Sunteți pe pagina 1din 15

CS6701-CRYPTOGRAPHY &

NETWORK SECURITY

UNIT-I Classical Encryption Techniques


OUTLINE
 Introduction
 Symmetric Cipher Model
 Substitution Techniques
 Transposition Techniques
 Steganography
INTRODUCTION-BASIC TERMINOLOGY
 Plaintext: original message to be encrypted
 Ciphertext: the encrypted message
 Enciphering or encryption: the process of converting
plaintext into ciphertext
 Encryption algorithm: performs encryption
 Two inputs: a plaintext and a secret key
 Deciphering or decryption: recovering plaintext from
ciphertext
 Decryption algorithm: performs decryption
 Two inputs: ciphertext and secret key
 Secret key: same key used for encryption and
decryption
 Also referred to as a symmetric key
CIPHERS
 It is a scheme for encryption and decryption.
 Symmetric cipher: same key used for
encryption and decryption
 Block cipher: encrypts a block of plaintext at a time
(typically 64 or 128 bits)
 Stream cipher: encrypts data one bit or one byte at a
time
 Asymmetric cipher: different keys used for
encryption and decryption
SYMMETRIC CIPHER MODEL
 A symmetric encryption scheme has five
ingredients:
 Plaintext
 Encryption algorithm
 Secret Key
 Ciphertext
 Decryption algorithm
 Security depends on the secrecy of the key, not
the secrecy of the algorithm
 The key controls the algorithm.
SYMMETRIC CIPHER MODEL
SYMMETRIC ENCRYPTION
 Sender and Recipient share a common key
 all classical encryption algorithms are symmetric

 Mathematically:
 Y = EK(X) or Y = E(K, X)
 X = DK(Y) or X = D(K, Y)
 X = plaintext
 Y = ciphertext
 K = secret key
 E = encryption algorithm
 D = decryption algorithm
 Both E and D are known to public
CONT…
 Two requirements for secure use of symmetric
encryption:
 a strong encryption algorithm
 a secret key known only to sender / receiver
 assume encryption algorithm is known
 implies a secure channel to distribute key
 A user can recover the original message only by
decrypting the cipher text using the secret key.
 Depending upon the secret key used the
algorithm will produce a different output.
 If the secret key changes the output of the
algorithm also changes.
MODEL OF CONVENTIONAL CRYPTOSYSTEM
CHARACTERISTICS OF CRYPTOGRAPHY
 The type of operations used for transforming
plaintext to ciphertext.
 The number of keys used.

 The way in which the plaintext is processed.

CRYPTANALYSIS
 The process of trying to break any cipher text
message to obtain the original plain text message
itself is called as cryptanalysis.
 It is the breaking of codes.

 The person attempting a cryptanalysis is called


as a cryptanalyst.
ADVANTAGES:
 Provides authentication, as long as the key stays secret.
 Data is encrypted very quickly
 Symmetry of key allows encryption and decryption with
same key.
DIS-ADVANTAGES:
 Symmetric cryptosystems have a problem of key
transportation. The secret key is to be transmitted to the
receiving system before the actual message is to be
transmitted. Every means of electronic communication is
insecure as it is impossible to guarantee that no one will
be able to tap communication channels. So the only secure
way of exchanging keys would be exchanging them
personally.
 If the key is revealed (lost,stolen,guessed,etc.,.) the
interceptors can immediately decrypt anything that was
encrypted using the key.
 More Damage if Compromised
SUBSTITUTION TECHNIQUES
 It changes characters in the plaintext to produce
a ciphertext.
 If the plaintext is viewed as a sequence of bits,
then substitution involves replacing plaintext bit
patterns with ciphertext bit patterns.
 Caeser Cipher
 Monoalphabetic Ciphers
 Playfair Cipher
 Hill Cipher
 Polyalphabetic Ciphers
 One-Time Pad
 Feistel Cipher
LINKS
 Caesar Cipher- https://www.youtube.com/watch?v=L2NAQbZeRXo

 Monoalphabetic cipher-
https://www.youtube.com/watch?v=Dz1RW_W2zGI

 Playfair cipher- https://www.youtube.com/watch?v=L2NAQbZeRXo

 Hill Cipher- https://www.youtube.com/watch?v=jZUAiJfM0Zc

 Vernam cipher- https://www.youtube.com/watch?v=ap9dTNOqk1E

 Polyalphabetic Cipher-
https://www.youtube.com/watch?v=FoUxUY8w3eU

 Feistel Cipher- https://www.youtube.com/watch?v=drI2shandyk


TRANSPOSITION TECHNIQUES
 It rearranges the characters in the plaintext to
form the ciphertext. The letters are not changed.
 Types
 Rail fence cipher
 Row Transposition cipher

Link:
https://www.youtube.com/watch?v=eKMmrDy3LCQ
STEGANOGRAPHY
 Steganography is data hidden within
data. Steganography is an encryption
technique that can be used along with
cryptography as an extra-secure method in which
to protect data. Steganography techniques can
be applied to images, a video file or an audio file.

 http://www.softpedia.com/get/Security/Encryptin
g/QuickStego.shtml

S-ar putea să vă placă și