Vous êtes sur la page 1sur 4

CRYPTOGRAPHY

Cryptography means secret writing.


A cipher is a character-for-character or bit-for-bit transformation, without
regard to the linguistic structure of the message.
A code replaces one word with another word or symbol.

The encryption model (for a symmetric-key cipher)

The messages to be encrypted, known as the plaintext, are transformed by a


function that is parameterized by a key.
The output of the encryption process, known as the ciphertext, is then
transmitted, often by messenger or radio.

The art of breaking ciphers, called cryptanalysis, and the art devising them
(cryptography) is collectively known as cryptology.

A fundamental rule of cryptography is that one must assume that the


cryptanalyst knows the methods used for encryption and decryption.
The key consists of a (relatively) short string that selects one of many
potential encryptions. In contrast to the general method, which may only be
changed

every few years, the key can be changed as often as required. Thus, our basic
model is a stable and publicly-known general method parameterized by a
secret and easily changed key.

Encryption methods have historically been divided into two categories:


• Substitution ciphers
• Transposition ciphers

Substitution Ciphers

In a substitution cipher each letter or group of letters is replaced by another


letter or group of letters to disguise it. One of the oldest known ciphers is the
Caesar cipher, attributed to Julius Caesar. In this method, a becomes D, b
becomes E, c becomes F, and z becomes C. For example, attack becomes
DWWDFN.

Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z

cipher text: Q W E R T Y U I O P A S D F G H J K L Z X C V B N M

The general system of symbol-for-symbol substitution is called a


monoalphabetic substitution, with the key being the 26-letter string
corresponding to the full alphabet.
TRANSPOSITION CIPHER:
Substitution ciphers preserve the order of the plain text sysmbols but
disguise them. Transposition ciphers in contrast reorder the letters but do not
disguise them.

The following figure depicts a comman transposition cipher, the


column transposition.

M E G A B U C K
7 4 5 1 2 8 3 6
p l e a s e t r
a n s f o r o n
e m i l l i o n
d o l l a r s t
o m y s w i s s
b a n k a c c o
u n t s I x t w
o t w o a b c d

Plain text: pleasetransferonemilliondollarstomyswissbankaccountsixtwotwo

In this example, MEGA BUCK is a key. The purpose of the key is to


number the columns , column 1 being under the key letter closed to the start
of the aplphabet and so on.
ONE TIME PADS:

Constructing an unbreakable cipher is actually quite easy. The


technique has been known for decades. First choose a random bit string as
the key. Then convert the plaintext into a bit string, Finally compute the
XOR of these two strings. The resulting ciphertext cannot be broken, and
each letter will occur equally often . this method is known as one time pad.
There is simple no information in the message because all possible
plaintexts of the given length are equally likely.

QUANTUM CRYPTOGRAHY:

Quantum cryptography is based on the fact that lights come


in little packets called photons which have peculiar properties. Furthermore,
light can be polarized by passing through a polarized filter. If a beam of light
is passed through a polarizing filter, all the photons emerging from it will be
polarized in the direction of filter‘s axis. The absolute orientation of the two
filters does not matter only the angle between their axis counts.

Vous aimerez peut-être aussi