0 ratings0% found this document useful (0 votes) 86 views25 pagesNIS 3.cryptography
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
\ Nis
B. Cr ygpogta ph 14 marks
¥ Plaintert :-
The Plaintext is also known as clear teat
mean anyone Who knawsthe language @n Casily
Yead +he message. :
— The original message is Knoen as plaintert.
* Ciphertexnt =
cohen the Bainter is Gdified withthe helpof
ond suitable Scheme then the yesuhant message
is known as ciphertext.
— The Coded message js known aS Cipherter+.
* CY pogtaphy [coded Forrnot)
- ery pte Ya phy is most important Shen Cron?
over any “un-Husted medium; i+ Includes nan
ni particular ig the internet.
— Cig prography. not ong protects data From, alter
-ation , pu i+ Can ol he used for authentication
of user.
ae Cryptogra Unreada
message ~ phic — by messae
Ss, y Stee
Figr Cryptographic Systeny
@ scanned with OKEN Scanner“Appin of Crypto raphy. In [coded Format |
0 Cae Hiding '- the original use oF Cry Pog raphy
isto hide Sorpething that has been coritHen,
2) Digitally Code Cy pte raphy Can alse
Can be applied to Slw, graphics ar voice that is
it Can be applied to angthing that con be digitalh
Coded . d
3) Elechonic payment:- ahen alecronic Payrnents
are Sent through a nlw, the biggest visk is Hot
the pa crent rnessage iM alter or bogus
message introduced & the risk that Someone
yeads the messages may be minor Significance.
EJ message Authentication = one Gannat entirel
prevent Someone Fron tampering @ith the nle £
the message but if this happens 17 Can
charg
Certainig be detected. this process of Che Ching the
inteyrity ofthe dransmitted message is often
e authentiGabon. The most yecent £
Called © messag
useful development in the uses 0
the digital Signature.
CT prano\; SiS tr [ origine\ Format)
e crgPlog raphy is
4o break any Cipherteut
yi : é
— the process orn the original messoge vasele
mess as crgpranalyss:
: ecoding message Yom a
; d
\ sechnique of able forrrat
ois ie ck pe fead °
gable format re Converted into
an) tot Knataing Noe Heeg B veadable forrrat:
@ scanned with OKEN Scannerswans) epee] Tie rner [ Ciphertent
fgr Encygption a decrgphan
¥ substitution And TWersposition Technique ;~
el Technique
er aways by which printed
esa9 can be Gnverted wid ciprestes meSsage.
we jubion and ctrangposiion TEChnave.
ipher 3
3, Caesat's SE
pown a
ual) now ©
) substi
' iS
esas Cipherv Fr
5h is alse F Boe neypton techolaue
vey empe cind
_ were Yener OF
@ scanned with OKEN Scannerlh Sane. Fyed na. of positions fine
he alphabeds ‘
Cor Cay AShifd OF A. Here & NM Cold he
replaced by Db, B Could he Lepltced
by €, ard So on,
VhIs roetbad is inverded be Julius Caesar
WS
who used ilo Comsrnn cold
the name caesat's Cipher.
genewals hence.
_ the Wansformation Can be. Te prese ie
the position OF two alphabets. 1 be, Cipher al phates
bul the plain abphabe 4 solated left fe,
eof 4 arronginy
is pothing
oF tighs b4 same no-OF Positions.
eg A Caesor Cipher ed a (eth rotation)
ye: Shift =3
of three Places
; ‘ o12 345 673 8 lo NB IS
Rein ABC pEFGHTIKLEM|N
g 19 2 2122 23 24257
€ s 6 I? |
jas ) + UN x Ye
oPpa@ RS
es)
«esky m S
Om” 2) plaiseAB co EFOHTIE eee
Cipher’ DEF GATT K LMN 0 PERS TOV W x¥2ABC
*) plainter® © Come HANE “TOIMORRow "
‘)
H KRPH wRe RUURZ"
8
. - RPI
ciph® nent F
@ scanned with OKEN Scanner€} @)
glainiers © “the quick, brown Foy jumps overthe
Cipherress laces 3g "
WWEH TXLEN EUR2@ ERA MHxPSV wkH 6OCB
GR"
ey 6)
plainer”
cipheriert = "Free \RPN we
“ Come Home Ta(No RROW"
pRuuRe”
—To encyph O message Sirmply look Up each leHer
of 442 He SSa in the “Pplain® line and ae
own The corres pordirgy \etter in the “Cipher
\ine- To geciprer 40° the yenere.
The ence phon Con also be ves
Sense givgk 4¥ans
eS wat sn according 7 the Scheme
iG on of 4 lee
athe nnatsca Ws
2 os. encry Ph
he desceuped
J 26
as go 2 ™ =
sg perfored sheng SONATE
@ scanned with OKEN Scannertrerli Pied Caesar's Cipher
Yn Vhs yesien an alprabe\ '®\' can be ree
Wy ora, o\het alphabe} in \he english alphabet
cer pe. B10 2 soos each alphabet in
SMing we yeve 25 posibidines of veplacereent:
~ fy adtacl on A Ciphortent message ‘ahercin
Ane aliacker atempls 0 use all Possible
priviations and CGninations 1S RreeN asa
piuie- Forcee a\lack-
A. Trarspositiaa Techniaue -
————o
Transpasthon yechnique clees nok Teplace
a\pnatbers fram plaintest arth other wheres
iy per forms some pecmuration of alphabets
of plainiest-
) simple ColurnoY Trane position -
ssan “Khe, He SSE is
t Jura rare postion
pn 0 yous oF ered length and thers
: ¥
ee “pak agai? cclurnn by, Glurnn Lthe Aumns
th SOTNE scrambled order, Both
are chee? (o pocrosttertion OF
ethe ors
he iene iv are usually defined by a
eyo!
C4 ye etd ee aRAs is oF Jensth6 (so the
yous are oF Vent 6) aP8 the. ‘Porrrtatehen 1S
defined By the. alprabe ical ardes of leHers
inthe key vod:
@ scanned with OKEN ScannerInths (ase the oder cwuld he 632 440"
ercome HamME with key =
zeEBRAS Clengtats.6)
My 6 Glumns because
plaintest = Wi
_ Consider the Yectangle wy
the \ergsh oF key is 6
ye S8849% pn YE chang in VOLS “hy - vote
_ write Ahe
yranner:
oer oF
*b calth some Tandor®
C4 61257
noe ¥ ead
2 ciphertext 5 “ Cpamwe € HoeLo"
pointes = Comme Home
with keg 26
i hal
AS | th of Ke iS6 we ry
on d uti plaintext ye SSO9e in
S. to
6 Coun wo rex
cours Te A
Car) C3 Cae eS |
Th
rerpnner To ynarrow
le should be oF
Cat
é | 6
@ scanned with OKEN ScannerNO Yead the text
oF Colurnn 1)
. (1 Yahok
order like C4, 6/112.873) n
Gj u
ipheytexnt = “ EOWOOCMRAER YpmTa"
Algorthrn ie
‘DY orite the Pointert message Tow by 70%
ina yecrangle of @ pre-defined Size
az) Read wes $ AGE Column - he Coluran . However i+
can be ane cader \ike 23 eFC.
3\ The message +pus obtained isthe Cipher
ee MESSAGE:
* seqe. regret ~procenere *-
4 proces
ag a technique oFh
eq message within an
praction oF it OF sd
idi ne large
ordinary
eshination,
_ SA aon graphs, AakeS cryproy7P acsep Farther
Fig an ening ple mre SSa3e Jeg that re ene
yt exists.
tn modern digital %
Encry pha A
apres ust
encrgnel °F insertes § Cover med
gdded incre?
Suspects
anes rae data iS
\gout ™.
ia C TPES trr09e8)
edia
@ scanned with OKEN ScannerCover medi ;
[ Gover masta } +]uidenrcleta } + (stepe-Key)
— Covers media isthe file “Bee
the hidden ~clata which mg aa eee
using Ste go- key oqhe vestitant File is: ’
Sego -mediam . Quer - media can be image
or audio File
— pSadvanta is ik Yeduires alotaf Overhead
to hide a Few bits oF info.
_ pyienative is fivsh encrypt the message & then
hide using. creganogrPry-
Ly Peaminorgyres used in Segarogrophy
') Cover —reediun + cata within enich a message
\sto be hidden
2) sheqo — medium 1 pata Within which @ message
has been aa ne pidden iinin
1. pata ‘that is or ©! A
8) message “vege nO diana or cover mein Yespec
4) pedusiaon Bis !- pris of daia in Cver _rediua
modi Fied without Cory promis
that mediums ipregeity.
@ scanned with OKEN ScannerSgmmetic And Psyrmme AvIC
cypegrery
Cy plegia phic algorithms cre rerthing but the
SQqUENC Of Praressey cr iules Which Gre Used
to encede Ldecde message ina Cuyployorhic
Sj.
Types
Cryptographic Aljorithoy
a) symnebic Alapsitian
b) asymmenic Alpprithn
ly Sgrome tiie enc: pion
key is uSed
Summedric algpiihr +hese sare
Lov = oer & en Pon . Hence Anis }s se known
as woe key or secrete key % key algorithm,
this key haste keept secret , Sendewt ca
oO"
read encigets dat
aa a ig some ey a Sender a vecciver & MMe
“ ugh agree On? ki
ee
he sender § vecelyer ve Tous NOE
Can becorne
ae Gfrend gore a ‘ree aus secret Key
@ scanned with OKEN ScannerEncryption algorittens
SSS
Brock Stream
Cipher cipher
a ’ .
H) Block Cipher i A beck cipher encoyPis sabi
Packs of data vith A Gmeler ene Mon Function
Es woe -Hhese Ciphers Aolally. dedends onthe
eSigN OF The ene Yon Fan Cian? A BIOS. cipher
nary ers WOcKS patnging AO the Carne Aocuwent ol
umdes Xe sare Key:
8) Strearn Cipher '~ TA encryeis Smalles pices of
ead) CipVer
Do
i AA
Painters doo, usucl PASEO carts Crect
: raera cantinusys J
Boinied a Ciprens & ands oy)
ENCryPrs tHe vay of These
curity oO
7 Son be wredeey enrenty Gereretor
sender receiver
>
\p
ty ~ secret key shored
secret I oe cm Sender ond ye cave
| poesyrion [5
= encryption | +? | plopiith
Age! : fainter
message
poinres*
essay Figy ey enrerts® Erergpion
@ scanned with OKEN ScannerData Ency yption Slardord CDES) +
— DES was develped inthe {dtos as a US-Jave
armen Sjardavd for pete cring non-c\assiFied
inks.
= DES erewyph 64 bit Clear tert blacks Under the
Grr of “56 bit keys. Each Key ts exended BY
Parity bye to give 4 Ga bid eerking key
Gigi Block diagram 40 DES
— pes based an Awe Fundomertal ahiwibuies of Cyplege
caphy. — +) Substitution iW) Trans position
— pes Gapsist oF 16 SHePS each af ehich is alled as 4
of substitution Ltvanteta
C-Hhe Charmclers.
staan
cach ound pecerms +he Steps OF
~ eStKen Yednrique for Scrambling ©
* Steps i> -
» eq bid plainiert block is handed over to an Inia
per martation Crp) Function
4) Trifi\ per muration is parformed on plaintent
@ scanned with OKEN Scannerpaint ar
Coa bits)
.
Tr jal Ot
|’ nivale
t cin)
key => ae
Figs Steps fn DES
sp produce +wo levels ak Perm
tert planters Creer.
#) Right planters RPT)
a 6
4) Gach LPT RPT O°SS, Yhrcug A !
) pieces. each A vs auin KEY
S) inthe erd LPT 2 RPT are vajoined ginal Perenete
on CFP) is perorrned onthe Cornbined pleck.
The result is 64 Dit cipherterd
Ly Inisial Perrnutertinn (2°) happens only once. 1p TePlaces
Aho Eins bit OF original printer! block. wlth SS th bi) of
origina) Pinter block, second bi} wilh The cath by f SoM,
— Complete Nanspositien Aable- js used bo Ip Shalt Vead
from Jer+ to tight.
ated plac k
Fourds OF e ncayerion
@ scanned with OKEN Scanner\ ~ Prtec 3p is dore the resuty . .
1 IpkD Awe Fath bioc eee lock. is divi
- Gis a2 bes CLpTe RED
- &
_ enh Rounds ave, per fosrred on these AWwo blocks.
bio Rornds-are-- Consist
24
S- Box gubstituten
by
x-oR LSwop
Fig: Rounds 1 DES
is available Fr
D kes eansfourgasion ?- A 56 bis Key 3
EVery scand,
cd uring Gren yaurd a separate 88 pit SUb -keyis genesied
cron “sé bit KG using Aransteimraton process.
- this is s siple huiding, &6 FEY snp 2 nalher of
26 oe coe Seok Kyecore Clary apitied by SM
ons, depending upon ‘sound,
or xwe pos
- Tot C8 pound 21,219 ord shft=4-
remaining Ane shrift iS ofz position.
0) Expansion? perros? oa ;
parting his prase The pprisenraee From) 32 bis
Av &8 48 bis:
© scanned with OKEN =~ Then | ;
oe a2 bit RPT is divided inte & differen’
S and Cach block Consisting of 4 bits
dYiginal RAE P
laine + (ppt) oF 22 bis /
Block Block 2 Block 8
C4 bids) Cpabits) C4 bits)
Fig:- expansion Permutation.
ert each 4-be Block of yewious Step is ©* ded 40.
eC 4ep pa
Cots espansing e bit block 1-@ per ¢ bit block prrere
pits are OO eB reco) pits are aetiallg He 1e pe
First ond fourth bits OF abe 4 bit plock- pal
-— this process results ite enpem gellas Porm jor
ot ire inpurs Bis: cine Creag +e output -
, g bit epté gesulliag output
_ ag bits keg ys xoRed cath ©
is giv? ao peat SHEP:
5) sox Se
he. +8 bit input bsorthe %R
— This process ac ePi Ley ard expanded a
al ;
Lahn inne! Oo our sing upside we ehnrg Ye
ated
& oduces ve
tut 9
be cupstitution 1 pectorre! g sepsituten
‘ it ye ou C
and jt has 6 bit inp ‘ \ : - je beck
bit D ig div! i
ee rip each SP is Gornbired to For a2 bit
ou ”
pe ack eg yo net gaye
@ scanned with OKEN Scanner48 bit input block
6 bit Subbloo
Figi- S~ Box Substitution
©) P-bax Permutation =
_ the 32 bit outpurs at perrrutored using Ct P-Boy
— This invalyes imple permutation
fer eg'= 1.6 in Ye Diack jpaicates that the. pit ad postion
46 of The asighral INP ayes toa bit ot positon
4 jp output
3) xen _ord SUSE -
Leer pale P. on of the yppial 6& bit ent block iS yoked
wlth + produced by -BO% permutation .
result iS wp the ne? night pale be: RPT
_ the od Rept peornes eto left nalé in process of
swappirg
ig per forrned ony ante, aktheend
~ Final permutation
of 16 Rounds
The ouapuy of Fina\ perro
ecceyption block.
yaton isthe 6 bit
@ scanned with OKEN Scannera a
Viginal 64 bit Plaintest block]
e LG
[32 bis Let block] [22 bis PPT Bock]
S2bt LPT block
(Resi Round
Fig:- KOR and Swap
ae Asyrmmeni< keg cry pregrorha -
—_—
Asymmewvic encry pion y¢.a form of encary pen
aire, eat ON key encygps
keys core in P
whe Ye Sher con decngPh
Je. in the Sense
Frequently Ape. keys ave interchangap
that Te Key ACD prs @ message tren B an
dectypy eee a key 8 enuryprs o rye ssaje trenkeyA
Can decrypt a4. nile Comer” Apis prepestg isNer
\ KO
essential ASSYATOAAE entaypton.
__psyminestic encrypren is also knevn OS pubye Kt,
Cayprog erry since Uses AYN oe 0 mHArENYy
Key pow £ marke ane public WM! ieeping the
other geet.
@ scanned with OKEN ScannerUsers Can "Si
renee Sign’ messoge by entry pins them orth
' Faas Feys. TRS IS effective sinte ane
ynessage Necipent yecipienh Can verify Aped re
users pubic Key con decrypt She ime teage £ Thus
wwe trad JRE USES “Secer Key cas ysedto
enetyp it.
— 1 the user's secret
yA Fallows Hhat Ane Users 2 pok Some. ieMpestor
Teaily seny He message.
key IS in Fact SEACH hep
receives ; pecaver
a key ' paiva
5 Ena ' a
as : >|
plaintest \ Plaintest
message \ message
2 sender stg Receiver. >
Rigi psymrnesvic cagprogeor hy
by ere
ers Can send SEIT message “4, .
ereypang a. message Own He AeipientS pubic °y
apis Case on\ age inrended qecipient Candecry pA the
3 ec aos a Anat soe Should haveaccess to
ny
Ape veauired secre key.
_ the teey 0 success Fal use.
ak managenreny syslemn which Implements a public
teey a ngyasnucers - cowpact this iris cligercalt AO esebih
Go yeuatiling oF PIC vers, ar ever to Conver! s>
4 Cind ‘Kinavie ayes:
of Asymmedvic enctyption
@ scanned with OKEN ScannerPhe main advon\a ¢
. . ge. 0 asyrnmmedsie City PHOT TY
is We secarity of akey fe] POT 0
) Digital Signature =
-—A cigs aignalure \s an elechanic
cale the. identite a.
Ape
s igneture.
— qyis used to authenti
sender oy Abe Signer ©
= ay has aaliya 1° ensure hat the 0 igina Gnienk
of the message or docmnent hol has Ween Sent
‘Ss unchonged.
Hy cing Icinel oF
pigital signatures AC used wi
can be.
rnessagye and easil ayyanspariable-
auctonrenticall, Mme Slamped.
~ rh a message
means hot Ape. Serer CONN
lover »
— A digtal sig
praintest message
yed ee the \dentity
eceived is OW
with digital signature arsed
or 2aSily repudiate i+
nature Can be used eaithency pred or
so that the yecer ver Gn be
ersu oe the sendeg and the
message ¥ ginal or tampered .
p digital ceorhficare koniains the digital signature
of the Corhi cate issuing acethorG Ce) HEA
pente anyone @n verify sat the Cer h hice
is veoh oF fake
egsyal Oi based eipan bath ashing
yal aignarres axe ba
8 ons “¢ a mrHerw Cc cayprog raph Both
ancy ener Arods Pad an tporiant we
qe pen signin “digital documon’ -
@ scanned with OKEN ScannerDal essare
Fig: Aloc
signing
Hash
using
sendess
private key
we
Yash r. Venere
Ainstn- | 5 [ye ih
Es ; ———
Fasrdtion frorioot roi]
Energy hesh |
sepleris
privies Yer
acid
>, Sigpe
Message
digest
Is Diagy ann af ygital signakiye .
verification
pigiially signed data
Signartuye.
Da\q
Ho'sh ;
Functor}
Q
pecryp}
Using
Senden S
pubyic
Key
rp
ponoolis)e)
Mash
Hash
If the hashes are equal
She Signatere FS Valid
vA igned
Dignalys he
Rig Creation an
9 Verification of Dgital
sigre\ure-
@ scanned with OKEN Scanneraa oF Mach
message digest is generar using
Fandion Caygpaithn)
)p message dige is
Patuerie. kee) Sthe resulting Cnc"
dioest js Knaton a8 digital signe lure .
signature ig cached coirth dhe date Ww
enciy? cd using seadons
Ned tre ore.
190.
3) Digital
Message. “and Sends WWilo tne Veceiver,
pi receivers erel i-
————
kex
5 Recelver Uses genders Public qe ger
Aigita’ gignesture fo oblain mess? digest
genecvted by sender
useS SAME roe SSage digesrolpeitoro
ed by serter 40 gererate. a nec
Cot yecever)
Comp Pare AHeSe
2d receiver
which 7S us
wness TBE digest
Noe , v ;
nessa aigests ye SO
& ener HES SAYE digest - om
i. re
ssage digest axe Qual then the Signa
ise
ge digest
a $F me
Perel Sonia,
oom Adv ania Na
HCatON .
+) Ruther veheugh messages TO often Tnelade.
ahd message thet info. ey
sending. a
ita eignatures
OF messages -
abuttpe ens
ge accarate. Oe “Can be usedta
aurhenbce the Source
into.
ber
@ scanned with OKEN Scannerene
Entegny4 [7 3p many Scenarios the Srey ¢
yeceiucy of a message May heve anced Foy
ConGiderce that ‘the. message, has ror been aresed
uring franc mission. p\Vtrough encit Plon hides the
Contents af ameasage ih may be possible. 40 change.
an enevy pred message tol dhout
4+ Disadvoniages:-
1) Non- epudiation :-
Ina cry ptogreph
refers 1 ong at oF dis claiming yespon
ress ge:
under Slorctng i4
ic Context the werd 1 qudiaten
sbilitg ford
ectpient ™4 ynaist he Sessler attach
} later sepudiaden mere
\ esSa "
dhe siqned 1 ee oes ae rity
Goin as%0 HS
symmersic k €
cy progr ooh
isused For
and decry
5 Tio SEPpora”
Single *k are used Got ncreypyen|
ana decryption
encry eh
Sane | on a6 publi & 4
: wry AS Single no! .
® pise Kerel a pave ke!
4 q encyyrnen
No need-to are
on keYS.
ee
Tove, SeCinty
@ scanned with OKEN Scanner&) simple te implement [| Hed to implement
=) as Compare to Syrewr
etic key ype
—apl
eqs- Pao Encryption | Fer EG! 5 a:
oO standosd cies) Pama
i
@ scanned with OKEN Scanner