Explain transposition ciphers and substitution cipher, Computer Network Security

Assignment Help:

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads.

The messages which are intended to transmit secretly and securely with full protection are subjected to the process of encryption and decryption in order to provide the desired security. The original message which is to be encrypted is called plain text. This plain text is transformed by a function with the encryption key (K) as parameter. The plain text after the transformation that is the output of the encryption process is called as cipher text. And this cipher text or the encrypted message with key is actually transmitted.

Although an intruder listens to this message/cipher text by catching the communication channel still he cannot decrypt the cipher text because he doesn't know key. Even though he doesn't know the key still he is able to break that cipher text at times and that art of breaking ciphers is known as cryptanalysis.

The art of devising and breaking ciphers is collectively called as cryptology. The encryption methods/techniques are, divided into the following two categories,

1. Substitution Ciphers

2. Transposition Ciphers.

1. Substitution Ciphers:

In this cipher, each letter or the group of letters is replaced by another group of letters. Good instance of substitution cipher is Caesar cipher. In this cipher, a becomes D, and b becomes E and so on and the Z becomes C.

An Example is written below:

An Attack becomes DWWDFN

This general system is called the mono alphabetic substitution.

In substitution ciphers, order of letters is similar to that of plain text but just disguises them.

2. Transposition Ciphers

In contrast to the substitution ciphers, transposition ciphers read the letters but do not disguise them. The key of this cipher is a word, having no repeated letters. An instance of a transposition cipher text is given below.

1627_cipher.png


The main purpose of the key is to number the columns. The plain text is in rows and cipher text is prepared by assembly letters in columns.

Onetime Pads is defined below:

There is a simple way of constructing an unbreakable cipher. The procedure is initiated with the choice of a random bit string as key. Converting plaintext into a bit string and computhexc1usjve OR operation for these two strings This method/technique is known as Onetime Pad.


Related Discussions:- Explain transposition ciphers and substitution cipher

Develop firewall rules, Question requires you to develop firewall rules bas...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Documenting the results of risk assessment, Documenting the Results of Risk...

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

Layering, ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution...

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

Processing an incoming arp message, PROCESSING AN INCOMING ARP MESSAGE ...

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

Explain how inter-vlan communication, QUESTION a) A switch basically ...

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store

Public key cryptosystem based on rsa technology, Problem: (a) What is ...

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Fragmentation and path mtu, FRAGMENTATION AND PATH MTU IPv6 source is ...

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Illustrate about tinysec protocol, Illustrate about TinySec Protocol T...

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Problem of spam mail, Topic -Spam is an ever-growing problem, with some net...

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Protocols for secure communications-cryptography, Protocols for Secure Comm...

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd