Explain transposition ciphers and substitution cipher, Computer Network Security

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads.

The messages which are intended to transmit secretly and securely with full protection are subjected to the process of encryption and decryption in order to provide the desired security. The original message which is to be encrypted is called plain text. This plain text is transformed by a function with the encryption key (K) as parameter. The plain text after the transformation that is the output of the encryption process is called as cipher text. And this cipher text or the encrypted message with key is actually transmitted.

Although an intruder listens to this message/cipher text by catching the communication channel still he cannot decrypt the cipher text because he doesn't know key. Even though he doesn't know the key still he is able to break that cipher text at times and that art of breaking ciphers is known as cryptanalysis.

The art of devising and breaking ciphers is collectively called as cryptology. The encryption methods/techniques are, divided into the following two categories,

1. Substitution Ciphers

2. Transposition Ciphers.

1. Substitution Ciphers:

In this cipher, each letter or the group of letters is replaced by another group of letters. Good instance of substitution cipher is Caesar cipher. In this cipher, a becomes D, and b becomes E and so on and the Z becomes C.

An Example is written below:

An Attack becomes DWWDFN

This general system is called the mono alphabetic substitution.

In substitution ciphers, order of letters is similar to that of plain text but just disguises them.

2. Transposition Ciphers

In contrast to the substitution ciphers, transposition ciphers read the letters but do not disguise them. The key of this cipher is a word, having no repeated letters. An instance of a transposition cipher text is given below.

1627_cipher.png


The main purpose of the key is to number the columns. The plain text is in rows and cipher text is prepared by assembly letters in columns.

Onetime Pads is defined below:

There is a simple way of constructing an unbreakable cipher. The procedure is initiated with the choice of a random bit string as key. Converting plaintext into a bit string and computhexc1usjve OR operation for these two strings This method/technique is known as Onetime Pad.

Posted Date: 7/20/2012 6:10:35 AM | Location : United States







Related Discussions:- Explain transposition ciphers and substitution cipher, Assignment Help, Ask Question on Explain transposition ciphers and substitution cipher, Get Answer, Expert's Help, Explain transposition ciphers and substitution cipher Discussions

Write discussion on Explain transposition ciphers and substitution cipher
Your posts are moderated
Related Questions
Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

PACKETS: Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.  FRAME: A hardware frame or

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Australian government sites were mandated to conform to at least single 'A' level of the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) standards, by the end of

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c