TOPICS Not Present
TOPICS Not Present
Mathematics of Cryptography:
https://www.researchgate.net/publication/
373272054_Mathematics_for_Cryptography_A_Guide_to_Mathematical_Fundamentals_of_Differen
t_Classes_of_Cryptography_Algorithms
Cryptography:
However, we use the term to refer to the science and art of transforming messages to make them
secure and immune to attacks.
Although in the past cryptography referred only to the encryption and decryption of messages using
secret keys, today it is defined as involving three distinct mechanisms:
1)symmetric-key encipherment,
2)asymmetric-key encipherment,
3)and hashing
https://www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-encryption/
Cryptography is the practice of securing communication and protecting sensitive data, and
understanding the mathematical concepts behind these algorithms is crucial for working with them
effectively.
Each class of cryptography algorithms is associated with specific mathematical areas that are
essential to be familiar with.
https://www.geeksforgeeks.org/difference-between-cryptography-and-cryptology/
https://www.geeksforgeeks.org/cryptanalysis-and-types-of-attacks/
https://www.tutorialspoint.com/what-are-the-basic-terms-used-in-cryptography-in-information-
security
https://www.encryptionconsulting.com/education-center/what-are-plaintext-and-ciphertext/
Network security:
https://www.slideshare.net/slideshow/network-security-modelpptx/256555933
https://binaryterms.com/network-security-model.html
Unit 2:
Symmetric cipher:
Explain in detail about Symmetric Cipher Model.
https://www.geeksforgeeks.org/symmetric-cipher-model/
https://www.geeksforgeeks.org/block-cipher-modes-of-operation/
https://www.geeksforgeeks.org/difference-between-block-cipher-and-stream-cipher/
https://www.coursera.org/in/articles/data-encryption-standard
Full DES:
https://www.simplilearn.com/what-is-des-article#:~:text=DES%20uses%2016%20rounds
%20of,different%20key%20for%20each%20round.
There are multiple steps involved in the steps for data encryption. They are:
1. Permutate the 64-bits in the plain text and divide them into two equal halves.
4. The resultant output is sent to the further step known as S-box substitution.
5. Now apply the XOR function to the output and the left plain text and store it in the
right plain text.
6. Store the initial right plain text in the left plain text.
7. Both the LPT and RPT halves are forwarded to the next rounds for further
operations.
8. At the end of the last round, swap the data in the LPT and RPT.
9. In the last step, apply the inverse permutation step to get the cipher text
difference between symmetric key cryptography and public key cryptography is same as diff between
symmetric key cryptography and asymmetric key cryptography
RC4 algorithm:
https://www.geeksforgeeks.org/rc4-encryption-algorithm/
RC5 algorithm:
https://www.geeksforgeeks.org/rc5-encryption-algorithm/