Figure 1.2: Cryptography technique

Anand using encryption sends a message to Bikram, who receives the

message after its decryption. Eve/ Mallory, an adversary, attacks/ eavesdrops;

however, the secure channel is used for the communication; hence, the

plaintext sent by Anand is received as plaintext p by Bikram.

A cryptographic attack circumvents the security of a cryptographic system

by the process of cryptanalysis, which can find a weakness in the code, the

cipher cryptographic protocol, or key management scheme.

Decryption

The reason for implementing an encryption-decryption system for

information is privacy. Decryption is the process of converting encrypted

data into its original form. An authorized user can only decrypt the data,