”;
A cryptosystem consists of numerous parts that work together to encrypt and protect data. The following are the different parts of a simple cryptosystem −
-
Plaintext
-
Encryption Algorithm
-
Ciphertext
- Key
-
Symmetric Key
-
Asymmetric Key
-
-
Decryption Algorithm
The collection of all possible decryption keys for a given cryptosystem is called the keyspace.
An interceptor (attacker) is an unauthorized entity that tries to decipher plaintext. He has access to the ciphertext and might be familiar with the decryption formula. But he must never be aware of the decryption key.
Process of Cryptosystem
Components
So we will discuss all these components one by one in the below sections −
Plaintext
-
The original message or data that needs to be kept private while being sent or stored is known as the plaintext.
-
It can be any kind of information, including text, numbers, and multimedia files.
-
The plaintext is readable to anyone with access to it prior to encryption, when it is in its original form.
-
In other words, It is the data to be protected during transmission.
Example: “HELLO, HOW ARE YOU?”
This is the original message that needs to be encrypted.
Encryption Algorithm
-
It is a mathematical procedure that takes any given plaintext and encryption key and outputs a ciphertext. It is a cryptographic technique that generates ciphertext from plaintext and an encryption key as input.
-
It works with blocks of data or character sets, according to the algorithm.
-
The encryption algorithm guarantees the final ciphertext is secure and seems random to unauthorized parties.
-
Data Encryption Standard (DES), Rivest-Shamir-Adleman (RSA), and Advanced Encryption Standard (AES) are examples of common encryption methods.
Example: Caesar Cipher
In this example, we will use an encryption algorithm called Caesar Cipher. It will shift each character in the given plaintext by a fixed number of positions down the alphabet.
Encryption Algorithm − Shift each letter in the plaintext by 3 positions. So, “H” will become “K”, “E” will become “H”, and so on.
So the Encrypted Message is: “KHOOR, KRZ DUH BRX?”
Ciphertext
-
It is the form of the plaintext that has been encoded by the encryption process with a particular encryption key. The ciphertext is not guarded. It flows on public channels. Anyone who has access to the communication channel has the ability to intercept or compromise the message.
-
It looks as random, unreadable data and cannot be decoded without the proper decryption key.
-
Ciphertext is sent or kept securely since it has no information about the underlying plaintext.
Example: “KHOOR, KRZ DUH BRX?”
This is the encrypted form of the given plaintext created by the Caesar Cipher algorithm.
Key
A key is a piece of data used by the encryption algorithm to control the encryption and decryption operation.
Keys can be divided into two types: symmetric and asymmetric.
-
Symmetric Key − Symmetric encryption uses the same key for encryption and decryption. The sender and receiver must have the same private key for encryption and decryption. Symmetric key algorithms are usually fast and efficient, but require a secure key exchange protocol. It”s just like having a key to lock and unlock a door.
-
Asymmetric Key − Asymmetric encryption uses two keys: a public key and a private key. Encryption uses the public key, while decryption uses the private key. It is the same as having a padlock: anyone can lock (encrypt) a message using the public key, but only the owner with the matching key (private key) can decode it.
Example: 3 (for Caesar Cipher algorithm)
The key in our example is the number of positions each letter is shifted in the Caesar Cipher algorithm. In our case, the key is 3.
Both the sender and receiver need to know the key (3) to encrypt and decrypt messages with the help of Caesar Cipher algorithm.
Decryption Algorithm
-
It is a mathematical procedure that creates a unique plaintext for any given ciphertext and decryption key. It is a cryptographic algorithm that take ciphertext and a decryption key as input and returns plaintext. The decryption algorithm is simply the inverse of the encryption method, and so is closely linked.
-
It works with the decryption key which is equal to the encryption key used to encrypt the data.
-
The decryption technique ensures that only authorized people having the correct key can recover the original plaintext.
-
The decryption algorithm must be secure and efficient in reversing the process of encryption while maintaining data integrity.
Example: Caesar Cipher (with a reverse shift).
To recover the original plaintext from the Caesar Cipher, the decryption algorithm shifts each letter in the ciphertext by the reverse number of positions.
Decryption algorithm: Shift each letter in the ciphertext 3 places in the reverse direction. So, “K” becomes “H”, “H” becomes “E”, and so on.
Decrypted Message: “Hello, How Are You?”
Summary
-
Plaintext basic message is “Hello, How Are You?”.
-
The Caesar Cipher encryption algorithm converts the plaintext into the ciphertext as “Khoor, Krz Duh Brx?” use the key (shift of 3) as help.
-
So above ciphertext is the encrypted form of the given plaintext.
-
For both encryption and decryption, utilise key (3).
-
The decryption algorithm (reverse Caesar Cipher) decrypts the ciphertext back into the original plaintext “Hello, How Are You?” using the same key (3).
”;