Encryption

  • Uploaded by: Dhiraj Kumar Jha
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Encryption as PDF for free.

More details

  • Words: 476
  • Pages: 14
Encryption/Decryption Algorithms

Dhiraj Kumar Jha (BCT/062/405) Uday Kumar Yadav(BCT/062/424) [email protected]   http://groups.google.com/group/cryptography

What is Encryption?  Plaintext

or clear text: message sent by the communicator  Process of encoding in such a way that the outsiders can’t read is encryption  Cipher text: Encrypted message

Why Encryption?  Internet

has a threatening

danger.  Unauthorized use of unethical hackers has made secret data communication over Internet so risky.

What is Decryption? Exactly

the opposite of ENCRYPTION The sender encodes the plaintext into cipher text (ENCRYPTION) and sends to the receiver. The receiver, in turn, needs to convert into the plain text to understand the meaning of the message.

Well Known Algorithms  Caesar

(Rot 13),  Base64,  MD5,  SHA-1  RC4, RC5, DES,3DES, Blowfish, Diamond2, RSA, Rijndael Encryption Algorithm, SHA-256

Caesar (Rot 13)  Used

to encrypt plain text composed of alphabetical characters only.  Popularly known as Rot 13.  Very weak algorithm A

B

C

D

E

F

G

H

I

J

1

2

3

4

5

6

7

8

9

10

K

L

N

O

P

Q

R

S

T

11

12

M 13

14

15

16

17

18

19

20

U

V

W

X

Y

Z

21

22

23

24

25

26

Algorithm Let

us encrypt Hello Dhiraj Now first letter is H, start your count 13 letters from it i.e. U. Similarly for others. But for O, we see, we reach Z before reaching 13 count so we will continue with A again. i.e. O corresponds to B. So, our cipher text is Uryyb Quvenw Decryption is same 13 is in

Base64 One

of the most widely used and popular. Frequently used method for the Binary data/printable string conversion. Method to convert 8-bit characters to 7-bit characters, so that they can be transferred over the Internet. The Base64 system uses the following table: Code_table[0…63] = “ABCD..XYZabcd…xyz012..9+/”

Algorithm (Base64) Encoding

Step#1:

password is cryptorzz , aim how-to encode Step#2:convert into respective ASCII values, c(99),r(114),y(121)p(112)t(116),o(11 1),r(114),z(122),z(122).  Step#3 convert the decimal number into binary form  99(01100011)114(01110010)121(0 1111001)…

Contd.. Step#4

all the binary equivalents are joined or concatenated to obtain a large set of binary numbers 01100011011100100111100101 11000001110100011011110111 00100111101001111010. Step#5 now divide into equal sections only 6-bits, 12- such set obtained

Contd… Step#6

These 6-bit groups are now converted into their equivalent decimal number. 011000(24),110111(55),… Step#7 now decimal equivalents thus obtained are now changed into their Base64 values, using Base64 alphabet chart 24(y),55(3),9(J)57(5),28(c)… “cryptorzz” equivalent to “Y3J5cHRvcnp6==“ “=“ is used as padding in Base64 encryption

IP Table

Iformation Number

of IP packets received Range of size most encountered in received IP packets Average size of IP packets received Percent of total IP packets received Number of IP packets sent Range of size most encountered

Thank you all We

look forward for your comments and suggestion at the Google group  http://groups.google.com/group/cry ptography_acem

Related Documents

Encryption
May 2020 27
Encryption
May 2020 14
Encryption
November 2019 31
Data Encryption
October 2019 25
Encryption Whitepaper
November 2019 31
Image Encryption
December 2019 15

More Documents from ""