Unit 3
Unit 3
✅ 4 Marks Answer:
Plain text is the original, readable message or data that is understandable to humans or
machines. It has not been encrypted or modified in any way.
Cipher text is the encrypted version of the plain text. It is unreadable and appears as random
data unless decrypted using a proper key.
Example:
Conclusion:
The purpose of converting plain text to cipher text is to protect data from unauthorized
access. Only someone with the correct decryption key can retrieve the original message.
---
✅ 4 Marks Answer:
Cryptography is the science of securing information by converting it into an unreadable format
to prevent unauthorized access.
Main purposes:
1. Confidentiality: Ensures that only authorized users can read the data.
Conclusion:
---
Uses a public key for encryption and a private key for decryption.
Example: RSA
3. Hash Functions:
Converts data into a fixed-length hash value. It is irreversible and mainly used for integrity
checks.
Hides the existence of the message, often by embedding it within images or audio files.
Conclusion:
Each technique has different use cases and security strengths depending on the requirement of
the system.
---
✅ 4 Marks Answer:
Caesar Cipher is a simple substitution cipher that replaces each letter in the plain text by
shifting it a fixed number of positions in the alphabet.
Working:
Replace each letter with the one three positions ahead in the alphabet.
A → D, B → E, C → F, ..., X → A
Example:
Limitations:
Conclusion:
Though simple, Caesar Cipher is a foundation for understanding classical encryption techniques.
---
✅ 4 Marks Answer:
Both are classical encryption techniques but differ in how they manipulate plain text.
Substitution Technique:
Each character or group of characters in the plain text is replaced with a different character
or symbol.
The order of characters remains the same.
Transposition Technique:
Characters remain the same, but their positions are shuffled according to a key.
Conclusion:
Substitution changes the identity of characters, while transposition changes their position,
both aiming to conceal the original message.
---
✅ 4 Marks Answer:
Columnar Transposition is a transposition cipher where the plain text is written in rows, and
the columns are rearranged based on a secret key.
Steps:
Key: 4312
Matrix:
4312
HELL
OWOR
LD
Read columns in key order (1→L, 2→L, 3→E, 4→H) to get the cipher text.
Conclusion:
Columnar transposition hides the original message by altering the order of characters while
preserving the actual letters.
---
✅ 4 Marks Answer:
A digital signature is a cryptographic technique used to validate the authenticity and integrity
of a message or document.
How it works:
3. The encrypted hash becomes the digital signature and is sent with the message.
At the receiver’s end:
The receiver decrypts the signature using the sender’s public key.
Conclusion:
Digital signatures prove the sender’s identity and ensure the message was not tampered with
during transmission.
---
✅ 4 Marks Answer:
Steganography hides the existence of the message rather than encrypting it. Common
techniques include:
The message is embedded into the least significant bits of image or audio files.
2. Text Steganography:
Hides data within text using whitespace, altered font styles, or hidden characters.
3. Image Steganography:
Embeds information in image pixels that are indistinguishable to the human eye.
4. Audio/Video Steganography:
Conceals information in sound or video files using techniques like echo hiding or phase coding.
Conclusion:
Steganography ensures covert communication and is often used with cryptography for
enhanced security.
---
✅ 4 Marks Answer:
Symmetric cryptography, also known as secret-key cryptography, uses the same key for both
encryption and decryption.
Features:
Both sender and receiver must securely share the key before communication.
Example:
Challenges:
Symmetric encryption is widely used for secure communication when speed is critical, and key
exchange is secure.