Академический Документы
Профессиональный Документы
Культура Документы
NETWORK SECURITY
Mathematically:
Y = EK(X) or Y = E(K, X)
X = DK(Y) or X = D(K, Y)
X = plaintext
Y = ciphertext
K = secret key
E = encryption algorithm
D = decryption algorithm
Both E and D are known to public
CONT…
Two requirements for secure use of symmetric
encryption:
a strong encryption algorithm
a secret key known only to sender / receiver
assume encryption algorithm is known
implies a secure channel to distribute key
A user can recover the original message only by
decrypting the cipher text using the secret key.
Depending upon the secret key used the
algorithm will produce a different output.
If the secret key changes the output of the
algorithm also changes.
MODEL OF CONVENTIONAL CRYPTOSYSTEM
CHARACTERISTICS OF CRYPTOGRAPHY
The type of operations used for transforming
plaintext to ciphertext.
The number of keys used.
CRYPTANALYSIS
The process of trying to break any cipher text
message to obtain the original plain text message
itself is called as cryptanalysis.
It is the breaking of codes.
Monoalphabetic cipher-
https://www.youtube.com/watch?v=Dz1RW_W2zGI
Polyalphabetic Cipher-
https://www.youtube.com/watch?v=FoUxUY8w3eU
Link:
https://www.youtube.com/watch?v=eKMmrDy3LCQ
STEGANOGRAPHY
Steganography is data hidden within
data. Steganography is an encryption
technique that can be used along with
cryptography as an extra-secure method in which
to protect data. Steganography techniques can
be applied to images, a video file or an audio file.
http://www.softpedia.com/get/Security/Encryptin
g/QuickStego.shtml