ENCYRPTION ALGORITHMS There are two kinds of encryption methods namely symmetric key encryption and asymmetric key encryption based on the key used for the encryption process.
3.1 Symmetric Key Encryption In the symmetric key encryption, same key is used for both encryption and decryption process. The sender and receiver must share the algorithm and the key. The key must be kept secret. Substitution and transposition ciphers are uses the symmetric key encryption technique [5].
3.2 Asymmetric Key Encryption Asymmetric key encryption is the approach, wherein one set of rules is used for encryption and decryption with a couple of keys, one for encryption and one for decryption. One secret key is public and second one is the private key. They also are called as the general public key encryption [5]. For example RSA etc.
.
…show more content…
If the two letters seem within the same column within the square, then update every letter via the letter without delay below it inside the square. Otherwise, each plaintext letter in a pair is changed through the letter that lies in its personal row and the column occupied by way of the other plaintext letter.
3.3.1.5 Hill Cipher The Hill Cipher is a polygraphic substitution cipher using linear algebra. In the Hill cipher each letter corresponds to one unique number, from 0 to 25. Messages are divided into n-letter blocks. Encryption is performed by multiplication of all blocks by one n x n secret matrix, which contains also numbers from 0 to 25. All the results should be modulo 26. In the Decryption procedure one has to divide the cipher text into blocks and multiply them via the inverse of the key matrix modulo 26 [6]. The inverse of the key matrix is calculated as follows
K^(-1)=d^(-1) x adj (K) (3.3) 3.3.2 Transposition
Pretty Good Privacy, known as the PGP, is a popular program for encryption and decryption of data, providing security services for electronic mail messages and data files.
Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption
Polyalphabetic substitution ciphers were developed during the Renaissance period in Europe and were the dominant type of encrypting for confidential messages during both World Wars. The Second World War was one that was considered especially technological. Cryptography was very important and whoever would break the other side’s code would have an enormous advantage in the war. In the end, the British with the help of Alan Turing broke the German code “Enigma” and the Americans broke the Japanese code “Purple.”
..., Nicholas G. 2010. “Past, Present, and Future Methods of Cryptography and Data Encryption.” Department of Electrical and Computer Engineering
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
RSA encryption is the foundation of public key cryptography security products. For example, credit card companies use the RSA algorithm for customers’ individual online WebPages. The credit card companies publish a big number on WebPages, which is made by big prime numbers using the RSA algorithm. Since neither computers nor people can factor such big numbers, the RSA encryption system has secured many customers’ information.
By using my project one data file is converted into multimedia file of image video and audio file by cryptography and steganography. This is the most valid point in my project to accomplish the best results and this is my contribution to the field. The data of my system is collecting from different standards of cryptanalysis and used to validation of my project.
Encryption refers to the translation of data into secret serial characters. It is the most successful medium to achieve security of data. To access an encrypted file or data, a user must have the secret key or password to allow the entry to the data for decryption. Encrypted data is called cipher text whereas an unencrypted data is referred to as plain text.
Cipher is used in cryptography for the algorithm purposes. The algorithms include the encryption and the decryption which includes of well defined series of steps that can be followed as a procedure. But sometimes we get the word cipher in a non technical usage which means a code. But this was distinguished from codes when it came to the classical cryptography. To put this information clear, they were used to operate the substitution depending on a large code book that linked characters or figures to a word or phrase. For instance, the code UQJHSE could mean the same as the sentence “Proceed to the following coordinates.” But when it came to cipher, the UQJHSE could mean a plaintext or any other information that a sender would wish to transmit to a receiver (Gershaw, 1989). That was according to cipher, while when it comes to the encrypted form it was known as the ciphertext which had all the information concerning any of the plaintext but was unreadable mostly to the human or any computer without any mechanism to decrypt it. In any operation of the cipher, there must be a key which is always a piece of the auxiliary information. On the other way it can also be termed as a cryptovariable.
A Public Key Infrastructure is not a single device or entity; it is a compilation of technology, infrastructure, and practices that enables large scale use of public key cryptography to provide authenticity, confidentiality, integrity, and non-repudiation services (CITE). The word cryptography is derived from the Greek word “kryptos”(CITE), which means hidden. It is the technique in which a cryptographic algorithm is used to take the original plaintext information and then make it unreadable to everyone except for those it was initially intended for by scrambling it into ciphertext. This is known as encryption, and the process that unscrambles the message to make it readable again is called decryption. The National Security Agency (NSA) even defines cryptography as the science and art of making codes and ciphers(CITE NSA 2009). In cryptography, a key or code is used to scramble the message which results in a cipher.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
...enerated on look up of the message is called as private key. The other key which can be used for any sort of message as nothing in general is called as public Key. The private key is used to encrypt the messages personally and will not be seen or shared by any other user. Whereas the public key is used again for the same reason as of encryption but is hidden from others except our self. The encryption of the data by a public key can be also decrypted by the private key.
In this example the AES 256 bit cipher is used but you can use other
Encryption: The sender is converting the actual message into points like (xi,yi) by passing the original message using the algorithm given in Fig 1. In Step 4, M is constructed by using the formula.
Cryptography is the use of codes and ciphers to protect secrets and has been around for centuries. It has its beginnings in ancient Egypt and has played a role in every part of history to its current role in protecting communications across today’s computer networks.