Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ISSN 2229-5518
CRYPTOGRAPHY
Aayushi Jangid
BASICS OF CRYPTOGRAPHY
may be web browser or server for electronic
1.1 INTRODUCTION
transactions, DNS Servers, online banking
In today’s world when hacking and computer
client/server, routers exchanging routing table
data robbery and theft are common
updates etc.
phenomena, it is very important to protect
data and information that is sent over a
particular network. And that is where the need
1.2 HISTORY OF CRYPTOGRAPHY
for cryptography arises.
It is believed that the first instance of
Cryptography is the science of writing the
cryptography was seen around 4000 years ago
data or information in a secret code. It involves
in the Egyptian city of MENET KHUFU where
encryption and decryption. The data that can
the hieroglyphic inscriptions on the tomb of
be understood without any special efforts is
the nobleman KHNUMHOTEP II were written
called as the plaintext. This data can be
with a number of unusual symbols to confuse
converted into the secret code and this process
or obscure the meaning of the inscriptions.
is called as the encryption. This encrypted data
is called as the cipher text. This encrypted text
One of the other techniques of
can be converted back into the plaintext by a
cryptography, called as substitution cipher in
key and this process is called as the
the modern terminology was used by Julius
decryption. Thus, cryptography consists of
Caesar, however, this technique was first
both, the encryption and the decryption
developed by the Greek writer Polybius but its
process.
first recorded use was made by Julius Caesar.
In this technique, Julius Caesar encoded his
1.2 FRIENDS AND ENEMIES IN messages by substituting the letters in the text
CRYPTOGRAPHY: by the alphabet that was three letters towards
There are three names that are most popular in the right.
the cryptographic terms i.e. Bob, Alice and
Trudy.
Bob and Alice want to communicate sincerely
without any leakage of messages and Trudy
might intercept in those messages to harm its
contents. These names are very popular in
network security world. These Bob and Alice
IJSER © 2010
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 1, Issue 2, November-2010 2
ISSN 2229-5518
4 WORKING OF CRYPTOGRAPHY:
the same key for sending and then receiving the messages by its decryption.
KEY 1 KEY 1
Plaintext Cipher text Plaintext
IJSER © 2010
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 1, Issue 2, November-2010 4
ISSN 2229-5518
5.1.2 BLOCK CIPHERS: key and is used for encryption of messages i.e.
In the block ciphers, message to be encrypted the messages are encrypted using the
is processed in block of k bits and 1-to-1 recipient’s public key and the second key is
mapping is used to map k-bit block of called as the private key and is kept secret.
plaintext to k-bit block of cipher text. In This key is used by the recipient to decrypt the
general, about 2k! Mappings are required. But, messages.
the problem with this approach is that this
requires a table with a lot of entries. But, to The keys are related mathematically but it is
solve this we can use a prototype function. not practically possible to figure out the
private key from the public key.
Plaintext
There are two main techniques for public key the sender has actually received that message.
cryptography: This will ensure confidentiality and security.
[1]. Public key encryption: In general, one of the two algorithms is used
for public key cryptography. They are
In this technique, two keys are used for the
purpose of encryption and decryption as a) RSA Algorithm
described above. b) Diffie-Hellman Algorithm
IJSER © 2010
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 1, Issue 2, November-2010 6
ISSN 2229-5518
REFERENCES:
[1]. Barr, T.H. (2002). Invitation to Cryptology. York: John Wiley & Sons.
Upper Saddle River, NJ: Prentice Hall. [5]. Schneier, B. (1996). Applied Cryptography,
[2]. Denning, D.E. (1982). Cryptography and 2nd Ed. New York: John Wiley & Sons.
Data Security. Reading, MA: Addison-Wesley. [6]. Cryptography Research Inc.'s
[3]. Federal Information Processing Standards cryptography.com Site
(FIPS) 140-2. (2001, May 25). Security [7]. Crypto Log: The Internet Guide to
Requirements for Cryptographic Modules. Cryptography
Gaithersburg, MD: National Institute of [8]. RSA's Cryptography FAQ
Standards and Technology (NIST). Retrieved [9]. Wikipedia pages on cryptography
from
http://csrc.nist.gov/publications/fips/fips140-
2/fips1402.pdf
[4]. Ferguson, N., Schneier, B., & Kohno, T.
(2010). Cryptography Engineering: Design
Principles and Practical Applications. New
IJSER © 2010
http://www.ijser.org