You are on page 1of 14

PERMUTATION

CIPHER 
PERMUTATION
CIPHER 

The permutation cipher is another


form of transposition cipher., it is
similar to columnar transposition in
some ways. The Permutation Cipher
acts on blocks of letters rather than
the whole ciphertext.

2
•Stream cipher
•Block Cipher

PRESENTATION TITLE 3
There are basically two method on
which cryptographic algorithm is
work:

Algorithm

Stream Cipher Block Cipher


BLOCK CIPHER
• Block Cipher is the kind of encryption that converts
plaintext by taking each block individually
• In block cipher, plain text massage divide into fixed size
blocks and encrypt each block with some fixed size of
key
• Data Encryption Standard (DES) Is the best example of
block cipher in which each block of 64-bit get encrypted
using 56-key bit and cipher text of 64-bit get generated
BLOCK
CIPHER
BLOCK CIPHER

​ADVANTAGES DISADVANTAGES

HIGH DIFFUSION ENCRYPTION PROCESS IS LOW

MORE SECURE ERROR PROPAGATION


STREAM CIPHER
• Stream cipher is the kind of encryption that
converts plaintext by taking one byte of the
plaintext at a time.
• In stream cipher keys and algorithm are applied to
each binary digit in a data stream, one bit at a time
rather than encrypting blocks of data.
• It is used to break data into bits and encrypt
individually.
STREAM
 CIPHER
STREAM CIPHER

​ADVANTAGES DISADVANTAGES

HIGH SPEED TRANSFORMATION LOW DIFFUSION

LOW ERROR PROPAGATION LESS SECURE


PASSWORD CRACKING
Password cracking is the process of using an
application program to identify an unknown
or forgotten password to a computer or
network resource.
PASSWORD CRACKING
MATHEMATICAL
TOOL FOR
CRYPTOGRAPHY
MATHEMATICAL TOOL FOR CRYPTOGRAPHY
Modern cryptographic systems rely
on functions associated with
advanced mathematics, including the
branch of mathematics known as
number theory, which explores the
properties of numbers and the
relationships between numbers
Key topics include: classical cryptographic
constructions, such as Diffie Hellmann key
exchange, discrete logarithm-based
cryptosystems, the RSA cryptosystem, and
digital signatures; fundamental
mathematical tools for cryptography,
including primality testing, factorization
algorithms, probability theory, information

14

You might also like