Professional Documents
Culture Documents
Various techniques researched in this era to encrypt and decrypt the secret
codes. In World War II, cryptography and cryptanalysis became with
mathematically expressions.
The military units, government organizations and some corporate houses used
the applications of cryptography. The cryptography used to protect their secret
from others. Now days the cryptography takes most important place in
communication systems in network security and the Kamasutra cipher is one of
the earliest known substitution methods. It is described in the Kamasutra around
400 BC. The purpose was to teach women how to hide secret messages from
prying eyes. The technique involves randomly pairing letters of the alphabet,
and then substituting each letter in the original message with its partner.
“Cryptography is the art and science of keeping message secure.” is the opinion
of Bruce Schneier about cryptography.
The main goal of cryptography is to hide data or information from third party or
unauthorized person. Cryptography was used to secure communication by
military leaders, spies and diplomats. But in this time the cryptography has
become more mathematical and it gives more security day-to-day.
Whats App:
Mobile is very important to us. Just like that Whats App is also most popular
mobile messaging software. Whats app is available for different platforms such
as iPhone, Android and windows phone. “End-to-end” encryption is used for
conversations and free calls in the latest version of „Whats app‟. Voice calling,
video calling and group messaging are provides for the users. It is also used in
computer by Whats app web application.
An ATM provides a simple, secure service where authorized cardholders can
withdraw cash and perform other banking transactions without visiting a bank
branch.
On the basis of action performed by the attacker, there are two attacks which are
passive and active attacks.
The Transposition technique performs some permutation over the plain text
alphabets that mean the rearrangement of letters in plain text according a rule
can make plain text message to cipher text and the receiver decrypt the message
by performing the inverse process in cipher text or in some regular pattern the
plain text characters are shifted to form cipher text. It is called as Transposition
Cipher. It creates more confusion in mind by which the cryptanalysis takes too
much time for decryption of cipher text.
The passive attack means that the unauthorized access of the information
without any interruption in communication channel and information. The sender
and receiver will be continuing with their communication but the attacker
stealing all the data at that time. It will be unbelievable and hard to recognize
also. The working process of passive attack is given below-
For decryption, the size of grid and the route used is necessary. The Route
Cipher is easy to use to jumble up a message very quickly. It has some problems
depending on what route you pick as you can end up with large chunks of
plaintext in the right order within the cipher text which gives away a lot about
the width of the grid and route used. Careful selection of the route is important.
However, for a suitably lengthy message, there are potentially infinitely many
different routes that could be taken through the grid. It is limited only by
imagination and ease of communication of the route.
An historical use of the Route Cipher was the Union Route Cipher used by the
Union forces during the American Civil War. Rather than transposing letters by
the given route, it moved whole words around. Some words, of vital importance
were not protected in this way, so they were first encoded using a codeword.
Sometimes, the cipher would even add whole null words to the cipher text,
often making the message humorous.
The requirement of data security has undergone changes in the last several
decades. The encryption at the sending end and decryption at the receiving end
of the communication system always used a secure communication system, for
which many methods have been developed to provide data security. So,
Cryptography is playing most important role in whole infrastructure of
communication system or network security. The Cryptography is an interesting
scientific topic to researched and discover more methods of it. Cryptography is
used to secure transmission of text message. The original message transferred
from sender to receiver in a secure environment. Transposition method is one of
cryptography which provides the security to data communication.
The Transposition technique performs some permutation over the plain text
alphabets that mean the rearrangement of letters in plain text according a rule
can make plain text message to cipher text and the receiver decrypt the message
by performing the inverse process in cipher text or in some regular pattern the
plain text characters are shifted to form cipher text. It is called as Transposition
Cipher. It creates more confusion in mind by which the cryptanalysis takes too
much time for decryption of cipher text.
For decryption, the size of grid and the route used is necessary. The Route
Cipher is easy to use to jumble up a message very quickly. It has some problems
depending on what route you pick as you can end up with large chunks of
plaintext in the right order within the cipher text which gives away a lot about
the width of the grid and route used. Careful selection of the route is important.
However, for a suitably lengthy message, there are potentially infinitely many
different routes that could be taken through the grid. It is limited only by
imagination and ease of communication of the route.
An historical use of the Route Cipher was the Union Route Cipher used by the
Union forces during the American Civil War. Rather than transposing letters by
the given route, it moved whole words around. Some words, of vital importance
were not protected in this way, so they were first encoded using a codeword.
Sometimes, the cipher would even add whole null words to the cipher text,
often making the message humorous.
After reviewing the various literature reviews and the base thesis, it has been
found that the ‘Zigzag Ciphers: A Novel Transposition Method’, in this thesis
the author proposed two methods rail fence and Columnar transposition. It
describes only n*n matrix (square matrix)
i.e. 5*5 and 7*7 matrix. If we want 5*4 or 7*6 matrix then there is no solution
for it. It is implemented using vb.net. The author has proposed symmetric key
transposition algorithm because in this algorithm there will be no any need of
remembering n number of public keys just like asymmetric key cryptographic
algorithm.
During result analysis proposed work has run on number of various size of text
secret information and captured overall performance on predefined parameters
which is algorithm security. There is keyless method on which researchers have
performed their experiments. Here Table I has contents text, on which security
is applied.
The working method of this attack is given in name. Man in Middle attack
means that the hacker exchanges the key to sender and receiver but they will be
aware of this type of attack. They think that they are communicating with each
other but the hacker will do his work silently at the time of when they send
requests to each other and now he knows all communication. There will be
more confusion between sender and receiver.
The dictionary attack is a simplest method of attack if the attacker has been
successful to find out the dictionary of cipher text, then the attacker find out the
plaintext very easily way. Because in this type of attack, the cipherer creates a
dictionary in which there will be cipher text corresponding their plaintext.
After reviewing the various literature reviews and the base thesis, it has been
found that the ‘Zigzag Ciphers: A Novel Transposition Method’, in this thesis
the author proposed two methods rail fence and Columnar transposition. It
describes only n*n matrix (square matrix)
i.e. 5*5 and 7*7 matrix. If we want 5*4 or 7*6 matrix then there is no solution
for it. It is implemented using vb.net. Therefore to overcome this problem, the
NEWSO transposition method has been discovered.
“Engineering post graduates are highly competent with their technical skills, but
they lack the practical/research exposure, when they first step in to the industry”
– this is a very common phrase within the industry. The primary objective of
Dissertation is to overcome such problems faced by a post graduates.