IMBRICATE CRYPTOGRAPHY

Security and privacy are critical for electronic communication and e-business. Network security measures are needed to protect data during its transmission. Cryptography plays a vital role in network security as it allows two parties to exchange sensitive information in a secured manner. The word cryptography means covered writing’. The art or science of transforming an intelligible message into unintelligible one and then retransforming that message back to its original form is cryptography. There are two types of cryptography: asymmetric cryptography and symmetric cryptography.

If the sender and the receiver use different keys. It is called asymmetric or multiple-key, public-key encryption. If the sender and the receiver use the same key it is called single key, secret-key or conventional encryption. It involves the use of a symmetric cryptography. secret key known only to the participants of the secure communication: If A wants to send a message to B, he encrypts the original message X by the encryption algorithm using the key agreed upon by them.

The encrypted message is through the communication media transmitted a secured and the key is transmitted through RF cable, fiber, tc.The receiver media like decrypts the original message from the encrypted message using the same key and the decryptor. A cryptanalyst may try to capture the message and the key. If he fails to do so, the encryption algorithm is successful.