Professional Documents
Culture Documents
Chapter 3 Cryptography - Pps
Chapter 3 Cryptography - Pps
Cryptography
14 Marks
Ganesh N. Jorvekar
This process is
systematic & well-
structured
This process is
trial & error based
Hi there !!
ENCRYPTION
ALGORITHM
m/okuG
m/okuG DECRYPTION
ALGORITHM
Hi there !!
Plaintext Plaintext
Encryption Decryption
Ciphertext Ciphertext
Internet
X
Message X Encryption Decryption
Destination
Source Algorithm Y=E(K,X) Algorithm
Secure Channel
Key
A B C D E F G H I J K LM N O P Q R S T U V W X Y Z
D E F G H I J K LM N O P Q R S T U VW X Y Z A B C
Ciphertext -
1 4 2 6 3 5
W E A R E D
I S C O V E
R E D F L E
E A T O N C
E
Column Out 4 3 1 2 5 6 7
Plaintext: t t n a a p t
m t s u o a o
d w c o i x k
n l y p e t z
Ciphertext: NSCYAUOPTMDNTTWLAOIEPAXTTOKZ
43 Ganesh N.Jorvekar April 22, 2024
One Time Pad
Symmetric technique
In one time pad a random key that is as long as the
message, so that the key need not be repeated.
the key is to be used to encrypt and decrypt a single
message
Each new message requires a new key of the same
length as the new message
one-time pad, is unbreakable technique
It produces random output that bears no statistical
relationship to the plaintext.
Main problem of sharing a secret key
44 Ganesh N.Jorvekar April 22, 2024
One Time Pad
One time pad is created by generating a character or
number string using any random number generator.
At the time of encryption one character from msg is
encrypted at a time.
In computer every bit in this string XOR with the bits
in secret key.
Drawback – lot of overhead to hide a relatively few
bits
Once the system discovered, it becomes worthless.