logo

CRYPTOGRAPHY ANALYSIS 2022

   

Added on  2022-09-26

6 Pages1073 Words21 Views
Running head: ANALYSIS OF CRYPTOGRAPHY
ANALYSIS OF CRYPTOGRAPHY
Name of student
Name of university
Author’s note:

1
ANALYSIS OF CRYPTOGRAPHY
Introduction
Cryptography is a process of securing information and communication through applications
of codes. Only people who are involved in information sharing have access to these codes
which is required to process information and therefore capable of retrieving insight from this
information (Stinson & Paterson, 2018). This is a popular method for sharing information
that are confidential in nature and it ensure that only people who are authorized to access this
information are capable of deciding this encrypted information. There are various methods
for encrypting information and how information is encrypted and decrypted depends on a
specific cryptographic system. However, no matter which cryptographic system is applied for
encrypting information, the purpose is same which is to enhance security of information by
ensuring that it is not easy to retrieve information from encrypted data.
In modern cryptography, there are four objectives that need to be considered and these
objectives are the followings:
Confidentiality:
After information is encrypted, it should not be easy to decrypt that information by people
who are not meant to access that information (Goldreich, 2019). Therefore, ensuing
confidentiality is one of the most important aspects of cryptography.
Integrity:
After information encrypted by sender and then it is decrypted by a receiver, there should not
be any loss of information and originality of the information needs to be ensured therefore,
ensuring integrity of the information (Goldreich, 2019).

2
ANALYSIS OF CRYPTOGRAPHY
Non-repudiation:
The creator or sender who encrypt the information and send it to a receiver should not deny
intention for creating or sending that information at any stage of this process (Kraft &
Washington, 2018).
Authentication:
Sender and receiver of information should be capable of confirming their identity along with
source and destination of information for ensuring authenticity as well (Kraft & Washington,
2018).
Description of cryptographic system
The cryptographic system that is considered in this context is one-time pad encryption. This
is an encryption technique which is not possible to crack. However, to decrypt this
information, it is required to apply a one-time key that is pre-shared by the creator who has
encrypted the information (Li et al., 2017). One important thing to note in this context is this
pre-shared key needs to be of same size of message or it might be longer than size of the
message as well. In this encryption technique, first a plain text needs to be paired for this a
random key only known to creator is applied. This secret key is known as one-time pad and
therefore, this encryption technique is known as one-time pad encryption.
Each bit or character contained in plain text needs to encrypted and then it is combined with
respective bit or character of the pad through application of modular addition. In order to
ensure that chipper text obtained by applying this encryption method is impossible to decrypt
for anyone not authorized to access this system then it is important to consider some
strategies and these strategies are the following (Rahim et al., 2018):
The key that is considered for encryption has to be totally random

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Symmetric Key Encryption
|9
|2853
|351

The Assignment on Basics of Cryptography
|12
|2602
|34

Cryptographic Techniques
|6
|2878
|62

Cryptography: Basic Concepts and Its Importance in Network and Web Security
|13
|3502
|242

Analysis of Ciphers Techniques
|14
|2343
|240

World Interoperability Assignment PDF
|6
|1956
|35