Q. Applications of All Ciphers Studied Till Now

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Q.

Applications of all ciphers studied till now

1. Caesar Cipher
The Caesar cipher is one of the earliest known and simplest ciphers. It is a type
of substitution cipher in which each letter in the plaintext is 'shifted' a certain
number of places down the alphabet. For example, with a shift of 1, A would be
replaced by B, B would become C, and so on. The method is named after Julius
Caesar, who apparently used it to communicate with his generals.

2. Monoalphabetic Cipher
Monoalphabetic cipher is a substitution cipher in which for a given key, the
cipher alphabet for each plain alphabet is fixed throughout the encryption
process. For example, if ‘A’ is encrypted as ‘D’, for any number of occurrence
in that plaintext, ‘A’ will always get encrypted to ‘D’.

3. Playfair Cipher
The Playfair cipher was predominantly used by British forces during the Second
Boer War (1899-1902) and World War I (1914-1918). Other
countries–Australia, Germany, and New Zealand–would use the Playfair cipher
in the 1940's.
In playfair cipher, initially a key table is created. The key table is a 5×5 grid of
alphabets that acts as the key for encrypting the plaintext. Each of the 25
alphabets must be unique and one letter of the alphabet (usually J) is omitted
from the table as we need only 25 alphabets instead of 26. If the plaintext
contains J, then it is replaced by I.

4. Hill Cipher
Hill Cipher is the application of modulo arithmetic to cryptography. This
cryptographic technique uses a square matrix as the key used to encrypt and

1
decrypt. Security is expected to be guaranteed after applying the Hill Cipher
algorithm in the process of sending and receiving data.
Cryptographic techniques can prevent data theft. One cryptographic algorithm is
Hill Cipher. This algorithm is one symmetric cryptography algorithm. The Hill
Cipher algorithm uses an m x m sized matrix as the key to encryption and
decryption. The fundamental matrix theory used in Hill Cipher is multiplication
between matrices and inverses the matrix. Hill Cipher has two types of matrices
in general, 2 x 2 and 3 x 3.

5. Polyalphabetic Substitution Ciphers


Because of these inherent weaknesses, attempts were made to develop stronger
substitution codes. In about 1467 Leon Battista Alberti created the first known
polyalphabetic substitution cipher. The Alberti Cipher used a mixed alphabet for
encryption, which would switch to a different ciphertext alphabet at random
points in the text. These points were marked in the code by an uppercase letter.
Alberti encoded keys to this system on sets of cipher discs.

6. Vigenere Cipher
Vigenere Cipher was designed by tweaking the standard Caesar cipher to reduce
the effectiveness of cryptanalysis on the ciphertext and make a cryptosystem
more robust. It is significantly more secure than a regular Caesar Cipher.
In the history, it was regularly used for protecting sensitive political and military
information. It was referred to as the unbreakable cipher due to the difficulty it
posed to the cryptanalysis.
Vigenere cipher algorithm method is used for securing data in the form of
digital images, especially for the logo of a company that is one of the methods
of science of cryptography, in which the order logos or digital image that secure
during transmission over the Internet. a method used to secure the data in the
form of digital imagery to ascertain and assess whether the use of this method
was successful or not.

7. Vernam Cipher

2
The Vernam Cipher is based on the principle that each plaintext character from a
message is 'mixed' with one character from a key stream. If a truly random key
stream is used, the result will be a truly 'random' ciphertext which bears no
relation to the original plaintext. In that case the cipher is similar to the
unbreakable One-Time Pad (OTP). As it was generally used with teleprinters
and 5-level punched tape, the system is also known as One-Time Tape or OTT.
If the resulting ciphertext in the OTT system described above is truly random, it
can safely be sent over the air, without the risk of being deciphered by an
eavesdropper. All the recipient has to do is mix the ciphertext with the same
OTT to reveal the original plaintext. One only has to guarantee that the OTT is
truly random, that there are only two copies of it, that both copies are destroyed
immediately after use and that they are only used once.

Q. Difference between Cryptanalyze and Cryptanalysis


Cryptanalysis:
Cryptanalysis is the process of studying cryptographic systems to look for
weaknesses or leaks of information. Cryptanalysis is generally thought of as
exploring the weaknesses of the underlying mathematics of a cryptographic
system but it also includes looking for weaknesses in implementation, such as
side channel attacks or weak entropy inputs.
Cryptanalyze:
Cryptanalyze is to study for the purpose of discovering the clear meaning; break
(a code, cipher, etc.)
Cryptanalyze also means to solve by Cryptanalysis.

You might also like