Preview

Cryptography: Applications and Uses

Powerful Essays
Open Document
Open Document
1364 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptography: Applications and Uses
Chapter 5: Cryptography
Objectives:
- Applications and uses of cryptography
- Encryption methodologies
- Cryptanalysis
- Management of Cryptography
- Key Management
Application and uses of Cryptography

What is Cryptography? Cryptography is the science of hiding information in plain sight, in order to conceal it from unauthorized parties.
- Substitution cipher first used by Caesar for battlefield communications

Encryption Terms and Operations
• Plaintext – an original message
• Ciphertext – an encrypted message
• Encryption – the process of transforming plaintext into ciphertext (also encipher)
• Decryption – the process of transforming ciphertext into plaintext (also decipher)
• Encryption key – the text value required to encrypt and decrypt data
Encryption Methodologies

• Substitution Cipher
– Plaintext characters are substituted to form ciphertext
• Transposition Cipher
– Plaintext messages are transposed into ciphertext
– Subject to frequency analysis attack • Monoalphabetic Cipher
– One alphabetic character is substituted or another
– Subject to frequency analysis attack • Polyalphabetic Cipher
– Two or more substitution alphabets
– Not subject to frequency attack
• Running-key Cipher
– Plaintext letters converted to numeric (A=0, B=1, etc.)
– Plaintext values “added” to key values giving ciphertext
– Modulo arithmetic is used to keep results in range 0-26

• One-time Pad
– Works like running key cipher, except that key is length of plaintext, and is used only once
– Highly resistant to cryptanalysis

Types of Encryption
• Block cipher
– Encrypts blocks of data, often 128 bits
• Stream cipher
– Operates on a continuous stream of data

Block Ciphers
• Encrypt and decrypt a block of data at a time
– Typically 128 bits
• Typical uses for block ciphers
– Files, e-mail messages, text communications, web
• Well known encryption algorithms
– DES, 3DES, AES, CAST, Twofish, Blowfish, Serpent

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The main headquarters for Aircraft Solutions is currently in San Diego, California, while their Commercial Division is located 40 miles east of headquarters and the Defense Division is located in Santa Ana, California.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Comm 1310 Exam 1

    • 4222 Words
    • 17 Pages

    Decoding- The process of interpreting ideas, feelings, and thoughts that have been translated into a code. Words and unspoken signals are interpreted by the receiver…

    • 4222 Words
    • 17 Pages
    Satisfactory Essays
  • Good Essays

    Navajo Code Talkers

    • 993 Words
    • 4 Pages

    During War World II, the United States needed a secure and immediate way to transmit messages and communicate by telephone and radio in a code that could not be broken by the Japanese. Cryptography is the science or study of writing or solving codes; which made this war effort difficult to accomplish. America succeeded this goal with a code that was not based on any type of science, mathematics, or substitutions, but on a language. This system of massaging and communication was known as the Navajo code and was the most sufficient, secure, and fastest to date.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Project risk management helps on risk identification and assessment to see which ones can be mitigated or corrected, and how to monitor if there is a probability of occurrence. In the case of outsourcing resources, risk mitigation is needed in order to look and review efficiency and cost of the services and equipment that will be outsourced. However, to be able to use the risk assessment matrix it is essential to ensure that risk is accurately measured. The project will evaluate the suitability and potential of outsourcing human capital, Information…

    • 3443 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    The American Civil War created a new urgency for techniques in both cryptography (the manufacture of codes and ciphers) and cryptanalysis (the breaking of codes and ciphers). It also introduced new…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2147 Words
    • 9 Pages

    Public key cryptography uses a pair of mathematically related cryptographic keys. If one key is used to encrypt information, then only the related key can decrypt that information. Even if one of the keys is known, the other key cannot be easily calculated. Public key system consists of the following:…

    • 2147 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Encoding : This is the process of converting the information into a form that can be correctly decoded at the other end by…

    • 2906 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. Transposition ciphers encrypt plaintext by moving small pieces of the message around. A transposition cipher doesn't change the characters in the plaintext when it generates the cipher text, it just re-arranges them. It applies some kind of permutation function to the text to produce a re-arrangement, which can be reversed by knowing the secret to the permutation. In this report, I have chosen columnar transposition cipher.…

    • 266 Words
    • 2 Pages
    Good Essays

Related Topics