Top Banner
8

Ciphertext(usman 57, humza-34)

Nov 07, 2014

Download

Education

Usman Ahmed

Not completed yet
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ciphertext(usman 57, humza-34)
Page 2: Ciphertext(usman 57, humza-34)

CIPHERTEXT

Page 3: Ciphertext(usman 57, humza-34)

GROUP MEMBERSM. USMAN AHMED

HUMZA KHAN MUBEEN

Page 4: Ciphertext(usman 57, humza-34)
Page 5: Ciphertext(usman 57, humza-34)

CIPHERTEXT

In cryptography, ciphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.

Page 6: Ciphertext(usman 57, humza-34)

HISTORICAL PERSPECTIVE

Cryptography began thousands of years ago.

Early 20th century, the invention of complex mechanical and electromechanical machines.

Page 7: Ciphertext(usman 57, humza-34)

CONTRIBUTION OF MUSLIMS

Throughout history, the need for secrecy has been important.Abu Yusuf Ya’qub ibn e Ishaaq Al-Kindi was the first to De-Cipher an encrypted message.

Page 8: Ciphertext(usman 57, humza-34)

TYPES OF CIPHERSHistorical pen and paper ciphers used in the past are

sometimes known as classical ciphers. They include:Substitution cipher: the units of plaintext are replaced

with ciphertext (Caesar cipher)Transposition cipher: the ciphertext is

a permutation of the plaintext (Rail fence cipher)Polyalphabetic substitution cipher: a substitution

cipher using multiple substitution alphabets (Vigenère cipher and Enigma machine)

Permutation cipher: a transposition cipher in which the key is a permutation

Private-key cryptography (symmetric key algorithm): the same key is used for encryption and decryption

Public-key cryptography (asymmetric key algorithm): two different keys are used for encryption and decryption