ENCRYPTION/DECRYPTION SYSTEMS
                                                                by
                                                                KAUSTUBH JOSHI (02007018)                                                              VIKRANT KULKARNI (02007021)
                                                             GOURAV DHAVALE (02D07009)
INTRODUCTION:
Communication is one of the most important aspects of human behaviour.
The ability to
express our thoughts in a written form is a distinguishing
feature of human
communication. The need naturally arises to conceal
sensitive information from
illegitimate eyes. This is where the science of
cryptography steps in.
Cryptography is the practice and study of encryption and decryption –
encoding
data so that it can be understood only by specific individuals. A
system for
encrypting and/or decrypting is a cryptosystem. These usually
involve an
algorithm for combining the original data (plain text) with one or
more keys –
numbers or strings of characters known by the sender and/or
recipient. The
resulting output is called the cipher text. We now proceed to
examine this class of
objects from a signals and systems point of view.
A cryptographic system is
defined by an algorithm concerning the cryptographic system.
This system takes string characters (say decimal
numbers) as input signal. These
characters are taken from a set of finite
cardinality. The output signal is the
corresponding encrypted string (or
decrypted string in case of decryption
systems) that need not have same
number of characters as the input and whose
domain of characters need not
be the same. The independent variable for both
input & output signals is position of the character in the corresponding string.
The characters
represent weights attached to the position.
A cryptosystem must be invertible that is, an inverse system must exist for it
being practically useful. For, what use is an encoding system when the
cipher text
can not be decoded to get back the original message? An
important issue that
comes up is that a third party must not be able to decode
an encoded message.
This brings in the notion of security of the system that
is the degree of its
vulnerability to unauthorized attacks.
While examining an
algorithm for security we must take into
account the fact that a potential
hacker has complete knowledge of the
encryption system being used and
only does not know the key being used. This is
the statement of the Kerckhoff’s Principle and usually is an extreme assumption.
When dealing with cryptographic systems it is important to note that the
system
is represented by an algorithm which typically requires a string
(‘key’) as a priori
input.
Thus, each algorithm is actually a collection of ‘m’ systems (here systems is in the
context of this course) where ‘m’ is the size
of the key space of the algorithm.
![](images/ppt22image1.1.JPG)
|