Assignment 2 - Part 2 - Cryptography
Assignment 2 - Part 2 - Cryptography
Assignment2
(PART 2)
Cryptography
P.M.R.S. PATHIRAJA
Curtin ID: 15003670
SLIIT ID: DCN / 07 / C3 / 0569
Date: 03 - 10 - 2010
Contents
Introduction...............................................................................................................................3
References................................................................................................................................ 11
Introduction
For example if we write the word “SLIIT” it will encrypted into “HPRRG”. This is a
substitution chipher because one chipher is replaced by another character. This simplistic
encryption method worked for its time and for particular cultures, but eventually more complex
mechanisms were required.
Cryptography has a rich history. William Frederick Friedman published The Index of
Coincidence and Its Applications in Cryptography and He is referred to as the “Father of Modern
Cryptography” and broke many messages that were intercepted during World War II. Encryption
has been used by many governments and militaries and has allowed great victory for some
because of the covert maneuvers that could be accomplished in shrouded secrecy. It has also
brought great defeat to others when their cryptosystems were discovered and deciphered.
Mean while the computer has came to the scene. Through that machine possibilities for
encryption methods and devices advanced, and cryptography efforts expanded exponentially.
New dawn was occurred for the cryptography designers and encryption techniques. Lucifer was
a well known project developed at the IBM. This project introduces complex mathematical
equations and functions that were later adopted and modified by the U.S. National Security
Agency to come up with the U.S Data Encryption Standard.
A majority of the protocols developed at the dawn of the computing age have had
upgraded to include cryptography to add necessary layers of protection. Encryption is used in
hardware devices and software to protect data, banking transactions, corporate extranets, e-mail,
Web transactions, wireless communication, storing of confidential information, faxes, and phone
calls.
As our dependency upon technology increases, so does our dependency upon
Cryptography, because secrets will always need to be kept.
How Cryptography is done
Cryptosystem means systems which provide encryption and decryption. This can be
created through hardware components or program code in an application. Cryptography
algorithm determines the complexity of the cryptograph. Most of the algorithms are complex
mathematical formulas that are applied in a specific sequence to the plaintext. Encryption
method use value called key, which works with the algorithm to encrypt and decrypt the text.
Generally all cryptography contains four basic parts.
Symmetric, which cryptosystems use the same secret key to encrypt or decrypt a message
received data packet from trusted partners.
The other cryptosystem is asymmetric system under, which two different keys is used to
encrypt and decrypt the message or received data packet. On public key is used to encrypt the
data or message and the private key on receiving end is used to decrypt the message or data
packet.
Cryptography Algorithms
Considering the about cryptography method there are some algorithms use for do
cryptography methods, mainly these algorithms can be divided in to tow categories
There are many block ciphers such as RC2, DES, 3DES, Rijndael, REDOC, RC6,
Safer,MISTY, MARS, NewDES. For Stream Ciphers we can have ORYX, RC4, and SEAL as
examples. MD2, MD5, RIPEMD, SHA1, Snefru, Tiger are example for Hashing Alogorithems.
Cryptographic Use
primitive
Shared-secret encryption Performs a transformation on data, keeping the data from being
(symmetric cryptography) read by third parties. This type of encryption uses a single, shared-
secret key to encrypt and decrypt data.
Public-key encryption Performs a transformation on data, keeping the data from being
(asymmetric cryptography) read by third parties. This type of encryption uses a public/private
key pair to encrypt and decrypt data.
Cryptographic signing Ensures that data originates from a specific party by creating a
digital signature that is unique to that party. This process also uses
hash functions.
Cryptographic hashes Maps data from any length to a fixed-length byte sequence. Hashes
are statistically unique; a different two-byte sequence will not hash
to the same value. Hashes are one-way algorithms.
Goals of Cryptography
Advantages:
1. The biggest advantage of public key cryptography is the secure nature of the
private key. In fact, it never needs to be transmitted or revealed to anyone.
2. It enables the use of digital certificates and digital timestamps, which is a very
secure technique of signature authorization. We will look at digital timestamps
and digital signatures in a moment.
Disadvantages:
1. Transmission time for documents encrypted using public key cryptography is
significantly slower then symmetric cryptography. In fact, transmission of very
large documents is prohibitive.
Quantum cryptography.
DNA cryptography.
Quantum cryptography
DNA cryptography
Using biological methods for the cryptography is call DNA cryptography. Considering
the DNA cryptography there are two different approaches. First approach shows how DNA
binary strands can be used for steganography, a technique of encryption by information hiding,
to provide rapid encryption and decryption.