McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Chapter 19
DataEncryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Figure 19-1
Concept of Encryption and Decryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Encryption/Decryption Methods
Figure 19-2
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Monoalphabetic Substitution
Figure 19-3
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Polyalphabetic Substitution
Figure 19-4
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Transpositional Encryption
Figure 19-
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Encoding/DecodingFigure 19-6
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Permutation
Figure 19-7
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
SubstitutionFigure 19-8
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
ProductFigure 19-9
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Exclusive ORFigure 19-10
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Rotation
Figure 19-11
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
DESFigure 19-12
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Subkey Generation in DESFigure 19-13
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
One of the 16Steps in DES
Figure 19-14
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Public Key EncryptionFigure 19-15
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
RSAFigure 19-16
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
RSA Encryption and Decryption
Figure 19-17
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Security of RSA
Figure 19-18
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003
Signature AuthenticationFigure 19-19