Encryption Algorithms: Encryption And Encryption Process

960 Words2 Pages

ENCYRPTION ALGORITHMS There are two kinds of encryption methods namely symmetric key encryption and asymmetric key encryption based on the key used for the encryption process.
3.1 Symmetric Key Encryption In the symmetric key encryption, same key is used for both encryption and decryption process. The sender and receiver must share the algorithm and the key. The key must be kept secret. Substitution and transposition ciphers are uses the symmetric key encryption technique [5].

3.2 Asymmetric Key Encryption Asymmetric key encryption is the approach, wherein one set of rules is used for encryption and decryption with a couple of keys, one for encryption and one for decryption. One secret key is public and second one is the private key. They also are called as the general public key encryption [5]. For example RSA etc.
. …show more content…

If the two letters seem within the same column within the square, then update every letter via the letter without delay below it inside the square. Otherwise, each plaintext letter in a pair is changed through the letter that lies in its personal row and the column occupied by way of the other plaintext letter.
3.3.1.5 Hill Cipher The Hill Cipher is a polygraphic substitution cipher using linear algebra. In the Hill cipher each letter corresponds to one unique number, from 0 to 25. Messages are divided into n-letter blocks. Encryption is performed by multiplication of all blocks by one n x n secret matrix, which contains also numbers from 0 to 25. All the results should be modulo 26. In the Decryption procedure one has to divide the cipher text into blocks and multiply them via the inverse of the key matrix modulo 26 [6]. The inverse of the key matrix is calculated as follows
K^(-1)=d^(-1) x adj (K) (3.3) 3.3.2 Transposition

More about Encryption Algorithms: Encryption And Encryption Process

Open Document