The document covers various cryptographic techniques including substitution and transposition methods, with a focus on the Caesar cipher and Data Encryption Standard (DES). It explains the concepts of encryption and decryption, as well as steganography for hiding messages. Additionally, it discusses digital signatures and their importance in verifying message authenticity and integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
4 views
NIS UNIT-3
The document covers various cryptographic techniques including substitution and transposition methods, with a focus on the Caesar cipher and Data Encryption Standard (DES). It explains the concepts of encryption and decryption, as well as steganography for hiding messages. Additionally, it discusses digital signatures and their importance in verifying message authenticity and integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
se Cryptography 4
RK |
'
3:1 Tnteduction to Ceyptagraphy Terns
3-2» Substitution Aechnique = Caesar's Cipler [ModiFied —
+ Transposition Spa Siraple Columnar ar Trans pation
B3 Steganogmphy — c =
3:4 Difference — Symmenic k. Baymmesic Cryplogeuety | aos
-3:5__DES (Data Eoryption Standard)
&¢__Digital See
a ISM
= Plain text also Known 94 cleartext mean
)_anyane
_____ Who _ee_Knows the language —con_easily read the mestage.
i = The original ee Known as _Plain text _ ae
B- ee fiers tgs cane opi Ha,
=_Tt_\s_o_scrmmbled_version of plein text. a
~The coded weet mestage {3 knoan as. Ciplecterd
Bei. cepa.
i.
=| Cryptography. icula ilnincl niawantla nr Aelereeme Oe
uniting In secret message. os
= ~ Tt keeps data sae during transfer.
eee i _| Readable Gryplography Unseodable |
eee a lemenage System Message eeBE iv. Cryptonalyis (REE geauaal
~The pmcess_of shying to__break aoa Cipher text
Imessage to _obtalo~ the original message itself
iS known ag epee
{Sse : fracas | Readable =
oe Message
ne = oe ne .
es GS ng — yee me apes ak
Saag Cryptology f io eel
This. “the art _ond science of Aransforming ceadable
message 4z jwto Unreadable | sae and unreadable _
(
|
|
~ Eneryptio is she pce of changing plin text in &
cipher text
~Tt hides the real _ message Bra others.
vii Deeryption So eee 4
= Decryption Ls the pmcest of changing cipher text int
plain textTE # Cocsar Cipher Technique
= Caesar clpher_technique
*s_proposed by Julls Caesar T+ _is_one_of the
farliert and simplest method of oe a
Te 1s gle called ay _shift_ cipher / additi
=£och letter in the spill aegh=1s ete alga tla a
—_—_——_letlerr corresponding to a no-_of shifts in the
Z alphabet ain pap ii
= A_key _is_paovi else ejas serine it Oe ake
the lettess ore chitled ( placa > forexample. _
=x aethe o shift OF vies io
E> convert ComPUTER ENGINEERING” Plain eet
-_ ___cipher text. - Aeon a
nue GEEEIEFEREGEREE [elelr[s Fru
cipher text [OTe [e [oly [a [se [e[m[n[o |p [o [s[t fol v iw [x
vf KY |Z
Y[z[a[e [cl
Ploin Text - COMPUTER ENGINEERING
Cipher Text — FRPSYWHU HOTLOHHULGTi Beto ~Read o& again column by _coluron accorelimes to
a SEE ee eee
_____eg:= Plaindext= "ALL Is WELL For Your Exava"
_ Heya (nlo- of colurons). |
pa ee ea eee
4
A es
ce le
0mS
| Rearrange the _ positions
| of charucters without
“HELLO” —>"LHOFL”
Seana a ore =
pieeusinn.
[Uses a pattern or sequence _
for rearrangement
= Stegauncely ic abe ack oud alenc? of hiding
messages 2p that only -the sender and intended
__= Tt is used +p keep message so and hidden from
____hackers or otinckers.
= Th wadern steganography _, data is. usually screed
pT icst then erabedded into Giles
,
special algorithms,
ler like JPEGs using —1 Diagravs:
Steqo~Koy
Cover-Tmage
mbedld:
a)
| Covermedia + Hidden eee stegp- Key > Stego medium
Sea “is the Pile +e in einen eee
the — doctors, uahich —anexy
_Stego-key ~ The resul
| earn
ws + Hid
_+ Putting copystght marks
+ Sendi len i
I). Bdvontages
ut Nou can hide secret mestages inside (mages or
{ othec wy files So no one even Know
+ Hidden restages * are harck to notice.
no one dou it (Cover Media).
| + Looks normal ,
{+4
ee inside a photo ate
) inside phsto and videos:
+ Hiding sensiive data in plain sight
| also be encrypted using —_
tant Cle is _stego-mediun:
tio __in_songs of movieo
\ts there.u :
L + Can hide only small ormount of dota
» Expert hackers using Steqanalysis tools nay find
hidden — deta
+ Specta\_soPtoare needed for hiding ond. extracting
data
Tip = Write Definitoo and diagrawn. with worl
or Write Definition and advantages [discad vein tages
for _Shoct note (both, will got noarks) Gmaris)
20a per trade) angwer 9
AOR 1G you want weile everything fe secaring —
L 2-| Also knodn as Single key Known os Public _and Private 4
Teryprography key encryption:
B-| Less Secuwity More Security
4-| Key sehould be agreed by No need +o agree on keys i
botlh- sender and receiver.
-| Simple to _iroplennent ord toi ot 0) compared -
6 | Gyr Data Eneryption Standard | Eq: Oigta\ Signoture
2) Mea oF fe g
aoSRS [EET aaa
7 Qobinition : =e
*Data Encryption Standard (pes) is a syrametyic
block cipher. __ 4
«Tt a 64-bit plointert 4064 blebit cipher tert Wing
oO bua bit ey
+ Out of Gh-bit key, 5b bis pre used ed for encryption, - stiaell
reserved for erme detection. |
ahile ZB bits oe res
Aas
—____ Step 1- Tnitial_Perroutation (re) sie eases te All
The th-bit plaintext is rears using a fixed _patiern
the split inte hoo S2-bit holes: Left Plain Text @
ooh se A ee Fe meg en Plain ext: 4
_ |Sepo= 16 Rounds af Enoyption
+ LPT and RPT go theough —\6-punds: with a new”
4oaeey 4Bbit subkey each round. :
+ Treluder key mixing = eee and _perroutetions:
- Stepe3-Final_ Permutation (Fe)
* The too halves are combimed back into 64 bits,
then permuted again +o get the cipher textPlain Text (64 bits)
Tyitial Permutation
LeT RPT
Fiat Keep REY
Final Permutation
5 wounds
|
|
Cipher Text Cc4bits)
F $4 Key Trasformation
So Span sion Perroutation
SS) if $-Boy SubsW4tudion
P-Box Permutation
XOR and Soap
aaunds fallow the same_§ steps7 pebciton: 4
18 digital _signarture is like an_elecharle_fingerpeint shot
____yerifies_the_authentiogity , integrity and origin of a
digital _mes Toessage or atca wenn
Tt _penves who sent the message and ensures it wasn't
ii -ahered in -hronsit-
7 — ae
hea be ee a
3 sty _ a
Sates ‘repudl diation a { se
7 aig, eC as — it eee
1 Creation — _ zi
_+ Create ore message digest ig ox hash aqui.
par + Encrypt meSage digest wing the Private Key. 7
+ Send ene sreryp ted 0 as ant Ahe_plain tect 40.
the receiver: ees vee f
Le Calerilate he: mo. OBA m: the pee Alain etre
+ Decrypt the received "encrypted. digest nae “senders
Public Key. —
| + Compare. the “tua chigest 0 s- an oe
—{--. ——— SET
;
[Te both match — Message is authentic
|e rmaimateh > Message Noi been tampered ___7 Working “Diagrars s
Private Hashing |» Saal /
Key Function Not
fuoctio Algor thene|
Tasce a= Gen Gapeey ER ea
——-Step_2.=_Open the Alle _and enter message -to create
geet ee el eee aa
—__ Step 3 - Select Menu Digttal_signcrtute — Sign Ovcument.__
— Sep_4 = _Select_any Haul function and choo Private Key.
——Slep_5_= Entec PIN no._and Click on Sign _putton +o
generate digital signature.
A Péwortages,
= + Fast document signinag (creation) and pscesting globally.
+ Reduces courier _and_papac_handling cost:
+ Reduces TiSkS_ tke intercephon s tampering during
- trem transit
+ futheneticity Holds valid proot in legal_courts
a + Signer connot deny signing a docamend.