Professional Documents
Culture Documents
Encryption: Process of converting original message in to form that is unreadable to unauthorized person. Decryption: Process of encrypted text message back in to original form.
Accountability : Enables authentication of the origin of message and prevents information from repudiating. Nonrepudiation: It does not allow sender of message to refute the claim of not sending that message. Access Control Availability
Substitution Poly alphabatic A B C D E F G. Plain Text J K L M N O P Substitution 1 Q R S T U V W.. Substitution 2 Transposition Cipher( Permutation) From right 1-4, 2-8, 3-1, 4-5, 5-7, 6-2, 7-6, 8-3 00100101 01101011 00001011 10111010
Transposition Ciphers
Rearrange order of characters (permutation) SIMPLE COLUMNAR CIPHER Using a grid, write plaintext horizontally, read ciphertext. vertically. P launchmissilesnow launch missil esnow C LMEAISUSNNSOCIWHL ATTACK ON COLUMNAR CIPHER Ciphertext has same letter frequencies as plaintext -> Easy
MULTIPLE TRANSPOSITION CIPHERS Pass a plaintext through two or more transposition ciphers -> Much harder to attack.
One-time Pad
Use a random key as long as the message. Must not reuse the key sequence ever again. Both parties must have key sequence Hotline between USA and USSR was rumoured to use a one-time pad. Destroy key sequence after use Advantages? Disadvantages?
Transposition Ciphers
Rearrange order of characters (permutation) SIMPLE COLUMNAR CIPHER Using a grid, write plaintext horizontally, read ciphertext. vertically. P launchmissilesnow launch missil esnow C LMEAISUSNNSOCIWHL ATTACK ON COLUMNAR CIPHER Ciphertext has same letter frequencies as plaintext -> Easy
MULTIPLE TRANSPOSITION CIPHERS Pass a plaintext through two or more transposition ciphers -> Much harder to attack.
Steganography
Dear George, March 3rd Greetings to all at Oxford. Many thanks for your letter and for the Summer examination package. All Entry Forms and Fees Forms should be ready for final dispatch to the Syndicate by Friday 20th or at the very least, Im told, by the 21st. Admin has improved here, though theres room for improvement still; just give us all two or three more years and well really show you! Please dont let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos.
Conceal existence of message, e.g. 1st letter of each word, least sig. bit of graphic image Useless once method discovered Peter Wayner,
Steganography
Dear George, March 3rd Greetings to all at Oxford. Many thanks for your letter and for the Summer examination package. All Entry Forms and Fees Forms should be ready for final dispatch to the Syndicate by Friday 20th or at the very least, Im told, by the 21st. Admin has improved here, though theres room for improvement still; just give us all two or three more years and well really show you! Please dont let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos.
**
Mathematical Cryptography
HASH Function Mathematical algorithms. Message : this ASCII Values: 116 104 105 115 Calculated value: 232 202 210 230 Hash value Calculation: (232+208+210+230)/10 Hash Value: 88
DES
Symmetric Algorithms: Both ends of an encrypted message have the same key and processing algorithms. Secret key is generated which is some times called as Private key. Asymmetric Algorithms: Two keys to encrypt & decrypt data, referred as Public Key & Private key. Public key used by sender to encrypt. Private key is used by receiver to decrypt.
Steganography
Dear George, March 3rd Greetings to all at Oxford. Many thanks for your letter and for the Summer examination package. All Entry Forms and Fees Forms should be ready for final dispatch to the Syndicate by Friday 20th or at the very least, Im told, by the 21st. Admin has improved here, though theres room for improvement still; just give us all two or three more years and well really show you! Please dont let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos.
**
Steganography
Dear George, March 3rd Greetings to all at Oxford. Many thanks for your letter and for the Summer examination package. All Entry Forms and Fees Forms should be ready for final dispatch to the Syndicate by Friday 20th or at the very least, Im told, by the 21st. Admin has improved here, though theres room for improvement still; just give us all two or three more years and well really show you! Please dont let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos.
Conceal existence of message, e.g. 1st letter of each word, least sig. bit of graphic image Useless once method discovered Peter Wayner,