Cryptographic systems are
characterized along three independent dimensions :
- The type of operations
used for transforming plaintext to ciphertext.
All encryption
algorithms are based on two general principles: substitution, in which each
element in the plaintext (bit, letter, group of bits or letters) is mapped into
another element, and transposition, in which elements in the plaintext are
rearranged. The fundamental requirement is that no information be lost (that
is, that all operations are reversible). Most systems, referred to as product
systems, involve multiple stages of substitutions and transpositions.
- The number of keys
used.
If both sender and
receiver use the same key, the system is referred to as symmetric, single-key,
secret-key, or conventional encryption. If the sender and receiver use
different keys, the system is referred to as asymmetric, two-key, or public-key
encryption.
- The way in which the
plaintext is processed.
A block cipher processes
the input one block of elements at a time, producing an output block for each
input block. A stream cipher processes the input elements continuously,
producing output one element at a time, as it goes along.
Cryptanalysis
The process of attempting to
discover X or Y or both is known as cryptanalysis.
The strategy used by the cryptanalysis depends on the nature of the encryption
scheme and the information available to the cryptanalyst.
The following table
summarizes the various types of cryptanalytic attacks based on the amount of
information known to the cryptanalyst.
Types of Attacks on Encrypted Message
Attack
Type
|
Knowledge
Known to Cryptanalyst
|
Ciphertext
only
|
|
Known
Plaintext
|
|
Chosen
Plaintext
|
|
Chosen
Ciphertext
|
|
Chosen
text
|
|
its too good ,,,,how do u make this template so much attractive? can u tell me how to make this type of animation in the blog?
ReplyDeletemy id-diipak112233@gmail.com