Demonstration and Implementation of Cryptographic Algorithms.
General Instructions:
Choose an algorithm from the dropdown visible at the top stating Choose a cryptographic algorithm. By default, the simulation page will open for symmetric-key cryptography.
Follow these steps for symmetric-key cryptography:
- First enter your message (any combination of characters) and secret key and press submit.
- Then, in step 2 of the algorithm, enter your secret key and press submit to view your message.
Follow these steps for Asymmetric-key cryptography:
- Click on the Generate Keys button to generate your random keys.
- Then enter the message (any combination of characters) you want to encrypt along with the public key in the Encryption Key field and click the Encrypt Message button.
- Then enter your private key in the Decryption Key field and click the Decode Message button to view the decrypted message identical to the original message.
- Also try entering a false private key and you will observe that the message is not decrypted successfully and is different from your original message.
Follow these steps for RSA Algorithm:
- Click the Generate Prime Numbers button to generate random primes.
- Enter the
NandPHIvalues and click the Submit button. - Then click the Generate E button to generate the appropriate value.
- Generate keys by clicking the Generate Keys button.
- Now enter the message (numeric in the range 0 - 520) you want to encrypt.
- Now click the encrypt/decrypt button to generate the encryption along with the decrypted message.
- You will observe that the original and decrypted message match, hence validating the algorithm.