Inofrmation Security
Inofrmation Security
Replaces each letter or symbol with another Rearranges the positions of letters or symbols
letter or symbol. in the message.
The letters in the message are changed to The original letters remain the same but their
other letters. positions are shuffled.
Alters the identity of the characters (e.g., A → Maintains the original characters but in a
D, B → E). different order.
Easier to break if the pattern of substitution is Generally harder to break without knowing
known. the exact rearrangement pattern.
_________________________________________________________________________________________
2.Define cryptology.
In simple terms, cryptology covers both the creation and breaking of secret codes to protect or
reveal information.
_________________________________________________________________________________________
For example, in a secure encryption algorithm, if you modify one bit of the plaintext, the
resulting ciphertext should look completely different. This property is crucial for strong
encryption because it prevents attackers from predicting the original message based on slight
variations in encrypted data.
In summary, the avalanche effect ensures that encryption is highly sensitive to input changes,
enhancing security by making it difficult to analyze or reverse-engineer the algorithm.
_________________________________________________________________________________________
4.What is Brute Force Attack?
1. Time-consuming: Since it involves testing all possible combinations, it can take a long
time, especially if the password or encryption key is long or complex.
2. No skill required: Unlike other attacks that exploit vulnerabilities, brute force only
requires computing power and time.
_________________________________________________________________________________________
The Vernam Cipher, also known as the one-time pad, is a type of symmetric key cipher
where each character of the plaintext is combined with a random character from a key to
produce the ciphertext. The key is as long as the message and is used only once, making the
cipher theoretically unbreakable if used correctly.
1. Plaintext and Key: Each character in the plaintext is paired with a random character
from the key, and both are converted to binary form.
2. XOR Operation: The binary values of the plaintext and the key are combined using an
XOR (exclusive OR) operation. This operation outputs the ciphertext.
3. Decryption: To decrypt, the same key is used, and the XOR operation is applied again to
recover the original plaintext.
Important Characteristics:
• Perfect Security: When the key is truly random, as long as the message, and used only
once, it provides perfect secrecy, meaning the ciphertext gives no information about the
plaintext.
• Key Distribution: The challenge lies in securely sharing and storing the key, as it must
be as long as the message and never reused.
In summary, the Vernam cipher is a perfectly secure encryption method when used with a
random one-time key, but practical difficulties in key management limit its widespread use.
_________________________________________________________________________________________
6. Define symmetric key encryption .
Symmetric Key Encryption is a type of encryption where the same key is used for both
encrypting and decrypting the data. In this method, the sender and the receiver share a secret
key that is kept private, and both use it to encode and decode the information.
Key Points:
1. Same Key: The same secret key is used to encrypt the plaintext into ciphertext and
decrypt the ciphertext back into plaintext.
3. Key Sharing: The challenge is securely distributing and managing the key between the
communicating parties, as anyone with the key can decrypt the message.
In summary, symmetric key encryption relies on a single key shared between sender and
receiver for secure communication.
_________________________________________________________________________________________
Confusion Diffusion
Confusion hides the relationship between the Diffusion spreads the plaintext's structure
plaintext and the ciphertext. across the ciphertext.
It makes the ciphertext complex by mixing the It ensures that changing a single bit of
values, ensuring that each bit of the ciphertext the plaintext changes many bits in the
depends on several parts of the key. ciphertext.
Goal: Make it hard to predict how the key Goal: Make it hard to trace patterns from the
affects the ciphertext. ciphertext back to the plaintext.
Assignment – 2
1.
_________________________________________________________________________________________
2.
_________________________________________________________________________________________
Assignment – 3
_________________________________________________________________________________________
_________________________________________________________________________________________
Assignment – 4
_________________________________________________________________________________________
2. What is Hash Function? Write down the basic uses of Hash Function.
A hash function is a cryptographic algorithm that takes an input (or "message")
and produces a fixed-size string of bytes, typically in the form of a hexadecimal number.
The output, known as the hash value or hash digest, uniquely represents the input
data. Hash functions are designed to be fast and efficient, and they provide specific
properties that make them useful in various applications.
Basic Uses of Hash Functions
1. Data Integrity:
o Hash functions are used to verify that data has not been altered. By
comparing the hash value of original data with that of received data, any
changes can be detected.
2. Digital Signatures:
o In digital signatures, hash functions are used to create a digest of the
message. The hash digest is then signed, allowing recipients to verify both
the integrity and authenticity of the message.
3. Password Storage:
o Instead of storing plaintext passwords, systems store hashed versions.
When a user logs in, the entered password is hashed, and the hash is
compared to the stored hash, enhancing security.
4. Cryptographic Applications:
o Hash functions are essential in various cryptographic algorithms and
protocols, including public key infrastructure (PKI), blockchain, and
secure communication protocols.
5. Data Deduplication:
o Hash functions help identify duplicate data by generating hash values for
files or data blocks. If two inputs produce the same hash, they are likely
identical.
6. Checksum Generation:
o Hash functions can be used to create checksums for error-checking in
data transmission, ensuring that data remains intact during transfer.
7. Randomness and Load Balancing:
o Hash functions can distribute data evenly across resources, such as in
load balancing or consistent hashing scenarios in distributed systems.
_________________________________________________________________________________________
Assignment – 5
_________________________________________________________________________________________
_________________________________________________________________________________________