Cipher methods-cryptography, Computer Network Security

Cipher Methods

There are 2 methods of encrypting plaintext:

• Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time.
• Block cipher method – the message is divided into blocks (for example sets of 8-, 16- or
32-bit blocks) and then each block of plaintext is transformed into an encrypted block of cipher bits by using an algorithm and a key.

Bit stream method which is uses algorithm functions like XOR, while block cipher method can use substitution, transposition, XOR, etc.

Substitution cipher

Substitution cipher substitutes one value for the other value. The following are the different types of substitution:
• Monoalphabetic substitution – It uses one alphabet to substitute. Simple method but powerful if combines with other operations.
• Polyalphabetic substitution – It is more advanced method which uses two or more alphabets.
• Vigenère cipher – It is an advanced type of cipher which uses simple polyalphabetic code that is made up of 26 distinct cipher alphabets.

Transposition cipher

Transposition cipher rearranges values within the block to create ciphertext.

Exclusive OR (XOR)

It is a function of Boolean algebra where the two bits are compared to each other
•     If the two bits are identical, result is 0
•     If the two bits not identical, result is 1

Vernam cipher

This is developed at AT&T that uses set of characters once per encryption process.

Book (or Running Key) cipher

This method uses text in book as key to decrypt a message where ciphertext contains codes which represents page, line and word numbers

Hash Functions

Hash functions are mathematical algorithms that generate message summary or digest to confirm message identity and confirm no content has changed. Hash algorithms are publicly known functions that create hash value. Use of keys is not needed, but message authentication code (MAC) may be attached to a message. This method is mostly used in password verification systems to confirm identity of user.

Posted Date: 10/8/2012 7:10:58 AM | Location : United States

Related Discussions:- Cipher methods-cryptography, Assignment Help, Ask Question on Cipher methods-cryptography, Get Answer, Expert's Help, Cipher methods-cryptography Discussions

Write discussion on Cipher methods-cryptography
Your posts are moderated
Related Questions
SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct