Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
61 views8 pages

CN014

This document covers the fundamentals of cryptography, including definitions of key terms such as encipher, decipher, plaintext, and ciphertext. It discusses the two main types of cryptography algorithms: symmetric key and public key, along with traditional ciphers and their types, including substitution and transposition ciphers. The document highlights the advantages and disadvantages of different cryptographic methods, emphasizing the importance of maintaining privacy and authentication in data communication.

Uploaded by

Shiva Kushi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views8 pages

CN014

This document covers the fundamentals of cryptography, including definitions of key terms such as encipher, decipher, plaintext, and ciphertext. It discusses the two main types of cryptography algorithms: symmetric key and public key, along with traditional ciphers and their types, including substitution and transposition ciphers. The document highlights the advantages and disadvantages of different cryptographic methods, emphasizing the importance of maintaining privacy and authentication in data communication.

Uploaded by

Shiva Kushi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1

UGC NET

DAILY
CLASS NOTES
Computer

Data Communication and Computer Networks


Lecture – 14
Network security: Part 1
2

Content :
1. Cryptography
2. Encipher and Encrypt
3. Decipher and Decrypt
4. Cryptography Component
5. Type of Cryptography Algorithm
1. Symmetric Key
2. Public Key
6. Mono Alphabetic Substitution
7. Poly Alphabetic Substitution

CRYPTOGRAPHY
The study of various ways to disguise messages in order to avoid the interception from an
authorized interceptor is known as cryptography.

ENCIPHER AND ENCRYPTY


The terms encipher and encrypt correspond to the message transformations performed at the
transmitter in order to disguise the message.

DECIPHER AND DECRYPT


The terms decipher and decrypt correspond to the inverse transformations performed at the
receiver in order to recover the original message back.

REASONS FOR USING CRYPTOSYSTEMS


The three major reasons for using the cryptosystems are:
1. To maintain privacy and to prevent an unauthorized person from extracting information
from the communication channel. The process of extracting information from the channel
is called eavesdropping.
2. To enable authentication for preventing unauthorized persons from injecting information
into the channel. The process of injecting information is called spoofing.
3

3. Sometimes it is essential to provide the electronic equivalent of a written signature in


order to avoid or settle any dispute between the transmitter and the receiver about what
transmitted message is.

CRYPTOGRAPHY COMPONENTS
Cryptography is Greek word which means “secret writing” below figure shows the
cryptography components.

PLAINTEXT
The original message produced by the sender is known as plaintext. It is data before
transmission.

CIPHERTEXT
The plaintext is transformed into cipher text. The encryption grogram coverts the
plaintext into cipher text.

DECRYPTION
It is a process which is exactly opposite to encryption. The decryption algorithm at the
receiver transforms the cipher text back to plain text.

CIPHERS
1. The encryption and decryption algorithms together are referred to as ciphers. This term is
also used to refer to different categories of algorithms in cryptography.
2. It is not necessary to have a separate cipher for each sender or receiver pair. Instead it is
possible to use public ciphers with secret keys for millions of pair sender and receiver.
4

A KEY
1. A key is a value or a number. The cipher as an algorithm operates on the key.
2. For the encryption of a message we have to use an encryption algorithm, an encryption
key and the plaintext at the input as shown in below figure. At the output of the
encryption box we get the cipher text.
3. For decryption of the cipher text, we have to use a decryption algorithm, a decryption key
and the cipher text at the point input as shown in below figure.
4. After deception, we get the plaintext back.

NOTE: The encryption and decryption algorithms are public and any one can use them
but the encryption and decryption keys are secret.

TYPE OF CRYPTOGRAPHY ALGORITHMS


The cryptography algorithms can classified basically into two types as:
1. Symmetric key or secret key cryptography algorithms and
2. Public key or asymmetric cryptography algorithms

SYMMETRIC KEY CRYPTOGRAPHY


1. It is also called as the secret key cryptography, below figure shows the block
schematic of symmetric key cryptography.
5

2. In the symmetrical key cryptography, the same key (shared secret key) is used by the
sender and receiver.
3. The sender uses this key along with the encryption algorithm to encrypt the data, and
the receiver uses it along with the decrypting algorithm to decrypt the data.
4. The encryption algorithm makes use of a combination of addition and multiplication
whereas the decryption algorithm uses a combination and division.

ADVANTAGES
1. The major advantages of symmetric key algorithm is that it is more efficient than the
public key algorithms. It takes less time to encrypt a message using the symmetric
key algorithm. This is because this key is of smaller size (length).
2. Hence symmetric key algorithms are used encryption and decryption of long
messages.
DISADVANTAGES
1. The first disadvantages in that the sender and receiver both should have a unique
symmetric key. So a large number of keys are required when the number of users
increases.
2. The disadvantages of keys between two users can be difficult.
6

TRADITIONAL CIPHERS
Traditional cipher are the earliest and simplest types of ciphers in which a character is used
as a unit of data to be encrypted.
The traditional ciphers are of two types:
1. Substitution ciphers
2. Transposition ciphers.

SUBSTITUTION CIPHERS
1. This cipher operates on the principle of substitution of substitution of one symbol with
the other.
2. If the symbols in the plaintext are alphanumeric characters (such as A, B etc), then some
of such characters are replaced by another characters.
3. For example A can be replaced by C or B by Z etc. the symbols in the digit form (0, 1, 2,
…) also can be replaced by another digits.

TYPES OF SUBSTITUTION
Substitution can be of one of the following two types:
1. Mon alphabetic substitution.
2. Polyalphabetic substitution.

MONOALPHABETIC SUBSTITUTION
1. In this type of substitution, a character in the plaintext is always substituted by some
other character in the cipher text regardless of its position in the text.
2. For example if the encryption algorithm states that A in the plaintext is to be changed to
F, then every A in the plaintext will be changed to F regardless of its position in the
plaintext.
3. The oldest recorded cipher is called the Caesar Cipher in which each character is shifted
down by 3 as shown in below figure.
7

Note that in encryption block each plaintext character is shifted down by 3 i.e. A is
replaced by D, B is replaced by D etc. as shown below

Below diagram shows the plaintext message “TIME HAS COME” and its corresponding
cipher text. Note that each letter in the cipher text has been obtained by three end around
shifting.

The decryption block will shift each cipher text character up by 3 to obtain plaintext.
In monoalphabetic substitution, the relationship between a character in the plaintext and
that in the cipher text is always one as to one.
DISADVANTAGES
8

Mon alphabetic substitution is very simple. But the code can be attacked very easily. To
overcome this disadvantages the polyalphabetic substitution method is used.

POLYALPBABETIC SUBSTITUTION
1. In this technique each character in the plaintext is replaced by a group of character to
obtain the cipher text. So the relation between a character in the plaintext to a character in
the chipper text is one-to-many
2. Another important point to be noted is that is that a character B can be changed to E at
the beginning of the text but it may be changed to P in the middle of the text.
3. In the polyalphabetic substitution, the key should tell us about which of the different
possible characters can be chosen for encryption.
4. Example: let encryption algorithm be defined as follows “Take the position of character
in plaintext, divide it by 5, obtain the remainder and use the remainder as shift value”
5. Then the character in position 1 is shifted by 1 where as that in position 8 is shifted by 3.

ADVANTAGES
The advantages of polyalphabetic substitution is that it is difficult to attack successfully as
compared to the monoalphabetic substitution.

DISADVANTAGES
However it is still possible to attack the code by trial and error.

PW Web/App : https://smart.link/7wwosivoicgd4
Library - https://smart.link/sdfez8ejd80if

You might also like