create account

Cryptology Series Part 4: Methods of Encryption by digicrypt

View this thread on: hive.blogpeakd.comecency.com
· @digicrypt ·
$0.05
Cryptology Series Part 4: Methods of Encryption
**Methods of Encryption**

I was unable to use the editor for this post, instead I had to use Markdown, so I apologize if there are formatting issues. 

If you are new to my Cryptology Series or are having trouble with any of the terminology, I encourage you to go to my blog and check out parts 1,2 and 3. Now let's get started!
https://i.imgsafe.org/b6fbe822a4.png
**Substitution Ciphers**

Replaces bits, characters or blocks with different bits, characters or blocks.
Caesar cipher is a substitution cipher
Eample CAT=FDW

**Transposition/ Permutation Cipher**

Values are scrambled or put into a different order
Uses P boxes
Example.	CAT=TCA  Key=312

Substitution and transposition ciphers are relatively weak because of frequency analysis.
In every language certain letters are used more often than others and in certain patterns, computers can perform frequency analysis to reconstruct text.
![](https://steemitimages.com/DQmbiemo3DYRxkb8VCCWm4bG4Qh4DkDqGy5bCtvGa17vZsV/image.png)

**Multi product cipher**

A stronger cipher is multi product which combines both substitution and transposition.
Example.


Plain Text= CAT

Substitution=FDW

Transposition=312

Multi product = WFD


**Methods of Encryption**


**Symmetric Cryptography**

Uses symmetric keys known as secret keys, sender and receiver use two instances of the same key
Benefit: much faster and less computationally intensive
Weakness: Secure key distribution

**Asymmetric Cryptography**
Two different asymmetric keys that are mathematically related
One public and one private key
Benefit: better key distribution
Weakness: slower
![](https://steemitimages.com/DQmYDjbdifFQ7avRAuAYSe66XWWL3Yy7UJWPcYsAv29sZsc/image.png)

**Hybrid Encryption**

Public key cryptography uses two keys, a public key generated by an asymmetric algorithm and a private key generated by a symmetric algorithm.
Symmetric is used for bulk encryption
Asymmetric is used to encrypt the private key for secure key distribution


**Block Ciphers**

Message is divided into blocks of bits, then put through the mathematical functions one block at a time.
https://i.imgsafe.org/be670eba9d.png

**Stream Cipher**

Stream ciphers process messages a bit or byte at a time when en/decrypting
Stream ciphers use a key stream generators, which produce a stream of bits that is XORed with the plaintext bits to produce ciphertext.
![](https://steemitimages.com/DQmcK7rQFk62gWWWaEcfDtwZ22PSkaH5SnRZcByuTFnLpDP/image.png)

**Confusion vs Diffusion**

Confusion is commonly carried out through substitution.
Makes the relationship between the key and the resulting cipher text, making it complex so key cannot be identified
Diffusion is carried out by using transposition.
dissipates statistical structure of plaintext over bulk of cipher text

**Avalanche Effect**

**Avalanche Effect**- if the input to an algorithm is slightly modified then the output of the algorithm is changed significantly

**Cryptographic Transformation**

**Initialization Vectors**- random values in algorithm used to ensure patterns are not created in the encryption process.
**Compression**- reduce redundancy before PT is encrypted.
**Expansion**- expanding the PT by duplicating values. Commonly used to increase PT size to map key sizes.
**Padding**- adding material to PT before it is encrypted.
**Key mixing**-using a portion (subkey) of a key to limit the exposure of the key. Key schedules are used to generate sub keys


**There will be a part 5 and 6 to the Cryptology Series**

**I will also be holding another Cryptography challenge where you can win STEEM!**

**I have a few other exciting projects in the works that I hope you will like, stay tuned!**



Follow my blog @digicrypt if you are interested in cryptocurrency, cryptology or blockchain.

**DASH**:  XgQ9NBonMoCPKhF37agY4W8zk7gwQFnwGV 

**Ether**:   XE04RO3I0QA5UKB31OZK4O3CK3TOT03R4TM




 https://i.imgsafe.org/be8afb8c2a.png

 https://logomakr.com/
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 61 others
properties (23)
authordigicrypt
permlinkcryptology-series-part-4-methods-of-encryption
categorycryptocurrency
json_metadata{"tags":["cryptocurrency","bitcoin","life","cryptology","history"],"users":["digicrypt"],"image":["https://i.imgsafe.org/b6fbe822a4.png","https://steemitimages.com/DQmbiemo3DYRxkb8VCCWm4bG4Qh4DkDqGy5bCtvGa17vZsV/image.png","https://steemitimages.com/DQmYDjbdifFQ7avRAuAYSe66XWWL3Yy7UJWPcYsAv29sZsc/image.png","https://i.imgsafe.org/be670eba9d.png","https://steemitimages.com/DQmcK7rQFk62gWWWaEcfDtwZ22PSkaH5SnRZcByuTFnLpDP/image.png","https://i.imgsafe.org/be8afb8c2a.png"],"links":["https://logomakr.com/"],"app":"steemit/0.1","format":"markdown"}
created2017-03-29 17:17:18
last_update2017-03-29 17:17:18
depth0
children5
last_payout2017-04-05 17:17:18
cashout_time1969-12-31 23:59:59
total_payout_value0.038 HBD
curator_payout_value0.007 HBD
pending_payout_value0.000 HBD
promoted0.002 HBD
body_length3,935
author_reputation9,344,424,618,224
root_title"Cryptology Series Part 4: Methods of Encryption"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,889,456
net_rshares1,603,711,305,564
author_curate_reward""
vote details (125)
@riosparada ·
Upvoted and resteemed!!!!!!
👍  ,
properties (23)
authorriosparada
permlinkre-digicrypt-cryptology-series-part-4-methods-of-encryption-20170330t011858294z
categorycryptocurrency
json_metadata{"tags":["cryptocurrency"],"app":"steemit/0.1"}
created2017-03-30 01:18:57
last_update2017-03-30 01:18:57
depth1
children1
last_payout2017-04-06 01:18:57
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length27
author_reputation90,448,613,328,349
root_title"Cryptology Series Part 4: Methods of Encryption"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,893,830
net_rshares56,903,253,984
author_curate_reward""
vote details (2)
@digicrypt ·
Thank you and thanks for the resteem! Much appreciated!
properties (22)
authordigicrypt
permlinkre-riosparada-re-digicrypt-cryptology-series-part-4-methods-of-encryption-20170330t012923103z
categorycryptocurrency
json_metadata{"tags":["cryptocurrency"],"app":"steemit/0.1"}
created2017-03-30 01:29:21
last_update2017-03-30 01:29:21
depth2
children0
last_payout2017-04-06 01:29:21
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length55
author_reputation9,344,424,618,224
root_title"Cryptology Series Part 4: Methods of Encryption"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,893,913
net_rshares0
@screenname ·
Re: Cryptology Series Part 4: Methods of Encryption
<p>This post has been ranked within the top 80 most undervalued posts in the second half of Mar 29. We estimate that this post is undervalued by $2.62 as compared to a scenario in which every voter had an equal say.</p> 
<p>See the full rankings and details in <a href="https://steemit.com/curation/@screenname/the-daily-tribune-most-undervalued-posts-of-mar-29---part-ii">The Daily Tribune: Mar 29 - Part II</a>. You can also read about some of our methodology, data analysis and technical details in <a href="https://steemit.com/curation/@screenname/introducing-the-daily-tribune-most-undervalued-posts-of-nov-04---part-i">our initial post</a>.</p>
<p>If you are the author and would prefer not to receive these comments, simply reply "Stop" to this comment.</p>
👍  
properties (23)
authorscreenname
permlinkre-cryptology-series-part-4-methods-of-encryption-20170330t013344
categorycryptocurrency
json_metadata"{"replyto": "@digicrypt/cryptology-series-part-4-methods-of-encryption"}"
created2017-03-30 01:33:45
last_update2017-03-30 01:33:45
depth1
children0
last_payout2017-04-06 01:33:45
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length765
author_reputation46,276,338,038,330
root_title"Cryptology Series Part 4: Methods of Encryption"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,893,939
net_rshares8,674,657,676
author_curate_reward""
vote details (1)
@steemstock · (edited)
Upvoted!!!!!
👍  
properties (23)
authorsteemstock
permlinkre-digicrypt-cryptology-series-part-4-methods-of-encryption-20170330t011720393z
categorycryptocurrency
json_metadata{"tags":["cryptocurrency"],"app":"steemit/0.1"}
created2017-03-30 01:17:18
last_update2017-03-30 01:17:39
depth1
children1
last_payout2017-04-06 01:17:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length12
author_reputation807,732,210,239
root_title"Cryptology Series Part 4: Methods of Encryption"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,893,815
net_rshares8,674,657,676
author_curate_reward""
vote details (1)
@digicrypt ·
Thanks!
properties (22)
authordigicrypt
permlinkre-steemstock-re-digicrypt-cryptology-series-part-4-methods-of-encryption-20170330t013438152z
categorycryptocurrency
json_metadata{"tags":["cryptocurrency"],"app":"steemit/0.1"}
created2017-03-30 01:34:39
last_update2017-03-30 01:34:39
depth2
children0
last_payout2017-04-06 01:34:39
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length7
author_reputation9,344,424,618,224
root_title"Cryptology Series Part 4: Methods of Encryption"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,893,944
net_rshares0