Professional Documents
Culture Documents
Cryptography
Cryptography
Cryptography
Plaintext Secret key encryption Cipher text Secret key encryption Plaintext
Example: DES(Data Encryption Standard ), 3DES and AES(Advanced
Encryption Standard)
Asymmetric Key
Asymmetric-key encryption algorithms use a pair of keys, a public
key associated with the creator/sender for encrypting messages and a private
key that only the originator knows (unless it is exposed or they decide to share
it) for decrypting that information [3].
Plaintext Public key encryption Cipher text Private key encryption Plaintext
Multiply the plaintext matrix with the cipher matrix to form the encrypted matrix
=>
Which contains the plaintext
“PENGUINS ARE ONE TO ONE”
Conclusion
The protector of our digital secrets is cryptography. It gives us the
ability to securely send and store sensitive information in a world that is
becoming more linked. It ensures the privacy, integrity, and validity of
our data through encryption, decryption, and key management.
Cryptography is still vital to our continuous fight for digital security
even as cyber threats continue to exist. It becomes more important as
our reliance on technology increases. To protect our digital future, let's
adopt its values and innovations.
Reference:
1. Challita, K., H.J.I.J.o.N.C.A. Farhat, and T. Applications,
Combining steganography and cryptography: new directions. 2011.
1(1): p. 199-208.
2. Rahman, M.M., et al., Implementation of RSA algorithm for
speech data encryption and decryption. 2012. 12(3): p. 74-82.
3. Bruce, S., Applied Cryptography: Protocols, Algorthms, and
Source Code in C.-2nd. 1996, john wiley & sons.
4. ; Available from:
https://www.researchgate.net/figure/Encoding-of-the-letters-in-The-
Caesar-Cipher-6_fig2_352792492/download