0% found this document useful (0 votes)
4 views

NIS UNIT-3

The document covers various cryptographic techniques including substitution and transposition methods, with a focus on the Caesar cipher and Data Encryption Standard (DES). It explains the concepts of encryption and decryption, as well as steganography for hiding messages. Additionally, it discusses digital signatures and their importance in verifying message authenticity and integrity.

Uploaded by

Sakshi Kale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
4 views

NIS UNIT-3

The document covers various cryptographic techniques including substitution and transposition methods, with a focus on the Caesar cipher and Data Encryption Standard (DES). It explains the concepts of encryption and decryption, as well as steganography for hiding messages. Additionally, it discusses digital signatures and their importance in verifying message authenticity and integrity.

Uploaded by

Sakshi Kale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
se Cryptography 4 RK | ' 3:1 Tnteduction to Ceyptagraphy Terns 3-2» Substitution Aechnique = Caesar's Cipler [ModiFied — + Transposition Spa Siraple Columnar ar Trans pation B3 Steganogmphy — c = 3:4 Difference — Symmenic k. Baymmesic Cryplogeuety | aos -3:5__DES (Data Eoryption Standard) &¢__Digital See a ISM = Plain text also Known 94 cleartext mean )_anyane _____ Who _ee_Knows the language —con_easily read the mestage. i = The original ee Known as _Plain text _ ae B- ee fiers tgs cane opi Ha, =_Tt_\s_o_scrmmbled_version of plein text. a ~The coded weet mestage {3 knoan as. Ciplecterd Bei. cepa. i. =| Cryptography. icula ilnincl niawantla nr Aelereeme Oe uniting In secret message. os = ~ Tt keeps data sae during transfer. eee i _| Readable Gryplography Unseodable | eee a lemenage System Message ee BE iv. Cryptonalyis (REE geauaal ~The pmcess_of shying to__break aoa Cipher text Imessage to _obtalo~ the original message itself iS known ag epee {Sse : fracas | Readable = oe Message ne = oe ne . es GS ng — yee me apes ak Saag Cryptology f io eel This. “the art _ond science of Aransforming ceadable message 4z jwto Unreadable | sae and unreadable _ ( | | ~ Eneryptio is she pce of changing plin text in & cipher text ~Tt hides the real _ message Bra others. vii Deeryption So eee 4 = Decryption Ls the pmcest of changing cipher text int plain text TE # Cocsar Cipher Technique = Caesar clpher_technique *s_proposed by Julls Caesar T+ _is_one_of the farliert and simplest method of oe a Te 1s gle called ay _shift_ cipher / additi =£och letter in the spill aegh=1s ete alga tla a —_—_——_letlerr corresponding to a no-_of shifts in the Z alphabet ain pap ii = A_key _is_paovi else ejas serine it Oe ake the lettess ore chitled ( placa > forexample. _ =x aethe o shift OF vies io E> convert ComPUTER ENGINEERING” Plain eet -_ ___cipher text. - Aeon a nue GEEEIEFEREGEREE [elelr[s Fru cipher text [OTe [e [oly [a [se [e[m[n[o |p [o [s[t fol v iw [x vf KY |Z Y[z[a[e [cl Ploin Text - COMPUTER ENGINEERING Cipher Text — FRPSYWHU HOTLOHHULGT i Beto ~Read o& again column by _coluron accorelimes to a SEE ee eee _____eg:= Plaindext= "ALL Is WELL For Your Exava" _ Heya (nlo- of colurons). | pa ee ea eee 4 A es ce le 0 mS | Rearrange the _ positions | of charucters without “HELLO” —>"LHOFL” Seana a ore = pieeusinn. [Uses a pattern or sequence _ for rearrangement = Stegauncely ic abe ack oud alenc? of hiding messages 2p that only -the sender and intended __= Tt is used +p keep message so and hidden from ____hackers or otinckers. = Th wadern steganography _, data is. usually screed pT icst then erabedded into Giles , special algorithms, ler like JPEGs using — 1 Diagravs: Steqo~Koy Cover-Tmage mbedld: a) | Covermedia + Hidden eee stegp- Key > Stego medium Sea “is the Pile +e in einen eee the — doctors, uahich —anexy _Stego-key ~ The resul | earn ws + Hid _+ Putting copystght marks + Sendi len i I). Bdvontages ut Nou can hide secret mestages inside (mages or { othec wy files So no one even Know + Hidden restages * are harck to notice. no one dou it (Cover Media). | + Looks normal , {+4 ee inside a photo ate ) inside phsto and videos: + Hiding sensiive data in plain sight | also be encrypted using —_ tant Cle is _stego-mediun: tio __in_songs of movieo \ts there. u : L + Can hide only small ormount of dota » Expert hackers using Steqanalysis tools nay find hidden — deta + Specta\_soPtoare needed for hiding ond. extracting data Tip = Write Definitoo and diagrawn. with worl or Write Definition and advantages [discad vein tages for _Shoct note (both, will got noarks) Gmaris) 20a per trade) angwer 9 AOR 1G you want weile everything fe secaring — L 2-| Also knodn as Single key Known os Public _and Private 4 Teryprography key encryption: B-| Less Secuwity More Security 4-| Key sehould be agreed by No need +o agree on keys i botlh- sender and receiver. -| Simple to _iroplennent ord toi ot 0) compared - 6 | Gyr Data Eneryption Standard | Eq: Oigta\ Signoture 2) Mea oF fe g ao SRS [EET aaa 7 Qobinition : =e *Data Encryption Standard (pes) is a syrametyic block cipher. __ 4 «Tt a 64-bit plointert 4064 blebit cipher tert Wing oO bua bit ey + Out of Gh-bit key, 5b bis pre used ed for encryption, - stiaell reserved for erme detection. | ahile ZB bits oe res Aas —____ Step 1- Tnitial_Perroutation (re) sie eases te All The th-bit plaintext is rears using a fixed _patiern the split inte hoo S2-bit holes: Left Plain Text @ ooh se A ee Fe meg en Plain ext: 4 _ |Sepo= 16 Rounds af Enoyption + LPT and RPT go theough —\6-punds: with a new” 4oaeey 4Bbit subkey each round. : + Treluder key mixing = eee and _perroutetions: - Stepe3-Final_ Permutation (Fe) * The too halves are combimed back into 64 bits, then permuted again +o get the cipher text Plain Text (64 bits) Tyitial Permutation LeT RPT Fiat Keep REY Final Permutation 5 wounds | | Cipher Text Cc4bits) F $4 Key Trasformation So Span sion Perroutation SS) if $-Boy SubsW4tudion P-Box Permutation XOR and Soap aaunds fallow the same_§ steps 7 pebciton: 4 18 digital _signarture is like an_elecharle_fingerpeint shot ____yerifies_the_authentiogity , integrity and origin of a digital _mes Toessage or atca wenn Tt _penves who sent the message and ensures it wasn't ii -ahered in -hronsit- 7 — ae hea be ee a 3 sty _ a Sates ‘repudl diation a { se 7 aig, eC as — it eee 1 Creation — _ zi _+ Create ore message digest ig ox hash aqui. par + Encrypt meSage digest wing the Private Key. 7 + Send ene sreryp ted 0 as ant Ahe_plain tect 40. the receiver: ees vee f Le Calerilate he: mo. OBA m: the pee Alain etre + Decrypt the received "encrypted. digest nae “senders Public Key. — | + Compare. the “tua chigest 0 s- an oe —{--. ——— SET ; [Te both match — Message is authentic |e rmaimateh > Message Noi been tampered ___ 7 Working “Diagrars s Private Hashing |» Saal / Key Function Not fuoctio Algor thene| Tasce a= Gen Gapeey ER ea ——-Step_2.=_Open the Alle _and enter message -to create geet ee el eee aa —__ Step 3 - Select Menu Digttal_signcrtute — Sign Ovcument.__ — Sep_4 = _Select_any Haul function and choo Private Key. ——Slep_5_= Entec PIN no._and Click on Sign _putton +o generate digital signature. A Péwortages, = + Fast document signinag (creation) and pscesting globally. + Reduces courier _and_papac_handling cost: + Reduces TiSkS_ tke intercephon s tampering during - trem transit + futheneticity Holds valid proot in legal_courts a + Signer connot deny signing a docamend.

You might also like