What Is Encryption And Decryption?

1867 Words4 Pages

Ch 4 Encryption
4.1 Introduction
Cryptography is the common term given to the art and science of keeping the text messages secret. It is not the purpose to evaluate in detail any of the mathematical algorithms that are used in the cryptographic process, but instead to provide a general view of the process and its uses. To introduce briefly one of the fundamental building blocks of all network security, one must know the process of encryption and decryption. A process that transforms the given information (the plaintext) into a seemingly meaningless form (the ciphertext) using a mathematical algorithm and some secret information (the encryption key). The process of decryption revokes this transformation using a mathematical algorithm, in conjunction with some secret value (the decryption key) that reverses the effects of the encryption algorithm. An encryption algorithm and all its possible keys, plaintexts and cipher texts is known as a cryptosystem or cryptographic system. Figure 4 illustrates the process.

There are two main characteristics for cryptography:
1. It should be computationally infeasible to derive the plaintext from the cipher text without knowledge of the decryption key.
2. It should be computationally infeasible to derive the cipher text from the plaintext without knowledge of the encryption key.

Modern encryption systems are obtained from one of two basic systems: symmetric key (sometimes called shared key) systems, and asymmetric key (often called public key) systems. An encryption process the sender and receiver share a single and common key that is used to encrypt and decrypt the message, then is called as symmetric key systems. Symmetric-key systems are simpler and faster, but their main drawback is th...

... middle of paper ...

...stage, and compares with D-Shuffle sort in the next stage and the results are now compared and discussed below
 The proposed new sorting method for secured message passing compares by Bubble sorting technique is achieved by 97.05% . The improvement reflects the efficiency and simplicity of direct substituition of sorting technique.

Figure 6. Comparison of Bubble sort based encryption with D-Shuffle sort

4.6 Conclusions
In the area of cryptography, a new idea has been incorporated with sorting technique to encrypt the text message for secured communication. This new study has involved a direct substitution, fast and secured message passing system. The fast and secured encryption is achieved by sorting algorithms which could increase the performance in transmission mechanism. This algorithm is based on the substitution techniques of classical encryption.

Open Document