A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES

Essay Writing Service http://StudyHub.vip/A-REVIEW-STUDY-OF-CRYPTOGRAPHY-TECHNIQU 👈

1
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
NAVDEEP KAUR1
RUCHIKA JERATH2
1M.Tech (cse) pursuing, RIMT, Mandi Gobindgarh.
2Asst. Professor, Dept. of CSE, RIMT, Mandi Gobindgarh, Punjab, India
ABSTRACT: Cryptography is a technique which
provides security to the messages sent between sender
and receiver on a network. Only authorized users can
access the message. It helps to maintain the integrity of
communication on a network. There are two main term
of cryptography which are encryption and decryption.
Encoding of message provided by Encryption and
decoding of message provided by Decryption.
Cryptography is a technique which provides security to
our data by using two methods which are substitution
and transposition encryption method. There are two
main types of cryptography schemes used one is
symmetric key cryptography which depends on single
key value and asymmetric key cryptography which
depends on pair of keys.
Keywords: Cryptography, Substitution Techniques,
Transposition Techniques, Symmetric Key
Cryptography, Asymmetric Key Cryptography.
1. INTRODUCTION
Cryptography is a technique to provide the security to
data communication in the presence of third party.
Every user wants a secure network to communicate
that data should be secure and there is no intruder can
read their data. Cryptography is used in
Wireless and wired network for providing secure data
communication. Cryptography converts the plain text
into cipher text and cipher text into a plain text. Plain
text is converted into a cipher text which is at a
sender side known as encryption and cipher text is
converted into a plain text which is at a receiver side
known as decryption.
Encryption converts readable form of message into
unreadable form. Decryption converts unreadable
form of message to readable form. Cryptography is
divided into two types’ symmetric key cryptography
and asymmetric key cryptography.
Symmetric key cryptography use single key for
encryption and decryption hence it is called as secret
key cryptography and asymmetric key use pair of
public and private key so it is called as public key
cryptography.
Cryptography services
. A service that improve the security of the data
processing systems. There are four type of services
provided by Cryptography such as confidentiality,
integrity, authentication, non-repudiation
1.1 Basics of Cryptography
Cryptography provides security to the data during the
transmission by performing some operations. The
main aim of cryptography is to help user to hide
information from unauthorized user.
1.1.1 ENCRYPTION
Encryption is a technique which is converting a
readable form of message into unreadable form
which means conversion of plain text into cipher text.
Encryption is performed when message is send by
sender. The process of encryption is shown below
fig.
fig.process of encryption
2
1.1.2 DECRYPTION
It is a technique of cryptography which is converting
an unreadable form of message into readable form
which means that conversion of cipher text into a
plain text known as decryption. Decryption is
performed when message is received by receiver. The
process of decryption is shown below fig.
fig. process of decryption
2. ANALYSIS OF CRYPTORAPHICS
TECHNIQUES:
2.1 Secret Key & Public Key Cryptography
There are two keys are used in the cryptography
which is secret key (symmetric cipher) and public
key (asymmetric cipher).
2.2 SYMMETRIC KEY CRYPTOGRAPHY
It is the one type of encryption algorithm which
converts plain text into cipher text. It provides the
security of data when data is transmission from one
to another by using single secrete key. This secrete
key is same to perform encryption and decryption.
This key is known to only those users who are
sending and receiving the message on that network.
Secret key maintain the security of data therefore no
other person access the data.
Fig. process of symmetric key cryptography.
Encryption algorithm is divided into two parts:
 Block Cipher :
When messages are too long then it is difficult to
encrypt the data then block cipher overcome this
problem by the dividing the data into the fixed size of
blocks. which are maybe 64 bit or 128 bit size of
blocks. Encryption is performed on individual block
by using same key.
There are various modes of block cipher which are
Electronic Code Book (ECB), Cipher Block Chaining
(CBC), Cipher Feedback (CFB), and Output
Feedback (OFB).
 Stream Cipher
But in the stream cipher the data is encrypt within
one digit block. It does not encrypt the whole digits
within the block in one time, it encrypt only one digit
at particular one time encryption.
2.3. ASYMMETRIC KEY CRYPTOGRAPHY
It is also called as public key cryptography. Rather
than using single key for encryption and decryption
two different key are use for encryption and
decryption. Where one key encrypt and other can
decrypt. If sender sends a message then encryption is
perform on sender side by using receiver public key
and sends a message to the receiver. Only receiver
can able to see a message and receiver decrypt a
message by using receiver
Private Key so security is maintained. Here key
management is required. [1]
Fig. Process of Asymmetric Key Cryptography.
3
Table.1 advantage and disadvantage of symmetric
cipher and asymmetric cipher [2]
2.4 DES (Data Encryption Standard): DES
defined as a block encryption algorithm. It was the
first encryption standard published by NIST
(National Institute of Standards and Technology). It
is a symmetric algorithm, means same key is used for
encryption and decryption. It uses one 64-bit key.
Out of 64 bits, 56 bits make up the independent key,
which determine the exact cryptography
transformation; 8 bits are used for error detection.
The main operations are bit permutations and
substitution in one round of DES. Six different
permutation operations are used both in key
expansion part and cipher part. Decryption of DES
algorithm is similar to encryption, only the round
keys are applied in reverse order. The output is a 64-
bit block of cipher text. Many attacks and methods
recorded the weaknesses of DES, which made it an
insecure block cipher key [3]
2.5. 3DES (Triple DES): 3DES is an enhancement
of Data Encryption Standard. It uses 64 bit block size
with 192 bits of key size. The encryption method is
similar to the one in the original DES but applied 3
times to increase the encryption level and the average
safe time. 3DES is slower than other block cipher
methods. [4]
2.6 AES (ADVANCED ENCRYPTION
STANDARDS)
The Advanced Encryption Standard (AES) is a
symmetric-key block cipher algorithm, U.S.
government standard for secure data and classified
data for encryption and decryption.[5]
In December 2001, the National Institute of
Standards (NIST) approved the AES as Federal
Information Processing Standards Publication (FIPS
PUB) 197, which specifies application of the
Rijndael algorithm to all sensitive classified data.[6]
The AES has three fixed 128-bit block ciphers with
cryptographic key sizes of 128, 192 and 256 bits. Key
size is unlimited, whereas the block size maximum is
256 bits. The AES design is based on a substitution-
permutation network (SPN) and does not use the
Data Encryption Standard (DES) Feistel network.[7]
The AES replaced the DES with new and updated
features:
 Block encryption implementation
 128-bit group encryption with 128, 192 and
256-bit key lengths
 Symmetric algorithm requiring only one
encryption and decryption key
 Data security for 20-30 years
 Worldwide access
 No royalties
 Easy overall implementation
2.7 RSA (Rivest-Shamir-Adleman)
RSA is a cryptosystem for public-key encryption,
and is widely used for securing sensitive data,
particularly when being sent over an insecure
network such as the Internet.
RSA was first described in 1977 by Ron Rivest, Adi
Shamir and Leonard Adleman of the Massachusetts
Institute of Technology. Public-key cryptography,
also known as asymmetric cryptography, uses two
different but mathematically linked keys, one public
and one private. The public key can be shared with
everyone, whereas the private key must be kept
secret. In RSA cryptography, both the public and the
private keys can encrypt a message; the opposite key
from the one used to encrypt a message is used to
decrypt it. This attribute is one reason why RSA has
become the most widely used asymmetric algorithm:
It provides a method of assuring the confidentiality,
integrity, authenticity and non-reputability of
electronic communications and data storage.[8]
3. CONCLUSION
In this paper I have studied about cryptographic
techniques and provide the security to data by hiding
original data. It is prevent unauthorized user to access
the data. It provide authentication to user to protect
from unauthorized user. Cryptography is a best way
for secure data. The process of encryption and
decryption is the main mechanism which is working
and guiding the flow of data.
Reference:
[1] Saykhede, A. et al. “A Survey Paper on Type and
Method of Cryptography Technique”
INTERNATIONAL JOURNAL FOR RESEARCH
E-ISSN: 2349-7610 VOLUME-2, SPECIAL ISSUE-
1, MARCH-2015
[2] http://disp.ee.ntu.edu.tw
4
[3] Juneja, M. et al. “A Review of Cryptography
Techniques and Implementation of AES for Images”
International Journal of Computer Science and
Electronics Engineering (IJCSEE) Volume 1, Issue 4
(2013) ISSN 2320-401X; EISSN 2320-4028
[4] Juneja, M. et al “A Review of Cryptography
Techniques and Implementation of AES for Images”
International Journal of Computer Science and
Electronics Engineering (IJCSEE) Volume 1, Issue 4
(2013) ISSN 2320-401X; EISSN 2320-4028
[5] https://www.techopedia.com
[6] https://www.techopedia.com
[7] https://www.techopedia.com
[8] http://searchsecurity.techtarget.com

Recomendados

Analysis of Cryptographic Algorithms for Network Security von
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
1.1K views6 Folien
A Survey on Cryptographic Techniques for Network Security.pdf von
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
6 views4 Folien
A Review on Various Most Common Symmetric Encryptions Algorithms von
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
492 views4 Folien
International Journal of Engineering Research and Development (IJERD) von
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
249 views7 Folien
A Survey On The Cryptographic Encryption Algorithms von
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
5 views12 Folien
RSA 32-bit Implementation Technique von
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueUniversitas Pembangunan Panca Budi
86 views6 Folien

Más contenido relacionado

Similar a A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES

A Survey on Generation and Evolution of Various Cryptographic Techniques von
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
35 views4 Folien
Vtu network security(10 ec832) unit 2 notes.. von
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
2.4K views91 Folien
Implementation of aes and blowfish algorithm von
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
1.3K views4 Folien
Cryptography Methodologies von
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
21 views3 Folien
A Study On Cryptographic Techniques von
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
2 views7 Folien
Analysis of Cryptography Techniques von
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniqueseditor1knowledgecuddle
564 views6 Folien

Similar a A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES(20)

A Survey on Generation and Evolution of Various Cryptographic Techniques von IRJET Journal
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal35 views
Cryptography Methodologies von ijtsrd
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
ijtsrd21 views
A Study On Cryptographic Techniques von Stacy Taylor
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
Stacy Taylor2 views
A Study Of Cryptography To Protect Data From Cyber-Crimes von Joe Osborn
A Study Of Cryptography To Protect Data From Cyber-CrimesA Study Of Cryptography To Protect Data From Cyber-Crimes
A Study Of Cryptography To Protect Data From Cyber-Crimes
Joe Osborn2 views
A New Method for Encrypting Digital Data Using Symmetric Key in Information E... von Editor IJCATR
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR208 views
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS von IJNSA Journal
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
IJNSA Journal5 views
Comparative study of private and public key cryptography algorithms a survey von eSAT Publishing House
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
Different date block size using to evaluate the performance between different... von IJCNCJournal
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal379 views
Overview on Symmetric Key Encryption Algorithms von IJERA Editor
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor1K views
IRJET- Comparative Analysis of Encryption Techniques von IRJET Journal
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal15 views
Achieving data integrity by forming the digital signature using RSA and SHA-1... von IOSR Journals
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals443 views

Más de Valerie Felton

Analysing Legibility of Space in Office Buildings Case Studies in Kerman, Ir... von
Analysing Legibility of Space in Office Buildings  Case Studies in Kerman, Ir...Analysing Legibility of Space in Office Buildings  Case Studies in Kerman, Ir...
Analysing Legibility of Space in Office Buildings Case Studies in Kerman, Ir...Valerie Felton
2 views10 Folien
1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdf von
1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdf1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdf
1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdfValerie Felton
34 views818 Folien
Analysis of Trends in Stock Market.pdf von
Analysis of Trends in Stock Market.pdfAnalysis of Trends in Stock Market.pdf
Analysis of Trends in Stock Market.pdfValerie Felton
2 views10 Folien
3D Printing in Architecture - A current state of the industry, with past and ... von
3D Printing in Architecture - A current state of the industry, with past and ...3D Printing in Architecture - A current state of the industry, with past and ...
3D Printing in Architecture - A current state of the industry, with past and ...Valerie Felton
5 views105 Folien
ACI 318-19 Building Code Requirements for Structural Concrete.pdf von
ACI 318-19 Building Code Requirements for Structural Concrete.pdfACI 318-19 Building Code Requirements for Structural Concrete.pdf
ACI 318-19 Building Code Requirements for Structural Concrete.pdfValerie Felton
25 views628 Folien
Association study of the GSK-3B gene with tardive dyskinesia in European Cauc... von
Association study of the GSK-3B gene with tardive dyskinesia in European Cauc...Association study of the GSK-3B gene with tardive dyskinesia in European Cauc...
Association study of the GSK-3B gene with tardive dyskinesia in European Cauc...Valerie Felton
2 views7 Folien

Más de Valerie Felton(20)

Analysing Legibility of Space in Office Buildings Case Studies in Kerman, Ir... von Valerie Felton
Analysing Legibility of Space in Office Buildings  Case Studies in Kerman, Ir...Analysing Legibility of Space in Office Buildings  Case Studies in Kerman, Ir...
Analysing Legibility of Space in Office Buildings Case Studies in Kerman, Ir...
Valerie Felton2 views
1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdf von Valerie Felton
1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdf1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdf
1000-Solved-Problems-in-Classical-Physics-An-Exercise-Book.pdf.pdf
Valerie Felton34 views
Analysis of Trends in Stock Market.pdf von Valerie Felton
Analysis of Trends in Stock Market.pdfAnalysis of Trends in Stock Market.pdf
Analysis of Trends in Stock Market.pdf
Valerie Felton2 views
3D Printing in Architecture - A current state of the industry, with past and ... von Valerie Felton
3D Printing in Architecture - A current state of the industry, with past and ...3D Printing in Architecture - A current state of the industry, with past and ...
3D Printing in Architecture - A current state of the industry, with past and ...
Valerie Felton5 views
ACI 318-19 Building Code Requirements for Structural Concrete.pdf von Valerie Felton
ACI 318-19 Building Code Requirements for Structural Concrete.pdfACI 318-19 Building Code Requirements for Structural Concrete.pdf
ACI 318-19 Building Code Requirements for Structural Concrete.pdf
Valerie Felton25 views
Association study of the GSK-3B gene with tardive dyskinesia in European Cauc... von Valerie Felton
Association study of the GSK-3B gene with tardive dyskinesia in European Cauc...Association study of the GSK-3B gene with tardive dyskinesia in European Cauc...
Association study of the GSK-3B gene with tardive dyskinesia in European Cauc...
Valerie Felton2 views
A Framework (SOCRATex) for Hierarchical Annotation of Unstructured Electronic... von Valerie Felton
A Framework (SOCRATex) for Hierarchical Annotation of Unstructured Electronic...A Framework (SOCRATex) for Hierarchical Annotation of Unstructured Electronic...
A Framework (SOCRATex) for Hierarchical Annotation of Unstructured Electronic...
Valerie Felton3 views
A literature review on depression and its risk factors among people suffering... von Valerie Felton
A literature review on depression and its risk factors among people suffering...A literature review on depression and its risk factors among people suffering...
A literature review on depression and its risk factors among people suffering...
Valerie Felton3 views
A STUDY ON AWARENESS OF MERCHANT BANKING.pdf von Valerie Felton
A STUDY ON AWARENESS OF MERCHANT BANKING.pdfA STUDY ON AWARENESS OF MERCHANT BANKING.pdf
A STUDY ON AWARENESS OF MERCHANT BANKING.pdf
Valerie Felton14 views
Academic and personal growth by PAL participants.pdf von Valerie Felton
Academic and personal growth by PAL participants.pdfAcademic and personal growth by PAL participants.pdf
Academic and personal growth by PAL participants.pdf
Valerie Felton5 views
A Framework for Research on Problem-Solving Instruction.pdf von Valerie Felton
A Framework for Research on Problem-Solving Instruction.pdfA Framework for Research on Problem-Solving Instruction.pdf
A Framework for Research on Problem-Solving Instruction.pdf
Valerie Felton3 views
A Comparative Investigation of Peer Revision versus Teacher Revision on the P... von Valerie Felton
A Comparative Investigation of Peer Revision versus Teacher Revision on the P...A Comparative Investigation of Peer Revision versus Teacher Revision on the P...
A Comparative Investigation of Peer Revision versus Teacher Revision on the P...
Valerie Felton7 views
APL functions for interactive data analysis Graphics and labels.pdf von Valerie Felton
APL functions for interactive data analysis  Graphics and labels.pdfAPL functions for interactive data analysis  Graphics and labels.pdf
APL functions for interactive data analysis Graphics and labels.pdf
Valerie Felton2 views
Annotated Bibliography of Research in the Teaching of English (2021).pdf von Valerie Felton
Annotated Bibliography of Research in the Teaching of English (2021).pdfAnnotated Bibliography of Research in the Teaching of English (2021).pdf
Annotated Bibliography of Research in the Teaching of English (2021).pdf
Valerie Felton3 views
APA for Academic Writing (2016-2017.pdf von Valerie Felton
APA for Academic Writing (2016-2017.pdfAPA for Academic Writing (2016-2017.pdf
APA for Academic Writing (2016-2017.pdf
Valerie Felton3 views
A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation.pdf von Valerie Felton
A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation.pdfA Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation.pdf
A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation.pdf
Valerie Felton4 views
Application of Graph Theory in an Intelligent Tutoring System for Solving Mat... von Valerie Felton
Application of Graph Theory in an Intelligent Tutoring System for Solving Mat...Application of Graph Theory in an Intelligent Tutoring System for Solving Mat...
Application of Graph Theory in an Intelligent Tutoring System for Solving Mat...
Valerie Felton3 views
A case study of how knowledge based engineering tools support experience re-u... von Valerie Felton
A case study of how knowledge based engineering tools support experience re-u...A case study of how knowledge based engineering tools support experience re-u...
A case study of how knowledge based engineering tools support experience re-u...
Valerie Felton2 views
AACE Recommended Practice Time Impact Analysis 52R.pdf von Valerie Felton
AACE Recommended Practice Time Impact Analysis 52R.pdfAACE Recommended Practice Time Impact Analysis 52R.pdf
AACE Recommended Practice Time Impact Analysis 52R.pdf
Valerie Felton9 views

Último

PLASMA PROTEIN (2).pptx von
PLASMA PROTEIN (2).pptxPLASMA PROTEIN (2).pptx
PLASMA PROTEIN (2).pptxMEGHANA C
68 views34 Folien
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptx von
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCollective Bargaining and Understanding a Teacher Contract(16793704.1).pptx
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCenter for Integrated Training & Education
93 views57 Folien
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx von
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxDebapriya Chakraborty
655 views81 Folien
Structure and Functions of Cell.pdf von
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
545 views10 Folien
AUDIENCE - BANDURA.pptx von
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptxiammrhaywood
84 views44 Folien
Psychology KS5 von
Psychology KS5Psychology KS5
Psychology KS5WestHatch
93 views5 Folien

Último(20)

PLASMA PROTEIN (2).pptx von MEGHANA C
PLASMA PROTEIN (2).pptxPLASMA PROTEIN (2).pptx
PLASMA PROTEIN (2).pptx
MEGHANA C68 views
Structure and Functions of Cell.pdf von Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan545 views
Psychology KS5 von WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch93 views
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively von PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 585 views
Are we onboard yet University of Sussex.pptx von Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc96 views
When Sex Gets Complicated: Porn, Affairs, & Cybersex von Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu67 views
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx von ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP369 views
Psychology KS4 von WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch84 views
JiscOAWeek_LAIR_slides_October2023.pptx von Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc96 views
The basics - information, data, technology and systems.pdf von JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1115 views
Narration ppt.pptx von TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN135 views
Create a Structure in VBNet.pptx von Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 views
Dance KS5 Breakdown von WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch79 views

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES

  • 1. 1 A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES NAVDEEP KAUR1 RUCHIKA JERATH2 1M.Tech (cse) pursuing, RIMT, Mandi Gobindgarh. 2Asst. Professor, Dept. of CSE, RIMT, Mandi Gobindgarh, Punjab, India ABSTRACT: Cryptography is a technique which provides security to the messages sent between sender and receiver on a network. Only authorized users can access the message. It helps to maintain the integrity of communication on a network. There are two main term of cryptography which are encryption and decryption. Encoding of message provided by Encryption and decoding of message provided by Decryption. Cryptography is a technique which provides security to our data by using two methods which are substitution and transposition encryption method. There are two main types of cryptography schemes used one is symmetric key cryptography which depends on single key value and asymmetric key cryptography which depends on pair of keys. Keywords: Cryptography, Substitution Techniques, Transposition Techniques, Symmetric Key Cryptography, Asymmetric Key Cryptography. 1. INTRODUCTION Cryptography is a technique to provide the security to data communication in the presence of third party. Every user wants a secure network to communicate that data should be secure and there is no intruder can read their data. Cryptography is used in Wireless and wired network for providing secure data communication. Cryptography converts the plain text into cipher text and cipher text into a plain text. Plain text is converted into a cipher text which is at a sender side known as encryption and cipher text is converted into a plain text which is at a receiver side known as decryption. Encryption converts readable form of message into unreadable form. Decryption converts unreadable form of message to readable form. Cryptography is divided into two types’ symmetric key cryptography and asymmetric key cryptography. Symmetric key cryptography use single key for encryption and decryption hence it is called as secret key cryptography and asymmetric key use pair of public and private key so it is called as public key cryptography. Cryptography services . A service that improve the security of the data processing systems. There are four type of services provided by Cryptography such as confidentiality, integrity, authentication, non-repudiation 1.1 Basics of Cryptography Cryptography provides security to the data during the transmission by performing some operations. The main aim of cryptography is to help user to hide information from unauthorized user. 1.1.1 ENCRYPTION Encryption is a technique which is converting a readable form of message into unreadable form which means conversion of plain text into cipher text. Encryption is performed when message is send by sender. The process of encryption is shown below fig. fig.process of encryption
  • 2. 2 1.1.2 DECRYPTION It is a technique of cryptography which is converting an unreadable form of message into readable form which means that conversion of cipher text into a plain text known as decryption. Decryption is performed when message is received by receiver. The process of decryption is shown below fig. fig. process of decryption 2. ANALYSIS OF CRYPTORAPHICS TECHNIQUES: 2.1 Secret Key & Public Key Cryptography There are two keys are used in the cryptography which is secret key (symmetric cipher) and public key (asymmetric cipher). 2.2 SYMMETRIC KEY CRYPTOGRAPHY It is the one type of encryption algorithm which converts plain text into cipher text. It provides the security of data when data is transmission from one to another by using single secrete key. This secrete key is same to perform encryption and decryption. This key is known to only those users who are sending and receiving the message on that network. Secret key maintain the security of data therefore no other person access the data. Fig. process of symmetric key cryptography. Encryption algorithm is divided into two parts:  Block Cipher : When messages are too long then it is difficult to encrypt the data then block cipher overcome this problem by the dividing the data into the fixed size of blocks. which are maybe 64 bit or 128 bit size of blocks. Encryption is performed on individual block by using same key. There are various modes of block cipher which are Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), and Output Feedback (OFB).  Stream Cipher But in the stream cipher the data is encrypt within one digit block. It does not encrypt the whole digits within the block in one time, it encrypt only one digit at particular one time encryption. 2.3. ASYMMETRIC KEY CRYPTOGRAPHY It is also called as public key cryptography. Rather than using single key for encryption and decryption two different key are use for encryption and decryption. Where one key encrypt and other can decrypt. If sender sends a message then encryption is perform on sender side by using receiver public key and sends a message to the receiver. Only receiver can able to see a message and receiver decrypt a message by using receiver Private Key so security is maintained. Here key management is required. [1] Fig. Process of Asymmetric Key Cryptography.
  • 3. 3 Table.1 advantage and disadvantage of symmetric cipher and asymmetric cipher [2] 2.4 DES (Data Encryption Standard): DES defined as a block encryption algorithm. It was the first encryption standard published by NIST (National Institute of Standards and Technology). It is a symmetric algorithm, means same key is used for encryption and decryption. It uses one 64-bit key. Out of 64 bits, 56 bits make up the independent key, which determine the exact cryptography transformation; 8 bits are used for error detection. The main operations are bit permutations and substitution in one round of DES. Six different permutation operations are used both in key expansion part and cipher part. Decryption of DES algorithm is similar to encryption, only the round keys are applied in reverse order. The output is a 64- bit block of cipher text. Many attacks and methods recorded the weaknesses of DES, which made it an insecure block cipher key [3] 2.5. 3DES (Triple DES): 3DES is an enhancement of Data Encryption Standard. It uses 64 bit block size with 192 bits of key size. The encryption method is similar to the one in the original DES but applied 3 times to increase the encryption level and the average safe time. 3DES is slower than other block cipher methods. [4] 2.6 AES (ADVANCED ENCRYPTION STANDARDS) The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm, U.S. government standard for secure data and classified data for encryption and decryption.[5] In December 2001, the National Institute of Standards (NIST) approved the AES as Federal Information Processing Standards Publication (FIPS PUB) 197, which specifies application of the Rijndael algorithm to all sensitive classified data.[6] The AES has three fixed 128-bit block ciphers with cryptographic key sizes of 128, 192 and 256 bits. Key size is unlimited, whereas the block size maximum is 256 bits. The AES design is based on a substitution- permutation network (SPN) and does not use the Data Encryption Standard (DES) Feistel network.[7] The AES replaced the DES with new and updated features:  Block encryption implementation  128-bit group encryption with 128, 192 and 256-bit key lengths  Symmetric algorithm requiring only one encryption and decryption key  Data security for 20-30 years  Worldwide access  No royalties  Easy overall implementation 2.7 RSA (Rivest-Shamir-Adleman) RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet. RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. Public-key cryptography, also known as asymmetric cryptography, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. In RSA cryptography, both the public and the private keys can encrypt a message; the opposite key from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the most widely used asymmetric algorithm: It provides a method of assuring the confidentiality, integrity, authenticity and non-reputability of electronic communications and data storage.[8] 3. CONCLUSION In this paper I have studied about cryptographic techniques and provide the security to data by hiding original data. It is prevent unauthorized user to access the data. It provide authentication to user to protect from unauthorized user. Cryptography is a best way for secure data. The process of encryption and decryption is the main mechanism which is working and guiding the flow of data. Reference: [1] Saykhede, A. et al. “A Survey Paper on Type and Method of Cryptography Technique” INTERNATIONAL JOURNAL FOR RESEARCH E-ISSN: 2349-7610 VOLUME-2, SPECIAL ISSUE- 1, MARCH-2015 [2] http://disp.ee.ntu.edu.tw
  • 4. 4 [3] Juneja, M. et al. “A Review of Cryptography Techniques and Implementation of AES for Images” International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 4 (2013) ISSN 2320-401X; EISSN 2320-4028 [4] Juneja, M. et al “A Review of Cryptography Techniques and Implementation of AES for Images” International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 4 (2013) ISSN 2320-401X; EISSN 2320-4028 [5] https://www.techopedia.com [6] https://www.techopedia.com [7] https://www.techopedia.com [8] http://searchsecurity.techtarget.com