.

Friday, April 5, 2019

Overview of Cryptography and Encryption Techniques

Overview of Cryptography and Encryption TechniquesWhat is cryptographyCryptography is the discipline of cryptography and cryptanalysis and of their interaction. The word cryptography is derived from the Greek words Kryptos means concealed, and graphien means to inscribe. It is the science of keeping riddles unknown. One mark of cryptography is protecting a reclusive from adversaries. Professional cryptography protects non simply the plain textbook, solely also the make and more(prenominal)(prenominal) generally tries to protect the whole cryptosystem. Cryptographic primitives heap be assort into dickens classes lineed primitives and non-keyed primitives as in the figure. The fundamental and classical task of cryptography is to provide confidentiality by encoding methods. Encryption (also called enciphering) is the process of scrambling the contents of a message or file to make it ambiguous to from each one i not in possession of key key required to unscramble the file or message. Providing confidentiality is not the only objective of cryptography. Cryptography is also employ to provide solutions for opposite problems Data integrity, Authentication, Non-repudiation.Encryption methods can be divided into two categories substitution ciphers and transposition ciphers. In a substitution cipher the earn of plaintext argon replaced by other letters or by symbols or numbers. Replacing plaintext bit innovation with cipher text bit patterns is involved in substitution when plaintext is viewed as a sequence of bits. telephone exchange ciphers preserve the order of plaintext symbols but disguise them. Transposition ciphers, do not disguise the letters, instead they reorder them. This is achieved by playing some sort of permutation on the plaintext letters. There argon two eccentric of encoding bilateral(private/secert) encryption key and a harmonious(public) key encryption. ceremonious encryption modelA conventional encryption model can be illu strated as assigning Xp to represent the plaintext message to be transmitted by the originator. The parties involved select an encryption algorithmic rule stand for by E. the parties agree upon the secret key represented by K. the secret key is distributed in a tighten manner represented by SC. Conventional encryptions effectiveness rests on keeping the secret. Keeping the key secret rests in a large on key distribution methods. When E process Xp and K, Xc is derived. Xc represents the cipher text output, which will be decrypted by the recipient. Upon receipt of Xc, the recipient uses a decryption algorithm represented by D to process Xc and K back to Xp. This is represented in the figure. In conventional encryption, privateness of the encryption and decryption algorithm is not ask. In fact, the use of an established well known and tried algorithm is desirable over an obscure implementation. This brings us to the topic of key distribution. cryptographyCode devising involves t he creation of encryption products that provide protection of confidentiality. Defeating this protection by some mens other than the standard decryption process used by an intended recipient is involved in economy breaking. Five scenarios for which code breaking is used. They are selling cracking product and services, spying on opponents, ensure ragibility, pursuing the intellectual aspects of code breaking and testing whether ones codes are strong enough. Cryptanalysis is the process of attempting to identify either the plaintext Xp or the key K. discovery of the encryption is the most desired one as with its discovery all the subsequent messages can be deciphered. Therefore, the space of encryption key, and the volume of the computational work necessary provides for its length i.e. resistance to breakage. The protection get stronger when key size increases but this requires more brute force. Neither encryption scheme conventional encryption nor public key encryption is more res istant to cryptanalysis than the other.Cryptographic goalsHowever, there are other natural cryptographic problems to be resolved and they can be equally if not important depending on who is attacking you and what you are trying to secure against attackers. Privacy, authentication, integrity and non-repudiation are the cryptographic goals covered in this text.These three concepts form what is often referred to as the CIA tierce? The three notations represents the basic security objectives for both data and for information and computing services. FIPS PUB 199 provides a utilitarian characterization of these objectives in terms of requirements and the definition of a loss of security in each syndicateConfidentiality Preserving authorized restrictions on information access and disclosure, together with means for shielding personal secrecy and secure material. A damage of privacy is the illegal disclosure of information.Integrity Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. A loss of integrity is the unauthorized modification of information.Availability Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to an information system.Although the use of the CIA tried to regulate security objectives is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned areAuthenticity The property of beingness genuine and being able to be verified and trusted confidence in the validity of a transmission, a message, or message originator.Accountability The security goal that turn overs the requirement for actions of an entity to be traced uniquely to that entity. generally there are two types key present1 isobilateral-key2 Asymmetric-keySymmetric key encryptionThe universal proficiency for providing confidentiality for transmitted d ata is symmetric encryption. Symmetric encryption is also known as conventional encryption or single-key encryption was the only type of encryption in use precedent to the introduction of public-key encryption. Countless individuals and groups, from Julius Caesar to the German U-boat force to present-day diplomatic, military and commercial users, use symmetric encryption for secret communication. It remains by far the more widely used of the types of encryption. A symmetric encryption scheme has five ingredients as follows-Plaintext This is the original data or message that is fed into the algorithm as input.Encryption algorithm the encryption algorithm performs various transformations and substitutions on the plaintext.Secret key The secret key is input to the encryption algorithm. The exact transformations and substitutions performed by the algorithm depend on the key.Ciphertext This is the scrambled message produced as output. It depends on the plaintext and the secret key. For a given message, two dissentent keys will produce two different ciphertexts.Decryption algorithm This is reserve process of encryption algorithm. It takes the ciphertext and secret key and produces the original plaintext.Symmetric key encryption is shown in fig.There are two necessities for protected use of symmetric encryptionWe need a strong encryption algorithm.Sender and receiver must have secured obtained, keep secure, the secret key.Stream CiphersThe stream ciphers encrypt data by generating a key stream from the key and performing the encryption operation on the key stream with the plaintext data. The key stream can be any size that matches the size of the plaintext stream to be encrypted. The ith key stream digit only depends on the secret key and on the (i-1) previous plaintext digits. Then, the ith ciphertext digit is obtained by combining the ith plaintext digit with the ith key stream digit. One desirable property of a stream cipher is that the ciphertext be of the same length as the plaintext. Thus, a ciphertext output of 8 bits should be produced by encrypting each character, if 8-bit characters are being transmitted. infection capacity is wasted, if more than 8 bits are produced. However, stream ciphers are vulnerable to attack if the same key is used twice ormore.Block CiphersA block ciphers fragments the message into blocks of a predetermined size and performs the encryption function on each block with the key stream generated by cipher algorithm. Size of each block should be fixed, and leftover message fragments are padded to the appropriate block size. Block ciphers differ from stream ciphers in that they encrypted and decrypted information in fixed size blocks rather than encrypting and decrypting each letters or word individually. A block ciphers passes a block of data or plaintext through its algorithm to generate a block of ciphertext.Asymmetric Key CryptosystemsIn Asymmetric Key Cryptosystems two different keys are used a secret key a nd a public key. The secret key is kept covert by the proprietor and public key is openly known. The system is called asymmetric since the different keys are used for encryption and decryption, the public key and private key.If data is encrypted with a public key, it can be decrypted only by using the corresponding private key. Public Key Encryption shown in fig.Classical encryption techniquesThe technique enables us to illustrate the basic approaches to conventional encryption today. The two basic components of classical ciphers are transposition and substitution. Combination of both substitution and transposition is described in others systems.Substitution techniquesIn this technique letters of plaintext message are placed by symbols and numbers. If plaintext is in the form of a sequences of bits, then modify plaintext bit patterns with ciphertext bit patterns.Transposition techniquesTransposition instantly moves the position around within it but does not alter any of the bits i n the plaintext. If the military issueant ciphertext is then put through more transpositions, the end result has increasing security.

No comments:

Post a Comment