unit 2 ns-converted
unit 2 ns-converted
Contents
• Steganography
Contents
• Asymmetric encryption:
Maintain Confidentiality
Maintain Authentication
Maintain Authentication And Confidentiality
•Objectives of Cryptography:
1.Confidentiality
2. Integrity
3. Non repudiation
4. Authentication
SYMMETRIC
ENCRYPTION AND ASYMMETRIC ENCRYPTION
Symmetric Encryption:
Asymmetric Encryption:
CAESAR CIPHER
Input:
A String of lower case letters, called Text.
An Integer between 0-25 denoting the required shift.
Procedure:
Traverse the given text one character at a time .
For each character, transform the given character as per the
rule, depending on whether we’re encrypting or decrypting
the text.
Return the new string generated.
CAESAR CIPHER
Example:
Plain Text=HELLO
Key=3
Encryption:
Cipher Text=KHOOR
Decryption:
Plain Text=HELLO
CAESAR CIPHER
Example:
Example:
Encryption:
Cipher Text=EXXEGOEXSRGI
Decryption:
EXAMPLE
•Encryption Algorithm:
Example:
Plain-Text: RAMSWARUPK
Key: RANCHOBABA
PT: R A M S W A R U P K
NO: 17 0 12 18 22 0 17 20 15 10
KEY: R A N C H O B A B A
NO: 17 0 13 2 7 14 1 0 1 0
CT-NO: 34 0 25 20 29 14 18 20 16 10
After mod 26
CT-NO: 8 0 25 20 3 14 18 20 16 10
CIPHER-TEXT: I A Z U D O S U Q K
VIGENERE CIPHER
It is a polyalphabetic cipher.
for each plaintext letter, find the letter down the left hand
side of the tabula recta. You take the corresponding letter
from the key stream, and find this across the top of the
tabula recta.
Encryption
2 x 2 Example
Key : hill
For Decryption,
Total letter =21
Divided in to 3 groups of letter( bcz no. of rails=3)
Key(Rail)=3,
Digital Stegnography:
1)LSB,
2)DCT and
3)Append type.
LSB: Least Significant Bit
One for sender which involve user’s private key and one
for verifying signature which involve user’s public key.