Ashish Jangid-19earcs026
Ashish Jangid-19earcs026
Ashish Jangid-19earcs026
Abstract:- Cyber attacks are increasing day by day . So II. COMPONENTS OF CRYPTOGRAPHIC SYSTEM
network security (to prevent the data from getting
theft) is a must. There are various ways to prevent the Components of Cryptographic system are as follows:
data from getting stolen and Cryptography is one of
them.Cryptography is a way of storing and A. Plain Text: The confidential data that should be
transmitting the data in a particular form so that only secured while transmission is referred as plain text.
those for whom it is intended can read it and process B. Cipher Text: The transformed plain texts that cannot be
it.In this paper we will learn about Cryptography, its understand without applying encryption algorithm and
goals , how it helps in preventing cyber attacks . encryption key over the plain text.
C. Encryption Algorithm: It is a mathematical process
I. INTRODUCTION which is used to convert plain text into cipher text using
some encryption key.
Cyber Security refers to the techniques of protecting D. Decryption Algorithm: This is the reverse process of
computers, networks, programs and data from encryption algorithm. To produce the original text we
unauthorized access or attacks that are aimed for use cipher text and encryption algorithm.
exploitation. Cryptography is about Mathematical E. Encryption key: The value which is applied within
functions and can be applied to technical solutions for encryption algorithm to get the cipher text from the
increasing cyber security. Transforming the confidential plain text is called the encryption key. To make the
data in a coding form and then transmitting it so that only cryptographic system successful safeguarding of
authorized users can work on it is known as Cryptography. encryption key is important. The value of encryption
Cryptography is originated from Greek word “crypto” key is known to both sender and receiver or only to the
means hidden and “graphy” means writing, so sender
cryptography means hidden or secret writing. F. Decryption key: To get the plain text back from the
ciphertext decryption key is applied within the
decryption algorithm. The value of decryption key is
known only to the receiver.
1
III. HOW CRYPTOGRAPHY WORKS A. Confidentiality: Cryptography ensures confidentiality
through hiding a message and protects confidential data
Cryptography requires two steps: encryption and from unauthorized access.
decryption. The encryption process uses a cipher in order B. Access control: Only authorized users can access to
to encrypt plain text and turn it into cipher text. On the protect confidential data etc. Access would be possible
other hand, Decryption uses the same cipher to convert the for those individual that had access to the correct
cipher text back into plain text. cryptographic keys.
C. Authentication: Before the interaction with the
Example, if you want to encrypt a simple message, cryptographic system the process of verifying the
“Hello”. sender and the receiver is termed as authentication.
So our plain text is “Hello”. D. Data Integrity: It ensures that the received message has
not been changed from its original form in any way.
We can now apply one of the simplest forms of The data may get modified by an unauthorized user
encryption Known as shift cipher. With this cipher, we intentionally or accidentally. Integrity makes sure that
simply shift each letter with a shift of suppose three letters the data is intact or not since it was last created,
transmitted or stored by an authorized user.
E. Non-Repudiation: It is a mechanism used to prove that
sender really sent this message and the message was
received by that specific party, so that the recipient
cannot claim of not receiving the message.
Many attacks are possible over any ongoing [1]. Anu and Divya Shree, “ A Review on Cryptography,
communication within a network like Security threats, Attacks and Cyber Security” , International Journal of
Unauthorized access, Data capturing, Virus infection etc. Advanced Research in Computer Science.
To prevent attacks( Security threats , unauthorized [2]. Sarita Kumari, “A Research Paper on Cryptography
access,Virus infection )every encryption system must have Encryption and Compression Techniques,
some features that helps in secure transmission of any data. International Journal of Engineering and Computer
The main such goals are listed as follows: Science.