International Journal of Scientific Research in Computer
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Scientific Research in Computer Science, Engineering and Information Technology ISSN : 2456-3307 (www.ijsrcseit.com) doi : https://doi.org/10.32628/CSEIT217233 Revelation of Cryptography Soham Mehta, Deep Nandu Department of Computer Engineering, SAKEC, Mumbai, Maharastra, India ABSTRACT As the means of communications matured and developed so did the need of Article Info secret message keeping, as we discover new and more sophisticated Volume 7, Issue 2 cryptographic techniques are being developed to aid in securing the Page Number : 108-117 communications between sender and receiver. Some of cryptographers started to come up with new techniques to hide the data using new encryption methods Publication Issue : while others came up with new techniques to break the said encryption methods March-April-2021 and this led to many great evolutions in the communication sector, as the communications became digital from analog secret message keeping became far Article History more important and led to the introduction of various protocols and frameworks Accepted : 25 March 2021 to support their need of secret message keeping. Published : 31 March 2021 Keywords: Cipher text, Encryption, Secret Message, Cryptographic Techniques, Secret Message, Cryptanalysis, Modern Encryption I. INTRODUCTION Plain text: Refers to text that can be read by a normal person. Cryptography is the science of writing codes and Cipher text: Refers to encrypted text that might be ciphers for secure communication, which is one of gibberish for a normal person. the most important elements that goes into making Key: Refers to a number or a word that can be used to modern communication, networks, cryptocurrencies, encrypt or decrypt the plain text and blockchains possible. The cryptographic Shifts: Refers to replacing each letter in the message techniques used today, however, are the result of a by a letter that is some fixed number of positions long history of development. Since ancient era, further along in the alphabet list. people have used cryptography to transmit Encryption: The conversion of plain text to cipher information in a secure manner. The modern text. Cryptography is a result of seesaw battle between Decryption: The conversion of cipher text to plain code makers and code breakers that has pushed the text very boundaries of science. Following is the Cryptanalysis: The study of cipher text and fascinating history of cryptography that has led up to cryptosystems the advanced and sophisticated methods used for Cryptanalyst: The agent (human/computer) that modern digital encryption. But before that lets performs cryptanalysis. understand few of the terms related to cryptography: The art of secret writing aka cryptography was developed along with the art of writing. As the Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed under the 108 terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited Soham Mehta et al Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, March-April-2021, 7 (2) : 108-117 humans evolved and became civilized so did the need found is that Egyptian scribes wanted to give formal of secure means of communication, humans got appearance to their writings. Hieroglyph was also a organized in tribes or groups, and later kingdoms code that was only known to the scribes could use which brought idea or problems such as power, and who could send the message on behalf of the battles, supremacy, and politics. These ideas further king they used it as an opportunity to use their fuelled the natural need of people to communicate formal language skills to impress the king. secretly with selective recipient which in turn ensured the continuous evolution of cryptography as well. In the current generation of information age encryption plays a major role in data transmission, from metadata to information everything transmitter over a network is highly encrypted to maintain the data integrity and to avoid the data from being leaked Figure 1: Egyptian Symbols used 4000 years ago or getting misused. II. ROOTS OF CRYPTOGRAPHY Cryptography is as ancient as the art of writing, early civilizations seemed to have used cryptography to some degree where symbol replacement appears in both ancient Egyptian and Mesopotamian writings. Since prehistoric age encryption is used by civilization to protect the data or messages that needs Figure 2: Symbols on tomb of Khnumhotep II to be kept away from the prying eyes, one of the oldest examples of encryption techniques hieroglyph By later era of relics and artifacts, cryptography was being 4000 years old used by the ancient Egyptian to largely used to protect classified and or important keeps records or to pass message that were known military information, a purpose that it serves till this only by the ‘Scribes’. The very first technique of day. A good example for the early forms of cryptography that can be traced is through the cryptography would be from the Greek city – State of history is Hieroglyph. It is the oldest cryptographic Sparta around 500 BCE, the Spartans who were technique and was used by the Egyptians around trying to send secure message to their military 4000 years ago. The Hieroglyph was found on the campaigns they used a tool called scytale. Scytale tomb of an Egyptian noble named Khnumhotep II, consisted of a cylinder with a piece of parchment who lived approximately 3,900 years ago. The scribe around it on which the message was written. The who drew the symbols on his master’s tomb was parchment is wrapped around cylinder and the drawing his master’s life on the tomb, but instead of message is written on it. This tool performed the using standard numbers and symbols he used unusual transposition cipher on the message. The receiver signs and symbols to obscure the meaning of the uses the rod of the same diameter on which the inscriptions. The only explanation that could be parchment is wrapped to read the message. 109 Volume 7, Issue 2, March-April-2021 | http://ijsrcseit.com Soham Mehta et al Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, March-April-2021, 7 (2) : 108-117 code breaking that involved mathematical or frequency analysis and were the first to suggest the most frequent coded letter represents the most frequent plain text. III. Middle Ages and Renaissance Figure 3: S Scytale Example With the Renaissance cryptology has a rebirth in Europe in 1466 an Italian architect developed a Possibly the most advance cryptographic system in greatest Cryptologic invention in a thousand year at the ancient civilization was established by the the urging of the Vatican, it was a system of rotating Romans, one of the most famous and prominent cipher disks with two rings of letters and several examples would be Caesar Cipher, around 5th numbers by scrambling so many letters randomly, century AD Julius Caesar a Roman general one is the alphabet in which the original message is commander in the Roman Army developed a cipher written, while the second is an entirely different or encryption technique that is one of the widely alphabet in which the message appears after being known encryption techniques which is called Caesar encoded. In polyalphabetic cipher two same letter in cipher. Caesar is also known as the shift cipher it is the plain text might get encrypted into two different like the substitution where the letters in the plain letters, even the length of the plain text and cipher text are replaced by the letters that are some fixed text might be changed in the polyalphabetic cipher if positions down the alphabet. The Caesar cipher the plain text consists of 5 letters the cipher text provided reasonably secure means of communication; might have 10 letters. Combined with the traditional apart from the encryption of the message, the reason ciphers. Polyalphabetic ciphers increased the security is that the enemies of the Roman Empire could not of the message greatly. It became the first to have understood since to them it would have been a challenge the Arab code breaking method of foreign language. frequency analysis which was later called Polyalphabetic Substitution earlier known as Alberti system and it became the base to many modern cipher systems. A French Diplomat improved the Alberti system in 1586 by creating a cipher style that later came to be known as Vigenere cipher. Vigenere cipher uses the Figure 4: Substitution Cipher grid of letter that gives the method of substitution the grid is known as Vigenere cipher or Vigenere table Around 900AD another civilization rising in the east, made up of 26 letters offset from each other by one Arab society was one the most literate cultures in the letter. The key exception of Vigenere cipher from world and the study of code flourished, the Arabs the Caesar cipher is that the key of the Vigenere were the first to record the method of transposition changes throughout the process and in the Caesar the scrambling of letters as well as substitution the cipher the key remains the same for entire process. replacement of letters with numbers and symbols they were the first to outline specific techniques of 110 Volume 7, Issue 2, March-April-2021 | http://ijsrcseit.com Soham Mehta et al Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, March-April-2021, 7 (2) : 108-117 Telegram. The British were able to decipher the telegram which changed the tides of war and became one of the important events in WW1. During the start of WW1, the United States had decided to remain neutral. The telegram was sent in response of the conflict British naval blockade, Germany broke the pledge to curb the submarine warfare by firing missiles at a civilian ship.