Cyber Security Report: An Analysis of Various Cipher Methods

Verified

Added on  2023/05/27

|6
|847
|247
Report
AI Summary
This report delves into the realm of cyber security, focusing on various cipher methods. It begins by defining and explaining substitution ciphers, highlighting their role in replacing plaintext with ciphertext. The report then moves on to the Vernam cipher, emphasizing its strength through the use of a one-time pad. It also covers transposition ciphers, detailing how they rearrange the order of text units. Book-based ciphers, which use word locations for encryption, are also examined. Finally, the report discusses cryptographic hash functions, explaining their function in converting inputs into alphanumeric strings and their application in data indexing. The report concludes by summarizing the applicability of these encryption techniques based on specific needs and requirements.
Document Page
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Substitution Cipher......................................................................................................................3
Vernam Cipher.............................................................................................................................3
Transposition Cipher...................................................................................................................4
Book-Based Ciphers....................................................................................................................4
Cryptographic Hash function.......................................................................................................4
Conclusion.......................................................................................................................................5
Reference.........................................................................................................................................6
Document Page
CYBER SECURITY
Introduction
The foremost determination of the paper is to focus on the different types of cipher
methods such as the substitution method, vernam method, book based cyphers and the hash
function. Different aspects of these encryption methods will be discussed in a professional
manner in this paper.
Discussion
Substitution Cipher
It is defined as the type of encryption method which involves the replacement of the plain
texts with the cipher texts. The units are single letters, pair of letter, triplets of letters regarding
this type of substitution cipher. The encryption method of the substitution cipher is generally
compared with the transposition (Parvin, Seyedarabi & Shamsi, 2016). The units of the paper are
re-arranged in a complex order in this type of encryption method. The categories of substitution
cipher are Polyalphabetic cipher, monoalphabetic cipher and polygraphic substitution.
Vernam Cipher
It is defined as the type of encryption method which is very difficult to be decrypted, it is
considered as one of the most important encryption method, it involves a one-time pre shared
key which is same as the size of the message sent. A random secret key is attached with the
message and each bit if the character of the plain text and the total is encrypted by combining it
with the corresponding character with the help of a process known as the modular addition.
Document Page
CYBER SECURITY
Transposition Cipher
It is defined as the type of encryption method in which the location of each unit of the
text are shifted according to a regular system in such a way that so that the cipher text establishes
a transformation of the plain texts (Muhammad et al., 2016). There are different types of
transposition encryption methods such as the columnar transposition, double transposition,
Myszkowski transposition and disrupted transposition.
Book-Based Ciphers
It is defined as the type of encryption technique in which the words of a text are usually
replaced with the help of the location of the words. The book ciphers may be also termed as the
codes. However, there is a difference between a cipher and a code (Musa, 2018). The codes are
always meant to be kept secret and the cipher usually changes letters or bits in a message.
Choosing the key is one of the most important aspect of the book based ciphers. In case of any
hidden activity such as spying this kinds of encryption technique are used.
Cryptographic Hash function
It is defined as the type of encryption method which takes an input in a form of a message
and returns an alphanumeric string. The string which is returned is known as the hash value. The
original value of the data can be indexed with the help of the cryptographic hash function
(Guesmi et al., 2016). This kind of encryption technique is a one-way technique. In this type of
encryption method, the larger keys are converted into smaller ones with the help of the hash
functions. The value of this encryption technique are stored in a data structure table known as the
hash table.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY
Conclusion
The paper helps in concluding the different aspects of the cipher methods. It can also be
concluded that all these type of encryption techniques can be successfully applied according to
the needs and requirement. The each of the discussed different types of encryption techniques
have different specifications which can be understood in a detailed way with the help of the
paper.
Document Page
CYBER SECURITY
Reference
Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2016). A novel chaos-based image
encryption using DNA sequence operation and Secure Hash Algorithm SHA-2.
Nonlinear Dynamics, 83(3), 1123-1136.
Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2016). A novel magic LSB
substitution method (M-LSB-SM) using multi-level encryption and achromatic
component of an image. Multimedia Tools and Applications, 75(22), 14867-14893.
Musa, S. M. (2018). Network Security and Cryptography. Stylus Publishing, LLC.
Parvin, Z., Seyedarabi, H., & Shamsi, M. (2016). A new secure and sensitive image encryption
scheme based on new substitution with chaotic function. Multimedia Tools and
Applications, 75(17), 10631-10648.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]