Kamis, 18 April 2013

Character-Level Encryption


In this method, encryption is done at the character level. There are two general methods for character-level encryption: substitution and transpositional.

Substitutional
The simplest form of character-level encryption is substitution ciphering. In monoalphabetic substitution, sometimes called the Caesar Cipher each character is replaced by another character in the set. The monoalphabetic encryption algorithm simply adds a number to the ASCII code of the character; the decryption algorithm simply subtracts the same number from the ASCII co. Ke and Kd are the same and define the added or subtracted value. To make it simple, we do not encode the space charac­ter. If the substituted character is beyond the last character (Z), we wrap it around.

Monoalphabetic substitution is very simple, but the code can be broken easily by snoopers. The reason is that the method cannot hide the natural frequencies: characters in the language being used. For example, in English, the most fre­quently used characters are E, T, O, and A. A snooper can easily break the code by finding which character is used the most and replace that one with the letter E. It can then find the next most frequent and replace it with T, and so on.

In polyalphabetic substitution, each occurrence of a character can have a different substitute. One polyalphabetic encryption technique is to find the position of the character in the text and use that value as the key. However, polyalphabetic substitution is not very secure either. The reason is that although "DEAR DEAR" is replaced by "EGDV JLIA", the order of characters in "EGDV" and "JLIA" is still the same; the code can easily be broken by a more experienced snooper.

Transpositional
An even more secure method is transpositional encryption, in which the original characters remain the same but the positions of these characters are interchanged to create the cipher text. The text is organized into a two-dimensional table, and the columns are interchanged according to a key. For example, we can organize the plaintext into an eleven-column table and then reorganize the columns according to a key that indicates the interchange rule. As you have guessed, transpositional encryption is not very secure either. The character frequen­cies are preserved and the snooper can find the plaintext through trial and error.

Bit-Level Encryption
In Bit-level encryption techniques, data as text, graphics, audio, or video are divided into different blocks of bits and then each block is altered using either of the techniques: encoding/decoding, permutation, substitution, etc.

Tidak ada komentar:

Poskan Komentar