Applications of Cryptography to Security

• The science and art of manipulating messages to make them secure is called

cryptography.

• Original message to be transformed is called plaintext.
• Resulting message after the transformation is called ciphertext.
• Process of converting plaintext to ciphertext is called encryption
• Reverse process is called decryption
• Algorithm used for encryption and decryption is called Cipher.

Ex : Substitution and Transposition Ciphers Substitution Cipher

• Substitution ciphers are a common technique for altering messages in games and
puzzles.
• Each letter of the alphabet is mapped into another letter.
a b c d e f g h i j k l m n o p q r s t u v w x y z
z y x w v u t s r q p o n m l k j i h g f e d c b a

Transposition Cipher :
• Here the order in which the letters of the message appear is altered.
• Substitution and transposition techniques are easily broken.

Cryptographic method must meet several requirements
1. It must be easy to implement
2. It should be deployable on large scale
3. It must provide security to all of its users.
4. It should prevent an attacker from deriving the key even when a large sample of the plaintext and corresponding ciphertext is known

Cryptography is best known as a way of keeping the contents of a message secret.
Confidentiality of network communications, for example, is of great importance for ecommerce and other network applications.. In particular, cryptography allows the network business and customer to verify the authenticity and integrity of their transactions. If the trend to a global electronic marketplace continues, better cryptographic techniques will have to be developed to protect business transactions.

Cryptography is best known as a way of keeping the contents of a message secret.
Confidentiality of network communications, for example, is of great importance for ecommerce and other network applications.. In particular, cryptography allows the network business and customer to verify the authenticity and integrity of their transactions. If the trend to a global electronic marketplace continues, better cryptographic techniques will have to be developed to protect business transactions.


Sensitive information sent over an open network may be scrambled into a form that cannot be understood by a hacker or eavesdropper. This is done using a mathematical formula, known as an encryption algorithm, which transforms the bits of the message into an unintelligible form. The intended recipient has a decryption algorithm for extracting the original message. There are many examples of information on open networks, which need to be protected in this way, for instance, bank account details, credit card transactions, or confidential health or tax records.

0 comments