Explain the encryption model or symmetric cipher model, Computer Network Security

With explain the encryption model the help of diagram.

Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encryption, also known as conventional encryption single-key or secret-key encryption.

A few symmetric key algorithms are stated below,

1. Data Encryption Standard also well known as DES

2. Triple DES also known as3DES

3. International Data Encryption Algorithm also known as IDEA

Symmetric cipher model as shown in the figure drawn below consists of five components,

Plaintext is defined as follows:

It refers to the original message which is not encrypted and is in human readable format. It forms the input to an encryption algorithm and output of or the decryption algorithm.

Example of it is

A text document is the executable file or the image.

2.   Encryption Algorithm is defined below:

Application of this algorithm will transform the plaintext to an unreadable, unintelligible form by performing many transformations and substitutions.

 3. Secret-key is defined below:

It is a cost of data which is randomly selected. It acts as an input to the encryption and decryption algorithms both. Thus, the sender and receiver both must share the same key and make sure which is secured, in order to restrict the intruders from reading the messages. The encryption algorithm does the transformations and substitutions on the plaintext consequently, depending on the key.

4. Cipher text is defined below:

It is a scrambled version of the plaintext and is not in a human-readable format. The cipher text produced by encryption algorithm depends on the secret-key and plain text. The encryption algorithm can produce different cipher text for the same plain text by using various secret-keys.

5.   Decryption Algorithm is defined below:

It is a reversed form of the encryption algorithm. It takes the cipher text (that is the encrypted data) as the input and decrypts it, using the same key which was used by the encryption algorithm in order to produce the plaintext (that is original message or data).

Posted Date: 7/20/2012 6:03:08 AM | Location : United States







Related Discussions:- Explain the encryption model or symmetric cipher model, Assignment Help, Ask Question on Explain the encryption model or symmetric cipher model, Get Answer, Expert's Help, Explain the encryption model or symmetric cipher model Discussions

Write discussion on Explain the encryption model or symmetric cipher model
Your posts are moderated
Related Questions
Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us