lec-5
lec-5
Encryption Decryption
Sender Network Receiver
Algorithms Algorithms
Encryption Decryption
Sender Network Receiver
Algorithms Algorithms
Plaintext Plaintext
Cipher text
(input) (output)
There are Two Requirements for
The Secure Use of Conventional
Encryption
A strong encryption algorithm is needed so
that the cost of breaking the cipher exceeds
the value of the information, and breaking
the cipher takes longer than the useful
lifetime of the information.
The sender and receiver must securely share
the same secret key, and it must remain
confidential.
Classification of Conventional
Encryption Methods
Character-level Encryption:
Substitution
Transposition
Symbol-level Encryption:
In this type, data such as text and images is
divided into blocks of symbols, and the symbols
are changed either by:
Encoding
Shuffling
Swapping
Rotation
Substitution
In this method, each letter in the message is replaced
by another letter using a simple and easy rule, known
as the Caesar Cipher or Monoalphabetic Cipher.
Caesar
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZAB C
Kd=Ke = 3
Single-letter Substitution Cipher
Sender Receiver
Ke=3 Kd=3
Encryption Decryption
Algorithms Algorithms
Add Ke Subtract Kd
Ke = Kd
Encryption Decryption
Algorithms Algorithms
Switching Switching
Plaintext Plaintext
1 2 3 4 5 6 7 8 9 1 1 1 2 3 4 5 6 7 8 9 1 1
0 1 0 1
Cipher text
A G O O D G O O D A GOOD G O OD
1 2 3 4 5 6 7 8 9 1 1
F R I E N D I S 0 1 F R I END I S
B E T T E R T H A N D G G O A O O O D B E T T E R T H AN
D I I N F S R E A T R EA S U R E
A T R E A S U R E
R T T E B A H E T N
A S T U E A E R R
Symbol-level Encryption
Encoding:
A number n of symbols are input, and the
decoder changes them into 2n symbols, each
containing the symbol once, with its position
determined by the input.
Input Input
2x4 Decoder
4x2 Encoder
Output
Output
XOR Process
It is a good method for symbol-level encryption,
where a XOR process is done to the data with an
encryption key to produce an encrypted set that can
only be decrypted by knowing the key.
Synchronization
0 1 1 0 0 1 0 0 1 1 0 0 1 0
Data Data
1 0 1 1 0 0 1 1 0 1 1 0 0 1
Encryption Decryption
Rotation
A method of rotating the symbols to the right
or left, where the key is the number of symbols
to be rotated.
Plaintext 01100011 Before
Enterprise
Network Firewall
Internal External
Security
LAN LAN
Firewalls
A firewall consists:
Two Routers: They perform filtering and
sorting of data packets.
Application Gateway