Nis 3rd Chapter
Nis 3rd Chapter
plain text:
plain text refers to any data or message that is stored or transmitted without
encryption. It is readable by humans and machines without needing decryption.
In network and information security, plain text (or plaintext) refers to data that is
in its original, readable, and unencrypted form. This means that anyone who
intercepts or accesses the data can read and understand it without needing any
decryption process.
Key Concepts:
5. kotlin
6. Hello, this is a secret message.
Ciphertext
Ciphertext in network and information security refers to data that has been
encrypted using cryptographic algorithms to protect its confidentiality. When
plaintext is transformed into ciphertext, it becomes unreadable to anyone who does
not possess the correct decryption key. This ensures that sensitive information,
such as passwords, financial transactions, and private communications, remains
secure from unauthorized access. Various encryption methods, including
symmetric and asymmetric cryptography, are used to convert plaintext into
ciphertext. In secure communication protocols like SSL/TLS, ciphertext plays a
crucial role in safeguarding data transmitted over the internet. By employing strong
encryption techniques, organizations and individuals can prevent cyber threats
such as eavesdropping, data breaches, and identity theft. However, encryption
strength depends on factors such as key length and algorithm complexity. While
ciphertext enhances security, it also requires proper key management and
authentication mechanisms to ensure authorized decryption and access to critical
data.
1. Encryption Process:
o Plaintext (original message) → Encryption Algorithm + Key →
Ciphertext (unreadable data)
2. Decryption Process:
o Ciphertext → Decryption Algorithm + Key → Plaintext (original
message)
Cryptography:
2. Types of Cryptography
Uses a pair of keys: a public key for encryption and a private key for
decryption.
Provides secure key exchange and digital signatures.
Examples:
o RSA (Rivest-Shamir-Adleman)
o ECC (Elliptic Curve Cryptography)
o Diffie-Hellman Key Exchange
3. Cryptographic Hash Functions
Hash functions generate a fixed-size output (hash) from an input message, ensuring
data integrity. These functions are one-way and collision-resistant.
Examples:
o SHA-256 (Secure Hash Algorithm-256)
o MD5 (Message Digest 5) [Not Secure for Modern Use]
o SHA-3
b) Digital Signatures
d) Password Security
Cryptanalysis:
Cryptanalysis is the study of analyzing and breaking cryptographic systems to
uncover hidden information, such as plaintext messages or cryptographic keys. It
plays a crucial role in network and information security by evaluating the
strength of encryption algorithms and ensuring data confidentiality, integrity, and
authenticity.
1. Purpose of Cryptanalysis
Cryptology:
Cryptology is the study of techniques for secure communication, ensuring that
information is protected from unauthorized access or tampering. It is a
combination of two fields:
Types of Encryption
Decryption:
Decryption is the process of converting encrypted or encoded data (ciphertext)
back into its original, readable form (plaintext). It is the reverse of encryption,
which transforms plaintext into ciphertext to protect it from unauthorized access.
Example:
Substitution techniques are cryptographic methods used to enhance data security by replacing
elements of plaintext with ciphertext according to a specific rule. These techniques are widely
used in encryption algorithms to protect sensitive information from unauthorized access.
These ciphers are simple forms of encryption used in early cryptographic methods.
1. Caesar Cipher
o Each letter in the plaintext is shifted by a fixed number of positions in the
alphabet.
o Example (Shift = 3):
Plaintext: HELLO
Ciphertext: KHOOR
2. Monoalphabetic Cipher
o A more complex form where each letter is replaced with a different fixed letter
(not just shifted).
o Example:
Plaintext: HELLO
Ciphertext: XUBBE (random substitution)
3. Playfair Cipher
o Uses a 5x5 grid of letters (key square) to encrypt digraphs (pairs of letters) instead
of single letters.
o Example:
Plaintext: HELLO WORLD → HE LL OW OR LD
Each pair is substituted based on the Playfair rules.
4. Vigenère Cipher
o Uses a key phrase to determine shifts for each letter based on multiple Caesar
shifts.
o Example:
Key: KEYKEYK
Plaintext: HELLO
Ciphertext: RIJVS
5. One-Time Pad (OTP)
o A theoretically unbreakable cipher where a random key (equal in length to the
message) is used for substitution.
o Used in military applications for maximum security.
In modern cryptography, substitution is used in block and stream ciphers to enhance security.
Transposition Techniques:
Steganography:
Steganography is defined as which involves caching of secret
information. This word is derived from two Greek words- ‘stegos’
meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating
to ‘covered writing’, or ‘hidden writing’. The sensitive information
will also be uprooted from the ordinary train or communication at
its discovery. With the help of Steganography, we can hide any
digital thing like textbook, image, videotape, etc behind a medium.
Different Types of Steganography
Text Steganography
Text Steganography is defined as a type of steganography which
involves caching dispatches or secret information within a textbook
document or other textual data. In this system, we try to hide
secret data with the help of each letter of the word. It is
challenging to describe especially when the variations or changes
made are subtle.
Image Steganography
Image Steganography is defined as a type of steganography which
involves caching dispatches or secret information within digital
images. It is achieved by making changes in the pixels of the image
to render the information. It is generally used for watermarking,
covert communication, brand protection, etc.
Audio Steganography
Audio Steganography is defined as a type of steganography which
involves caching dispatches or secret information within audio
lines. The ideal behind using this fashion is to hide information in
such a way that people cannot notice it when they hear the audio.
It's generally used for digital rights operation in audio lines.
Video Steganography
Video Steganography is defined as a type of steganography which
involves caching dispatches or secret information within digital
videotape lines. The ideal way to use Video Steganography is to
detect secret information in a videotape in such a way that normal
people won't notice it.
Network or Protocol Steganography
Network or Protocol Steganography is defined as a type of
steganography which involves caching dispatches or secret
information within network protocols or dispatches. It tries to hide
secret information in the usual inflow of internet or network
exertion so that nothing can describe it.
Advantages of Steganography
It offers better security for data sharing and
communication.
It's veritably important delicate to descry. It can only be
detected by the receiver party.
It can apply through colorful means like images, audio,
videotape, textbook,etc.
It plays a vital part in securing the content of the
communication.
It offers double subcaste of protection, first being the train
itself and second the data decoded.
With the help of Steganography advanced functional
agency can communicate intimately.
Difference between Steganography and
Cryptography
Steganography Cryptography
Definition Uses a single key for both encryption Uses a pair of keys: a public
and decryption. key for encryption and a
private key for decryption.
Key Usage Same key is shared between sender Public key is shared, but
and receiver. private key is kept secret.
Security Less secure because if the key is More secure as private key
compromised, all communications are remains confidential.
exposed.
Key Distribution Difficult, as the key must be securely Easier, as only the public
shared between parties key needs to be shared.