https://github.com/madhurimarawat/cryptography-and-network-security
This repository contains Cryptography programs in the Python programming language.
https://github.com/madhurimarawat/cryptography-and-network-security
caesar-cipher-algorithm python rail-fence-cipher
Last synced: 7 months ago
JSON representation
This repository contains Cryptography programs in the Python programming language.
- Host: GitHub
- URL: https://github.com/madhurimarawat/cryptography-and-network-security
- Owner: madhurimarawat
- Created: 2023-09-19T15:09:17.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2024-01-21T12:03:38.000Z (over 1 year ago)
- Last Synced: 2025-01-15T01:16:52.091Z (9 months ago)
- Topics: caesar-cipher-algorithm, python, rail-fence-cipher
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Cryptography-and-Network-Security
This repository contains Cryptography programs in the Python programming language.## Cryptography:
- **Definition:**
- Cryptography is the practice and study of techniques for securing communication and information from adversaries.- **Objectives:**
- Ensure confidentiality, integrity, and authenticity of information.
- Provide secure communication in the presence of malicious third parties.- **Types of Cryptography:**
- Symmetric Key Cryptography (uses a single key for both encryption and decryption).
- Asymmetric Key Cryptography (uses a pair of public and private keys).- **Applications:**
- Used in securing online transactions (e.g., HTTPS).
- Protects sensitive data in storage and transmission.- **Challenges:**
- Continuous need for stronger algorithms due to advancements in computing power.
- Balancing security and usability in real-world applications.### Caesar Cipher:
- **Algorithm:**
- Substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.- **Key Concept:**
- Key represents the number of positions each letter of the alphabet is shifted.- **Weakness:**
- Vulnerable to brute-force attacks due to a limited number of possible keys (26 in the case of the English alphabet).- **Encryption Example:**
- Plain text: "HELLO"
- Key: 3
- Cipher text: "KHOOR"- **History:**
- Named after Julius Caesar, who is believed to have used it for military communication.### Rail Fence Cipher:
- **Algorithm:**
- Transposition cipher where the plaintext is written in a zigzag pattern on a set of rails.- **Key Concept:**
- Key represents the number of rails (rows) used in the encryption process.- **Encryption Example:**
- Plain text: "HELLO"
- Key: 3
- Cipher text: "HOLELW"- **Decryption:**
- Reconstruct the zigzag pattern and read off the message.- **Usage:**
- Historical use in non-secure communication due to its simplicity.
- Rarely used for serious encryption today, more of a puzzle or educational tool.