Professional Documents
Culture Documents
Pec It
Pec It
ROLL – 18700220055
SECTION – B
DEPARTMENT – IT
YEAR – 4TH
SEM – 8TH
SUBJECT - Cryptography and Network Security
SUBJECT CODE - PEC-IT801B
CRYPTOGRAPHY: CONCEPTS &
TECHNIQUES
Definition: Cryptography is the science and art of securing communication by converting
information into a secret code, making it unintelligible to unauthorized users.
Substitution Techniques
Definition: Substituting elements of plaintext with other
elements (characters or bits) during encryption.
Example: Caesar Cipher, where each letter in the plaintext is
shifted by a fixed number of positions.
Transposition Techniques
Definition: Rearranging the order of elements in the plaintext
without changing them.
Example: Rail Fence Cipher, where characters are written in
zigzag lines and then read out again row by row.
ENCRYPTION & DECRYPTION
"KEY RANGE" refers to the set of all possible keys that can be used in cryptography.
The range is determined by the key size and the underlying algorithm, and it affects the
security of the encryption. A larger key range allows for a greater number of possible
keys, increasing the difficulty for an attacker to guess the correct key and decrypt the
message
SYMMETRIC KEY ALGORITHM
Symmetric key algorithms, also known as secret key or private key algorithms, use the same key for both
encryption and decryption.
Characteristic: Faster than asymmetric algorithms but requires secure key exchange.
Modes:
ECB (Electronic Codebook): Each block is independently encrypted, may lead to pattern recognition.
CBC (Cipher Block Chaining): Each block depends on the previous block, adding randomness and
enhancing security.
OFB (Output Feedback): Uses the output of the previous block for encryption, suitable for streaming
data.
CFB (Cipher Feedback): Similar to OFB but works at the byte level, supporting different block sizes.
DES(DATA ENCRYPTION STANDARD) ALGORITHM
Data Encryption Standard (DES) is a block cipher with a 56-bit key length that has played a significant role in data security.
Data encryption standard (DES) has been found vulnerable to very powerful attacks therefore, the popularity of DES has been
found slightly on the decline. DES is a block cipher and encrypts data in blocks of size of 64 bits each, which means 64 bits of
plain text go as the input to DES, which produces 64 bits of ciphertext. The same algorithm and key are used for encryption
and decryption, with minor differences. The key length is 56 bits.
Let us now discuss the broad-level steps in DES.
In the first step, the 64-bit plain text block is handed over to
an initial Permutation (IP) function.
Bitwise XOR
Addition modulo (2^4)
Multiplication modulo (2^4) +1
After 4 complete rounds, the final “half-round” consists of only the first 4 out of the 14 steps previously used in the full
rounds. To perform these rounds, each binary notation must be converted to its equivalent decimal notation, perform the
operation and the result obtained should be converted back to the binary representation for the final result of that particular
step.
RC5 ENCRYPTION ALGORITHM
RC5 is a symmetric key block encryption algorithm designed by Ron Rivest in
1994. It is notable for being simple, fast (on account of using only primitive
computer operations like XOR, shift, etc.) and consumes less memory.
Example:
Key : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Plain Text : 00000000 00000000
Cipher Text : EEDBA521 6D8F4B15