Understanding the Algorithms and Working of Encryption Techniques!
In this section we have given brief description of 5 Major Cipher Techniques.
In this project we are going to study more about CIPHER TECHNIQUES.
WHAT IS CRYPTOGRAPHY?
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden.
It is closely associated to encryption, which is the act of scrambling ordinary text into what’s known as ciphertext and then back again upon arrival.
In addition, cryptography also covers the obfuscation of information in images using techniques such as microdots or merging
In this section we have given brief description of 5 Major Cipher Techniques.
It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
EXAMPLE:
The transformation can be represented by aligning two alphabets; the cipher alphabet is the plain alphabet rotated left or right by some number of positions. For instance, here is a Caesar cipher using a left rotation of three places, equivalent to a right shift of 23
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW
Vigenère Cipher is a method of encrypting alphabetic text. It uses a simple form of polyalphabetic substitution.
The encryption of the original text is done using the Vigenère square or Vigenère table.
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
High-level description of the algorithm
1: KeyExpansion – round keys are derived from the cipher key using the AES key schedule. AES requires a separate 128-bit round key block for each round plus one more.
2: Initial round key addition:
AddRoundKey – each byte of the state is combined with a byte of the round key using bitwise xor.
3: 9, 11 or 13 rounds:
(a) SubBytes – a non-linear substitution step where each byte is replaced with another according to a lookup table.
(b) ShiftRows – a transposition step where the last three rows of the state are shifted cyclically a certain number of steps.
(c) MixColumns – a linear mixing operation which operates on the columns of the state, combining the four bytes in each column.
(d) AddRoundKey
4: Final round (making 10, 12 or 14 rounds in total):
(a) SubBytes
(b) ShiftRows
(c) AddRoundKey
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key . As the name describes that the Public Key is given to everyone and Private key is kept private.
An example of asymmetric cryptography:
IDEA!
The idea of RSA is based on the fact that it is difficult to factorize a large integer. The public key consists of two numbers where one number is multiplication of two large prime numbers. And private key is also derived from the same two prime numbers. So, if somebody can factorize the large number, the private key is compromised. Therefore, encryption strength totally lies on the key size and if we double or triple the key size, the strength of encryption increases exponentially.
This cipher is an additive cypher. It is based on the XOR operation (also known as the exclusive disjunction) in logic.
As a logical operation, XOR is also called modulus 2 addition. In XOR operation, the output is true when the inputs differ. In other words, XOR operation means “either one but not both or none.”.
XOR cipher employs the XOR logical operation in order to encrypt data. First, a random key is generated.
Then, XOR operation is performed using the key so that an encrypted data is created. In order to decrypt, the same key should be used and XOR operation should be run again.
XOR operation uses the same key for both encryption and decryption. That is why it is known as a symmetric encryption.
Here are the real encrypted use that we un-seen in our daily routine.
1: First select the cipher techniques and enter the message which you want to encrypt.
2: Click on calculate button.
3: Output will be appear below the box, Cipher text along with plain Text.

Subject Code: MC-407
Cryptography and Network Security


If you need any help or have any query fill this form. We will contact you ASAP.