| |
|
The IUP Journal of Computer Sciences :
|
|
|
|
|
|
| |
 |
Description |
 |
| |
Communication system consists of a network of systems. System consists of related
components that participate in communication. The system can be a sender or a
receiver. The data to be transmitted over a communication channel can be either in text,
audio, image, video or audiovisual form and must not be exposed to the third party other
than the sender or the receiver. The security requirements include:
- Authentication: To prove one’s identity.
- Privacy or Confidentiality: Third party should not read the message.
- Integrity: To ensure that the original message and the received message are
same.
- Non-repudiation: To confirm that the sender really sent this message.
The above issues can be addressed through cryptography. Cryptography is used to
protect data from theft or alteration and for user authentication. It is an ancient art
adopted by Egyptians for writing plain text into secret code which is either readable or
unreadable and uninterpretable.
Substitution is a very old art invented some 2000 years ago. It was utilized by Julius
Caesar and later by the Arabs. The message is encrypted by substituting each letter of
the alphabet with a particular substitution letter. Caesar was the first one to use this
method of ciphering text. He used substitution based on shifting mechanism, like
replacing a with D, b with E, c with F, etc. For example, the word ‘cryptography’ can be
encrypted as ‘FUBSWRJUDSKB’.
The following terminologies are commonly used in the context of Cryptography.
|
|
 |
|
 |
|
| |
|
| |