Summary of Unit 3
Summary of Unit 3
1. Cryptography Basics:
o Plain Text is the readable data, while Cipher Text is the scrambled data after
encryption.
o Encryption is converting plain text to cipher text using an algorithm and key.
o Decryption is the process of turning cipher text back into readable data using a
key.
2. Types of Cryptography:
o Symmetric Cryptography uses the same key for both encryption and decryption,
making it fast but with a challenge of securely sharing the key.
o Asymmetric Cryptography uses two keys: a public key to encrypt and a private
key to decrypt. It's more secure for key sharing but slower.
3. Substitution Techniques:
o These methods replace characters in plain text with others:
Caesar Cipher shifts letters by a fixed number (e.g., A → D).
Playfair Cipher uses a 5x5 letter matrix.
Vigenère Cipher uses a keyword to determine shifts.
Vernam Cipher (One-Time Pad) uses a random key for encryption and
decryption.
4. Transposition Techniques:
o These methods rearrange characters:
Rail Fence Cipher writes the text in a zigzag pattern.
Columnar Transposition arranges the text in columns and reads them in
a specific order.
5. Steganography:
o Unlike cryptography, steganography hides the message itself. It involves
embedding data into images or audio files in such a way that it’s invisible to the
naked eye but retrievable using special methods.
In short, cryptography ensures that information is kept secure, whether by transforming it into
unreadable formats (encryption) or hiding it in plain sight (steganography).