logo

Cryptography Assignment 2022

This assignment requires students to do a 5-10 minute presentation on a recent academic paper on a topic related to IT Security.

8 Pages559 Words16 Views
   

Added on  2022-10-11

Cryptography Assignment 2022

This assignment requires students to do a 5-10 minute presentation on a recent academic paper on a topic related to IT Security.

   Added on 2022-10-11

ShareRelated Documents
CRYPTOGRAPHY
Cryptography  Assignment  2022_1
PUBLIC KEY AND SECRET KEY CRYPTOGRAPHY
Two major ideas used for encryptions are cryptography of public key and secret key.
Data encrypted using public key can be decrypted only with private key and data
encrypted using private key can be decrypted only with public key.
In secret key system, one single key is used only for decryption and encryption.
Transmitters and receivers have same secret key.
Cryptography  Assignment  2022_2
SUBSTITUTION CIPHERS AND TRANSPOSITION CIPHERS
In encryption algorithm, two major techniques are used in implementation of secret key
cryptography: Transposition cipher and substitution cipher.
Characters or bits are rearranged in data by transposition ciphers.
Transposition technique can be achieved by applying permutation on letters of plaintext.
Characters, bits or characters block are replaced with substation by substitution ciphers.
Substitution ciphers use single mapping which means same plaintext would have similar
ciphertext. This problem can be solved by polyalphabetic cipher with the use of multiple
substitutions.
Cryptography  Assignment  2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Techniques Assignment 2022
|9
|2287
|7

Symmetric Encryption Assignment
|5
|884
|175

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Security Challenges of Two Examples of WPAN Technologies
|10
|2284
|172

Security in Information Technology | Assignments
|13
|3545
|119

Encryption Algorithm Assignment
|6
|1103
|186