Sunteți pe pagina 1din 2

Attack at Dawn buubdl bu ebxo

a-b b-c

- A cipher changes the message in a letter by letter basis


- A code converts whole plaintext words or phrases into other words or numbers
- Plaintext-message before encryption\
- Ciphertext – message after encryption
- Steganography-secret communication is achieve by hiding the existence of the message from
the greek word meaning (steganos to covered and graphein to write
- Milk of thitymallus plant to invisible ink –pliny the elder
- Cryptography –greek word meaning kryptos (hidden). The the goal of the process of encryption
is to hide the meaning of the message. To render a message unintelligible, the recipient can
reverse the scrambling protocol to make it comprehensible
- Cryptography branches- transposition and substitution
- Transposition- the numbers of the letters are simply reaarange efficiently generating an
anagram.( a word or phrase simply formed by rearranging the letters.)e.g cow woc owc.As the
number of letters increase, the number of possible arrangement rapidly explodes
- scytale is a tool used to perform a transposition cipher, consisting of a cylinder with a strip of
parchment wound around it on which is written a message.
- Kama Sutra –Brahmin scholar vatsyayana in 4th century recommends that the woman should
study 64 arts and the number 45 is the art of secret writing
- SUBSTITION CYPHER

- CEASAR’S CIPHER

*The Ceasars Ciphers appliead at a short message.It is based on a certain alphabet that is shifted in
Certain number of places( in above figure 3). Shifting it from on to 25 only
*algorithm and key method – the algorithm is involves in substituting the each letter in the plain
text alphabet with a letter from the, The cipher alphabet is allowed to consist of any
rearrangement of the plain alphabet.
ALGORITHM AND KEY RELATIONSHIP

*La Cryptographie militaire-Auguste Kerckhoffs von Nieuwenhoff


- Kerckhoffs Principle “the security of Cryotosystem must not depend on keeping the secret to crypto
Algorithm the security only depends on keeping the secret key
-the ALGORITHM is the general system of encryption and needs to be specified exactly by selecting a
key.Applying the key to the algorithm together to the plaintext generates the encrypted message

S-ar putea să vă placă și