Cryptology Series Part 4: Methods of Encryption

Methods of Encryption

I was unable to use the editor for this post, instead I had to use Markdown, so I apologize if there are formatting issues.

If you are new to my Cryptology Series or are having trouble with any of the terminology, I encourage you to go to my blog and check out parts 1,2 and 3. Now let's get started!

Substitution Ciphers

Replaces bits, characters or blocks with different bits, characters or blocks.
Caesar cipher is a substitution cipher
Eample CAT=FDW

Transposition/ Permutation Cipher

Values are scrambled or put into a different order
Uses P boxes
Example. CAT=TCA Key=312

Substitution and transposition ciphers are relatively weak because of frequency analysis.
In every language certain letters are used more often than others and in certain patterns, computers can perform frequency analysis to reconstruct text.

Multi product cipher

A stronger cipher is multi product which combines both substitution and transposition.
Example.

Plain Text= CAT

Substitution=FDW

Transposition=312

Multi product = WFD

Methods of Encryption

Symmetric Cryptography

Uses symmetric keys known as secret keys, sender and receiver use two instances of the same key
Benefit: much faster and less computationally intensive
Weakness: Secure key distribution

Asymmetric Cryptography
Two different asymmetric keys that are mathematically related
One public and one private key
Benefit: better key distribution
Weakness: slower

Hybrid Encryption

Public key cryptography uses two keys, a public key generated by an asymmetric algorithm and a private key generated by a symmetric algorithm.
Symmetric is used for bulk encryption
Asymmetric is used to encrypt the private key for secure key distribution

Block Ciphers

Message is divided into blocks of bits, then put through the mathematical functions one block at a time.

Stream Cipher

Stream ciphers process messages a bit or byte at a time when en/decrypting
Stream ciphers use a key stream generators, which produce a stream of bits that is XORed with the plaintext bits to produce ciphertext.

Confusion vs Diffusion

Confusion is commonly carried out through substitution.
Makes the relationship between the key and the resulting cipher text, making it complex so key cannot be identified
Diffusion is carried out by using transposition.
dissipates statistical structure of plaintext over bulk of cipher text

Avalanche Effect

Avalanche Effect- if the input to an algorithm is slightly modified then the output of the algorithm is changed significantly

Cryptographic Transformation

Initialization Vectors- random values in algorithm used to ensure patterns are not created in the encryption process.
Compression- reduce redundancy before PT is encrypted.
Expansion- expanding the PT by duplicating values. Commonly used to increase PT size to map key sizes.
Padding- adding material to PT before it is encrypted.
Key mixing-using a portion (subkey) of a key to limit the exposure of the key. Key schedules are used to generate sub keys

There will be a part 5 and 6 to the Cryptology Series

I will also be holding another Cryptography challenge where you can win STEEM!

I have a few other exciting projects in the works that I hope you will like, stay tuned!

Follow my blog @digicrypt if you are interested in cryptocurrency, cryptology or blockchain.

DASH: XgQ9NBonMoCPKhF37agY4W8zk7gwQFnwGV

Ether: XE04RO3I0QA5UKB31OZK4O3CK3TOT03R4TM

https://logomakr.com/

H2
H3
H4
3 columns
2 columns
1 column
5 Comments