Questions On Symmetric Cipher And Encryption Algorithms
1. Plaintext: This is the original message or data that has to be encrypted. This is in the meaningful format so anyone can read it. Plaintext is given as input to the encryption algorithm.
2. Encryption algorithm: This algorithm takes plaintext and key as input and performs various substitutions and transformation on the input and gives cipher text as output.
3. Cipher text: This is the scrambled message which has no meaning and cannot be decoded to the original message without prior knowledge of key and algorithm.
4. Secret key: This key is confidential and input to the encryption and decryption algorithms to encrypt and decrypt the data.
5. Decryption algorithm: This algorithm is present at the receiver side which functions totally reverse to the encryption algorithm and generates the plaintext from the input of cipher text and the key.
2.2 What are the two basic functions used in encryption algorithms?
Answer: there are two main principles that are used to encrypt the plaintext
1. Substitution: In substitution each element in the plaintext is substituted with another element. In this elements may be single, pair of letters, triplets of letters, mixture of above or so forth. At the decryption side receiver performs the inverse of the substitution.
2. Transposition: transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or…

Implementation Of A Non Breakable Encryption Algorithm
1610 Words  7 Pagesfor a nonbreakable encryption algorithm desired after since the establishment of Cryptography was first matured. However, an algorithm is advised to be immune as long as there has not been found susceptibility through cryptanalysis. Symmetrickey block ciphers abide as the largest and critical aspect in many cryptographic systems. Independently, they add confidentiality. As a central construction block, their adaptability grants the manufacturing of pseudorandom stream ciphers, number generators…

Questions On Symmetric Encryption And Decrypt A Message
1220 Words  5 Pages2. Symmetric encryption: only a single key is used to both encrypt and decrypt a message. 3. Asymmetric encryption: two distinct keys, one public key and one private key are used for encryption and decryption respectively. 4. Hash functions: takes a message of any size and computes a smaller, fixedsize message called a hash. Hash functions are used to provide better performance when signing large blocks of data using asymmetric encryption, to provide integrity, in authentication protocols, and to…

Use Of Substitution Ciphers And Transposition Ciphers
1348 Words  6 PagesKaplan University IT286 Unit 6 Jennifer Polisano Question 61: Write a one half page description of the use of substitution ciphers and transposition ciphers. Use the rot13 encoding algorithm to encode the following sentence: It is critical for network administrators to understand cryptography. There are several websites that will encrypt in rot13. Answer 61: Substitution ciphers are a method of encryption by which units of plaintext are substituted with ciphertext according…

Using Encryption Algorithms That Can Be Used For Protecting Data
1403 Words  6 Pagesstored. However, an important question to ask is how is sensitive or important data being protected. One popular method that is currently used for protecting data is through encryption, which is “the process of converting data to an unrecognizable or ‘encrypted’ form.” 1 This process ensures that only authorized individuals have access to the confidential encrypted message. Encryption can be applied to files, folders, storage devices, or entire volumes. Although encryption can be used to protect a variety…

Data Encryption Essay
781 Words  4 PagesEncryption Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for…

Cryptography : Using Encryption Decryption Technique
2886 Words  12 Pagestechniques which we are used getting more complex. EncryptionDecryption technique: Recent cryptography uses mathematical algorithms to design it. This algorithms should design as strong as possible so that it cannot break by any other third party system. The techniques which can be used to do cryptography are microdots, merging words with images and by different symbols. One more way to achieve cryptography by ordinary text into cipher text called as encryption and getting back original information known…

Selective Encryption Algorithm for Highly Confidential Real Time Video Applications
1071 Words  5 PagesIntroduction Conventional cryptographic algorithms, which are generally aimed at encrypting like text data (known as Naïve approach) not well suited for video encryption. This is due to the fact that conventional cryptographic algorithms cannot process the large volume of video data in realtime. Selective encryption of the H.264/AVC bitstream puts decoder to fully decode the encrypted video with degradation in video quality. This perceptual encryption has low encryption and decryption time. The video data…

Why Symmetric Key Cryptography Alone Can Not Resolve Internet Security Issue?
1480 Words  6 Pages1) Discussion board I. Why symmetric key cryptography alone cannot resolve Internet security issue? Ans: Symmetric encryption,although fast, suffers from several problems in the modern digital communication environment including The biggest problem is that of a single key that must be shared in pairs of each sender and receiver. In a distributed environment with large numbers of combination pairs involved in manytoone communication topology, it is difficult for the one recipient to keep so many…

Symmetric And Asymmetric Encryption ( Ian Pierre Gomes Santos
2823 Words  12 PagesSymmetric and Asymmetric Encryption Ian Pierre Gomes Santos 1. Introduction When it comes to information and about this concept related to the digital medium, particularly in the use of public computer networks like the Internet, various services relevant to human’s credibility in computing systems are performed. In fact, they are really important in the fundamentals of security information that are defined by the availability, integrity, confidentiality, authentication, nonrepudiation, and…

Hybrid Cryptography Using Symmetric Key Encryption
2464 Words  10 PagesHybrid cryptography using symmetric key encryption Sean laurel rex bashyam1, karthik Shankar2 ,Saitheja kadiyala3 Dept. of electrical engineering1,3 Dept. of computer science2 {skadiyal ,sbashyam ,kshankar}@my.bridgeport.edu professor Abdelshakour Abuzneid Dept. of computer engineering University of bridgeport Bridgeport , CT abuzneid@bridgeport.edu Abstract— Crucial methods are employed to deploy the majority networks to acquire the data. Modern improvements stores, transfer data…
More about Questions On Symmetric Cipher And Encryption Algorithms

Implementation Of A Non Breakable Encryption Algorithm
1610 Words  7 Pages 
Questions On Symmetric Encryption And Decrypt A Message
1220 Words  5 Pages 
Use Of Substitution Ciphers And Transposition Ciphers
1348 Words  6 Pages 
Using Encryption Algorithms That Can Be Used For Protecting Data
1403 Words  6 Pages 
Data Encryption Essay
781 Words  4 Pages 
Cryptography : Using Encryption Decryption Technique
2886 Words  12 Pages 
Selective Encryption Algorithm for Highly Confidential Real Time Video Applications
1071 Words  5 Pages 
Why Symmetric Key Cryptography Alone Can Not Resolve Internet Security Issue?
1480 Words  6 Pages 
Symmetric And Asymmetric Encryption ( Ian Pierre Gomes Santos
2823 Words  12 Pages 
Hybrid Cryptography Using Symmetric Key Encryption
2464 Words  10 Pages