Figure 1.2: Cryptography technique
Anand using encryption sends a message to Bikram, who receives the
message after its decryption. Eve/ Mallory, an adversary, attacks/ eavesdrops;
however, the secure channel is used for the communication; hence, the
plaintext sent by Anand is received as plaintext p by Bikram.
A cryptographic attack circumvents the security of a cryptographic system
by the process of cryptanalysis, which can find a weakness in the code, the
cipher cryptographic protocol, or key management scheme.
Decryption
The reason for implementing an encryption-decryption system for
information is privacy. Decryption is the process of converting encrypted
data into its original form. An authorized user can only decrypt the data,