Ordinary plain text to Unintelligible text

We are the student of Crytography Network and Security

About This Project

In this project we are going to study more about CIPHER TECHNIQUES.


WHAT IS CRYPTOGRAPHY?
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden.
It is closely associated to encryption, which is the act of scrambling ordinary text into what’s known as ciphertext and then back again upon arrival.
In addition, cryptography also covers the obfuscation of information in images using techniques such as microdots or merging

  • Caeser Ciphers
  • Vigenère Ciphers
  • AES Ciphers
  • RSA Ciphers
  • XOR Ciphers

Understanding the Algorithms and Working of Encryption Techniques!

In this section we have given brief description of 5 Major Cipher Techniques.

  • 01 Caesar Cipher

    It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

    EXAMPLE: The transformation can be represented by aligning two alphabets; the cipher alphabet is the plain alphabet rotated left or right by some number of positions. For instance, here is a Caesar cipher using a left rotation of three places, equivalent to a right shift of 23
    Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
    Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW

  • Vigenère Cipher is a method of encrypting alphabetic text. It uses a simple form of polyalphabetic substitution.
    The encryption of the original text is done using the Vigenère square or Vigenère table.

    1. The table consists of the alphabets written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar Ciphers.
    2. At different points in the encryption process, the cipher uses a different alphabet from one of the rows.
    3. The alphabet used at each point depends on a repeating keyword.
  • The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

    High-level description of the algorithm
    1: KeyExpansion – round keys are derived from the cipher key using the AES key schedule. AES requires a separate 128-bit round key block for each round plus one more.
    2: Initial round key addition:
    AddRoundKey – each byte of the state is combined with a byte of the round key using bitwise xor.
    3: 9, 11 or 13 rounds:
    (a) SubBytes – a non-linear substitution step where each byte is replaced with another according to a lookup table.
    (b) ShiftRows – a transposition step where the last three rows of the state are shifted cyclically a certain number of steps.
    (c) MixColumns – a linear mixing operation which operates on the columns of the state, combining the four bytes in each column.
    (d) AddRoundKey
    4: Final round (making 10, 12 or 14 rounds in total):
    (a) SubBytes
    (b) ShiftRows
    (c) AddRoundKey

  • RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key . As the name describes that the Public Key is given to everyone and Private key is kept private.

    An example of asymmetric cryptography:

    1. A client (for example browser) sends its public key to the server and requests for some data.
    2. The server encrypts the data using client’s public key and sends the encrypted data.
    3. Client receives this data and decrypts it.

    IDEA!
    The idea of RSA is based on the fact that it is difficult to factorize a large integer. The public key consists of two numbers where one number is multiplication of two large prime numbers. And private key is also derived from the same two prime numbers. So, if somebody can factorize the large number, the private key is compromised. Therefore, encryption strength totally lies on the key size and if we double or triple the key size, the strength of encryption increases exponentially.

  • This cipher is an additive cypher. It is based on the XOR operation (also known as the exclusive disjunction) in logic.
    As a logical operation, XOR is also called modulus 2 addition. In XOR operation, the output is true when the inputs differ. In other words, XOR operation means “either one but not both or none.”.

    XOR cipher employs the XOR logical operation in order to encrypt data. First, a random key is generated.
    Then, XOR operation is performed using the key so that an encrypted data is created. In order to decrypt, the same key should be used and XOR operation should be run again.
    XOR operation uses the same key for both encryption and decryption. That is why it is known as a symmetric encryption.

 

Technologies we have used in this projects

HTML 100%
CSS 90%
JavaScript 80%

Applications In Real World

Here are the real encrypted use that we un-seen in our daily routine.

Authentication/Digital Signatures

  • Authentication is any process through which one proves and verifies certain information.

  • The digital signature of a document is a piece of information based on both the document and the signer’s private key.

Time Stamping

  • Time stamping is a technique that can certify that a certain electronic document or communication existed or was delivered at a certain time.

  • Time stamping uses an encryption model called a blind signature scheme.

Encryption/Decryption in email

  • Email encryption is a method of securing the content of emails from anyone outside of the email conversation looking to obtain a participant’s information.

  • In its encrypted form, an email is no longer readable by a human.

Encryption in WhatsApp

  • It uses the ‘signal’ protocol for encryption, which uses a combination of asymmetric & symmetric key.

  • Symmetric key ensure confidentiality; asymmetric key helps in achieving the security goals.

Let's begin

1: First select the cipher techniques and enter the message which you want to encrypt.
2: Click on calculate button.
3: Output will be appear below the box, Cipher text along with plain Text.

Enlighted By

Mr.Dhirendra Kumar

Assistant Professor

Subject Code: MC-407
Cryptography and Network Security

Team

Nimisha Singh

Student

Rachit Goel

Student

Contact

If you need any help or have any query fill this form. We will contact you ASAP.

Loading
Your message has been sent. Thank you!