Data Integrity in Cryptography

Introduction: – Till now you have learned about the symmetric key encryption and block ciphers. But this chapter deals with various cryptographic techniques designed for taking other security measures. Here, you will be focusing on integrity of data and various cryptographic tools and techniques implemented for achieving data integrity. What is Integrity? The very fundamental part of data security is its integrity. So data integrity can be defined as the consistency and accuracy of data that is stored in the

Read more

Block Cipher

Introduction: – In this tutorial you will learn about another kind of encryption technique that applies deterministic algorithm along with symmetric key for encryption purpose of plain text block. So let’s dig deep into it.   What is Block cipher: – Block cipher is an encryption technique which inputs a block of bits of plain text & processes to create block of bits of cipher text. Block size remain the same (fixed) for any specific scheme and the block size

Read more

Symmetric Key Encryption

Introduction: – Till now you have learned about the basic meaning and the motive behind cryptography and the various means of encrypting information. There are more to learn about encryption system. Encoding of plain text is done in two ways and the name is given based on the keys used in encryption. These are: – Symmetric key encryption and Asymmetric key encryption   In this chapter you will learn about the symmetric key encryption. In this type of cryptography, encoding

Read more

Cryptosystem Attacks and Environment

Introduction: – In this modern era of technology, right from business to health system, all runs on technology and over that, each of the systems generate a huge amount of information. Hence it becomes a important part to focus on protecting these information rom mal-activities and getting into the wrong hands. Cryptosystems deal with two of such attack types to which your information is basically subject to. These are Active attack and Passive attack Active Attacks: Active attack deals

Read more

More Traditional Ciphers : Scytale , Reverse and Row transposition Ciphers

Introduction: – In your previous chapter, you have learned about the different types of traditional ciphers. Also you have gone through two examples of such types. In this tutorial, you will traverse and learn more about these traditional cipher algorithms. So, lets begin.   Scytale Cipher: – This is one of the oldest and most commonly used message hiding techniques. It is an old Greek cipher technique where you have to round the strip of paper in a round

Read more