Professional Documents
Culture Documents
Contents:
1 Multiphase Encryption Technique: An Advance Concept of Information Security
1.1 Conventional Encryption Technique (Using Caesar Cipher encryption
technique)
1.2 Multiphase Encryption Technique
o 1.2.1 Functional Description of Multiphase Encryption Technique
o 1.2.2 Benefits of Multiphase Encryption Technique
KALBHOR
Algorithm C = P + 3 (Key as Second successor of plaintext)
Cipher Text NDOERU
===Multiple Encryption Technique=== In cryptography, by encrypting a
message twice with some block cipher, either with the same key or by using two
different keys, then we would expect the resultant encryption to be stronger in all
but some exceptional circumstances. And by using three encryptions, we would
expect to achieve a yet greater level of security.For instance, the use of double
encryption does not provide the expected increase in security when compared with
the increased implementation requirements, and it cannot be recommended as a
good alternative. Instead, triple-encryption is the point at which multiple
encryptions give substantial improvements in security.
GURUKULA
Algorithm C = ((P + 3) + 3) + 3 . + 3) (N Times)
Cipher
Text
JKOCPUJW
(After
First
Cycle)
dfb
MNRFSXMZ
(After
Second
Cycle)
PQUIVAPC
(After
Third
Cycle)
.
..
ENCRYPTED N TIMES
In such a way, multiple encryptions will occur in each phase and this process will
be repeated number of times up to desired extent. So, multi-phase encryption
comprises number of such phases which are strongly protected due to multiple
encryption in each phase.
GURUKULA
Algorithm C = ((P + 1) + 3) + 5 .. (N Times)
Cipher Text HVSVLVMB (After First Cycle) KYVYOYPE (After Second
Cycle) PDADTDUJ (After Third Cycle)
.
..
ENCRYPTED N TIMES
Cryptography
Terminology
Encryption
In cryptography, encryption is the process of encoding messages (or information)
in such a way that eavesdroppers or hackers cannot read it, but that authorized
parties can.[1]:374 In an encryption scheme, the message or information (referred to
as plaintext) is encrypted using an encryption algorithm, turning it into an
unreadable ciphertext (ibid.). This is usually done with the use of an encryption
key, which specifies how the message is to be encoded. Any adversary that can see
the ciphertext should not be able to determine anything about the original message.
An authorized party, however, is able to decode the ciphertext using a decryption
algorithm, that usually requires a secret decryption key, that adversaries do not
have access to. For technical reasons, an encryption scheme usually needs a keygeneration algorithm to randomly produce keys.
There are two basic types of encryption schemes: Symmetric-key and public-key
encryption.[1]:375-376 In symmetric-key schemes, the encryption and decryption keys
are the same. Thus communicating parties must agree on a secret key before they
wish to communicate. In public-key schemes, the encryption key is published for
anyone to use and encrypt messages. However, only the receiving party has access
to the decryption key and is capable of reading the encrypted messages. [2] Publickey encryption is a relatively recent invention: historically, all encryption schemes
have been symmetric-key (also called private-key) schemes.
Modern cryptography
The modern field of cryptography can be divided into several areas of study. The
chief ones are discussed here; see Topics in Cryptography for more.
Symmetric-key cryptography
Symmetric-key cryptography refers to encryption methods in which both the
sender and receiver share the same key (or, less commonly, in which their keys are
different, but related in an easily computable way). This was the only kind of
encryption publicly known until June 1976.[18]
One round (out of 8.5) of the patented IDEA cipher, used in some versions of PGP
for high-speed encryption of, for instance, e-mail
Symmetric key ciphers are implemented as either block ciphers or stream ciphers.
A block cipher enciphers input in blocks of plaintext as opposed to individual
characters, the input form used by a stream cipher.
The Data Encryption Standard (DES) and the Advanced Encryption Standard
(AES) are block cipher designs which have been designated cryptography
standards by the US government (though DES's designation was finally withdrawn
after the AES was adopted).[20] Despite its deprecation as an official standard, DES
(especially its still-approved and much more secure triple-DES variant) remains
quite popular; it is used across a wide range of applications, from ATM
encryption[21] to e-mail privacy[22] and secure remote access.[23] Many other block
ciphers have been designed and released, with considerable variation in quality.
Many have been thoroughly broken, such as FEAL.[4][24]
Stream ciphers, in contrast to the 'block' type, create an arbitrarily long stream of
key material, which is combined with the plaintext bit-by-bit or character-bycharacter, somewhat like the one-time pad. In a stream cipher, the output stream is
created based on a hidden internal state which changes as the cipher operates. That
internal state is initially set up using the secret key material. RC4 is a widely used
stream cipher; see Category:Stream ciphers.[4] Block ciphers can be used as stream
ciphers; see Block cipher modes of operation.
Cryptographic hash functions are a third type of cryptographic algorithm. They
take a message of any length as input, and output a short, fixed length hash which
can be used in (for example) a digital signature. For good hash functions, an
attacker cannot find two messages that produce the same hash. MD4 is a long-used
hash function which is now broken; MD5, a strengthened variant of MD4, is also
widely used but broken in practice.
Public-key cryptography
Symmetric-key cryptosystems use the same key for encryption and decryption of a
message, though a message or group of messages may have a different key than