logo

Types of Cipher Methods: Substitution, Vernam, Transposition, Book-Based Ciphers, and Cryptographic Hash Function

   

Added on  2023-05-27

6 Pages847 Words247 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author Note:

CYBER SECURITY
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Substitution Cipher......................................................................................................................3
Vernam Cipher.............................................................................................................................3
Transposition Cipher...................................................................................................................4
Book-Based Ciphers....................................................................................................................4
Cryptographic Hash function.......................................................................................................4
Conclusion.......................................................................................................................................5
Reference.........................................................................................................................................6

CYBER SECURITY
Introduction
The foremost determination of the paper is to focus on the different types of cipher
methods such as the substitution method, vernam method, book based cyphers and the hash
function. Different aspects of these encryption methods will be discussed in a professional
manner in this paper.
Discussion
Substitution Cipher
It is defined as the type of encryption method which involves the replacement of the plain
texts with the cipher texts. The units are single letters, pair of letter, triplets of letters regarding
this type of substitution cipher. The encryption method of the substitution cipher is generally
compared with the transposition (Parvin, Seyedarabi & Shamsi, 2016). The units of the paper are
re-arranged in a complex order in this type of encryption method. The categories of substitution
cipher are Polyalphabetic cipher, monoalphabetic cipher and polygraphic substitution.
Vernam Cipher
It is defined as the type of encryption method which is very difficult to be decrypted, it is
considered as one of the most important encryption method, it involves a one-time pre shared
key which is same as the size of the message sent. A random secret key is attached with the
message and each bit if the character of the plain text and the total is encrypted by combining it
with the corresponding character with the help of a process known as the modular addition.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introduction to Cryptography and Security Mechanisms
|33
|5553
|256

Principle and Method in Cryptographic Security
|5
|1246
|13

Encryption Techniques Assignment 2022
|9
|2287
|7

Security in Computing and IT in PDF
|13
|2776
|33

Foundation of Cyber Security
|23
|5334
|304

World Interoperability Assignment PDF
|6
|1956
|35