17/08/2020 0 By indiafreenotes

The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.

One of the reasons for implementing an encryption-decryption system is privacy. As information travels over the Internet, it is necessary to scrutinise the access from unauthorized organizations or individuals. Due to this, the data is encrypted to reduce data loss and theft. Few common items that are encrypted include text files, images, e-mail messages, user data and directories. The recipient of decryption receives a prompt or window in which a password can be entered to access the encrypted data. For decryption, the system extracts and converts the garbled data and transforms it into words and images that are easily understandable not only by a reader but also by a system. Decryption can be done manually or automatically. It may also be performed with a set of keys or passwords.

There are many methods of conventional cryptography, one of the most important and popular method is Hill cipher Encryption and Decryption, which generates the random Matrix and is essentially the power of security. Decryption requires inverse of the matrix in Hill cipher. Hence while decryption one problem arises that the Inverse of the matrix does not always exist. If the matrix is not invertible then the encrypted content cannot be decrypted. This drawback is completely eliminated in the modified Hill cipher algorithm. Also this method requires the cracker to find the inverse of many square matrices which is not computationally easy. So the modified Hill-Cipher method is both easy to implement and difficult to crack.

To encrypt a file or other information stored in a computer means to convert it into a secret code so that it can’t be used or understood until it is decoded or decrypted. You might want to encrypt a file if it contained a secret formula for a new invention, or some financial plans that your competitors would love to know about in advance. When you encrypt something, the computer will ask you to set up a password. After that, no one will be able to make sense of the information unless they have the same password.

Encryption hides your data from curious eyes. This is a process of encoding data to prevent unauthorized person from viewing or modifying it. The main features of data encryption are:

  1. Prevents unwanted access to documents and e-mail messages
  2. Strongest levels of encryption are very difficult to break.

Process and Types of Encryption

The process of data encryption consists of certain steps. The data passes through a mathematical formula called an algorithm, which converts it into encrypted data called ciphertext. These algorithms create a key and then encapsulate the message with this key.

There are two types of encryptions: asymmetric and symmetric.

Asymmetric Encryption

In public key (asymmetric) encryption, two mathematically-related keys are used: one to encrypt the message and the other to decrypt it. These two keys combine to form a key pair. Asymmetric encryption provides both data encryption and validation of the communicating parties’ identities and is considered more secure than symmetric encryption, but is computationally slower.

A public key encryption scheme has six major parts:

  1. Plaintext: This is the text message to which an algorithm is applied.
  2. Encryption Algorithm: It performs mathematical operations to conduct substitutions and transformations to the plaintext.
  3. Public and Private Keys: This is a pair of keys where one is used for encryption and the other for decryption.
  4. Cipher text: This is the encrypted or scrambled message produced by applying the algorithm to the plaintext message using key.
  5. Decryption Algorithm: This algorithm generates the ciphertext and the matching key to produce the plaintext.

The Encryption Process

The asymmetric data encryption process has the following steps:

  1. The process of encryption begins by converting the text to a pre-hash code. This code is generated using a mathematical formula.
  2. This pre-hash code is encrypted by the software using the sender’s private key.
  3. The private key would be generated using the algorithm used by the software.
  4. The encrypted pre-hash code and the message are encrypted again using the sender’s private key.
  5. The next step is for the sender of the message to retrieve the public key of the person this information is intended for.
  6. The sender encrypts the secret key with the recipient’s public key, so only the recipient can decrypt it with his/her private key, thus concluding the encryption process.

The Decryption Process

The asymmetric data decryption process has the following steps:

  1. The recipient uses his/her private key to decrypt the secret key.
  2. The recipient uses their private key along with the secret key to decipher the encrypted pre-hash code and the encrypted message.
  3. The recipient then retrieves the sender’s public key. This public key is used to decrypt the pre-hash code and to verify the sender’s identity.
  4. The recipient generates a post-hash code from the message. If the pos~-hash code equals the pre-hash code, then this verifies that the message has not been changed enroute.

Symmetric Encryption

Private Key encryption (Symmetric), also referred to as conventional or single-key encryption is based on secret key that is shared by both communicating parties. It enquires all parties that are communicating to share a common key. The sending party uses the secret key as part of the mathematical operation to encrypt (or encipher) plain text to cipher text. The receiving party uses the same secret key to decrypt (or decipher) the cipher text to plain text.

Examples of symmetric encryption schemes are the RSA RC4 algorithm (which provides the basis for Microsoft Point-to-Point Encryption (MPPE), Data Encryption Standard (DES), the International Data Encryption Algorithm (IDEA), and the Skipjack encryption technology proposed by the United S12; tesgovernment (and implemented in the Clipper chip).

An encryption scheme has five major parts:

  1. Plaintext: This is the text message to which an algorithm is applied.
  2. Encryption Algorithm: Performs mathematical operations to conduct substitutions and transformations to the plaintext.
  3. Secret Key: This is the input for the algorithm as the key dictates the encrypted outcome.
  4. Cipher text: This is the encrypted or scrambled message produced by applying the algorithm to the plaintext message using the secret key.
  5. Decryption Algorithm: This is the encryption algorithm in reverse. It uses the ciphertext, and the secret key to derive the plaintext message.