Sends WWilo tne Veceiver, pi receivers erel i- ———— kex 5 Recelver Uses genders Public qe ger Aigita’ gignesture fo oblain mess? digest genecvted by sender useS SAME roe SSage digesrolpeitoro ed by serter 40 gererate. a nec Cot yecever) Comp Pare AHeSe 2d receiver which 7S us wness TBE digest Noe , v ; nessa aigests ye SO & ener HES SAYE digest - om i. re ssage digest axe Qual then the Signa ise ge digest a $F me Perel Sonia, oom Adv ania Na HCatON . +) Ruther veheugh messages TO often Tnelade. ahd message thet info. ey sending. a ita eignatures OF messages - abuttpe ens ge accarate. Oe “Can be usedta aurhenbce the Source into. ber @ scanned with OKEN Scanner ene Entegny4 [7 3p many Scenarios the Srey ¢ yeceiucy of a message May heve anced Foy ConGiderce that ‘the. message, has ror been aresed uring franc mission. p\Vtrough encit Plon hides the Contents af ameasage ih may be possible. 40 change. an enevy pred message tol dhout 4+ Disadvoniages:- 1) Non- epudiation :- Ina cry ptogreph refers 1 ong at oF dis claiming yespon ress ge: under Slorctng i4 ic Context the werd 1 qudiaten sbilitg ford ectpient ™4 ynaist he Sessler attach } later sepudiaden mere \ esSa " dhe siqned 1 ee oes ae rity Goin as%0 HS symmersic k € cy progr ooh isused For and decry 5 Tio SEPpora” Single *k are used Got ncreypyen| ana decryption encry eh Sane | on a6 publi & 4 : wry AS Single no! . ® pise Kerel a pave ke! 4 q encyyrnen No need-to are on keYS. ee Tove, SeCinty @ scanned with OKEN Scanner &) simple te implement [| Hed to implement =) as Compare to Syrewr etic key ype —apl eqs- Pao Encryption | Fer EG! 5 a: oO standosd cies) Pama i @ scanned with OKEN Scanner

You might also like