0% found this document useful (0 votes)
18 views

Cryptographic Systems

Cryptographic systems can be both simple and complex, using either simple or complex mathematics. Cryptography is the study and practice of securing communication through confidentiality, integrity, authentication, and non-repudiation techniques. It involves mathematical, computer science and engineering principles. Examples of cryptography applications include ATM cards, passwords, and e-commerce.

Uploaded by

PB
Copyright
© © All Rights Reserved
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Cryptographic Systems

Cryptographic systems can be both simple and complex, using either simple or complex mathematics. Cryptography is the study and practice of securing communication through confidentiality, integrity, authentication, and non-repudiation techniques. It involves mathematical, computer science and engineering principles. Examples of cryptography applications include ATM cards, passwords, and e-commerce.

Uploaded by

PB
Copyright
© © All Rights Reserved
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 10

Cryptographic systems

Easy not so complex Irritates sometimes

Silly most of the times(if you understand!!) Simple mathematics Complex mathematics too!!

Syllabus

Cryptography (cryptology) from Greek , "hidden, ecret"! and "#$%&', graphein, "(riting", or )*+",-, )logia, " t.dy", re pecti/ely) i the practice and t.dy of techni0.e for ec.re comm.nication in the pre ence of third partie (called ad/er arie )1 2ore generally, it i a3o.t con tr.cting and analy4ing protocol that o/ercome the infl.ence of ad/er arie and (hich are related to /ario. a pect in information ec.rity .ch a data confidentiality, data integrity, a.thentication, and non)rep.diation1 2odern cryptography inter ect the di cipline of mathematic , comp.ter cience, and electrical engineering1 5pplication of cryptography incl.de 562 card , comp.ter pa (ord , and electronic commerce1 ) o.rce 7ikipedia

Click to add text

Few real time examples


www gmail com www facebook com www google com www flipkart com

!et"s start with simple one

C#ES#$"S method of encryption

a) input text is %&#&I' ( output generated is S$F$%) (key for encryption is F) b) input text is C*!!E+E ( output generated is ,'--.!. (key for encryption is F) c) generated output is /%001F1 (key for decryption is 2) Find the input text based on first two cases

Substitution techni3ue

a)input text is #/C1EF (generated output is C$)4'* (key used for encryption is C$)4'*) b)input text is #/C1EF#/C1EF ( +E%E$#'E1 output is C$)4'*C$)4'*(again used key is C$)4'*) c)input text is 5E!C*&E ( the generated output is 6'+).,'(key for encryption is C$)4'*) d)input text is 5E!C*&E ( the generated output is 5#.!%0#(key for encryption is ,E!4) e)input text is #/C1EF+ ( generated output is C$)4'*# (key for encryption is C$)4'*) f)input text is %&#&I'%I''E ( key for encryption is help Find the generated output

$#I! FE%CE CI4,E$

"5E #$E 1ISC*6E$E1 F!EE #' *%CE" is encrypted to get 75EC$! 'EE$1 S*EEF E#*C# I61E%7 Find the output for "%I''E 5E!C*&ES )*8 #!!7

C*!8&% '$#%S4*SI'I*%

"5E #$E 1ISC*6E$E1 F!EE #' *%CE" is encrypted to get 7E6!%E #C1'0 ESE#$*F*. 1EEC8 5I$EE7 using the key 79 : ; < = >7 Find the output for 7 welcometonitte7 using the same key

You might also like