SlideShare uma empresa Scribd logo
1 de 38
1
Substitution Ciphers
2
Substitution Ciphers
• Monoalphabetic cipher
– Caesar cipher
• Polyalphabetic cipher
– Vigenère cipher
• Multiple letter cipher
– Playfair cipher
3
Monoalphabetic cipher
• Plaintext characters are substituted by a
different alphabet stream of characters
shifted to the right or left by n positions
• E.g.,
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
• Caesar cipher corresponds to n = 3
• Julius Caesar used the Caesar cipher
method
4
Monoalphabetic cipher
• The substitution cipher by shifting
alphabets gives 26! > 4 x 1026 possibilities
• This might appear to be too many choices
to try for an exhaustive attack
• This is a weak cipher because it would be
easy to guess the pattern
• Mono-alphabetic ciphers are vulnerable to
cryptanalysis attack
5
Monoalphabetic cipher
• The shift pattern above could be replaced
by random assignment of characters for
each alphabet
• E.g., ABCDEFGHIJKLMNOPQRSTUVWXYZ
PMJSQOLEYTVUAXIKCGBWDRNHZF
• This would also give 26! possibilities
6
Pigpen Cipher
• Pigpen cipher is a variation on letter
substitution
• Alphabets are arranged as follows:
A B C
D E F
G H I
J K L
M N O
P Q R
7
Pigpen Cipher diagram (cont’d)
T
S
U
V
X
W
Y
Z
C G
A W
8
Pigpen Cipher
• Alphabets will be represented by the
corresponding diagram
• E.g., WAG would be
• This is a weak cipher
9
ADFGVX Cipher
• This is a variation on
substitution cipher
and is a strong cipher
A D F G V X
A 8 p 3 d 1 n
D l t 4 o a h
F 7 k b c 5 z
G j u 6 w g m
V x s v i r 2
X 9 e y 0 f q
10
ADFGVX Cipher
• Rules:
– Remove spaces and punctuation marks from
message
– For each letter or number substitute the letter pair
from the column and row heading
– Next, use a transposition operation on the pair of
letters using a key word (which the receiver knows)
– Rearrange the columns of the new arrangement in
alphabetical order
– Finally, arrange the letters from consecutive columns
11
ADFGVX Cipher
• E.g., Message = SEE ME IN MALL
– SEEMEINMALL
– VDXDXDGXXDVGAXGXDVDADA
– Use keyword of INFOSEC
– Arrange the stage 1 ciphertext characters in a
fresh grid with keyword as the column
heading
– Ciphertext is written in column order from left
to right
12
ADFGVX Cipher
I N F O S E C
V D X D X D G
X X D V G A X
G X D V D A V
13
ADFGVX Cipher
C E F I N O S
G D X V D D X
X A D X X V G
V A D G X V D
14
ADFGVX Cipher
• Ciphertext is:
GXVDAAXDDVXGDXXDVVXGD
• Recipient reverses the process using the
same keyword and gets the plaintext
• Reason for this cipher using the name
ADFGVX is that in Morse code these
characters all have dissimilar patterns of
dots and dashes
15
Polyalphabetic Cipher
• In monoalphabetic cipher the problem was
that each character was substituted by a
single character
• Cryptanalysts are helped by the fact that
they have to see what character would
correspond in plaintext for a given
ciphertext character
• Polyalphabetic cipher’s goal is to make
this process difficult
16
Polyalphabetic Cipher
• In polyalphabetic cipher, each plaintext
character may be replaced by more than one
character
• Since there are only 26 alphabets this process
will require using a different representation than
the alphabets
• Alphabets ‘A’ through ‘Z’ are replaced by 00, 01,
02, …, 25
• We need two digits in this representation since
we need to know how to reverse the process at
the decryption side
17
Polyalphabetic Cipher
• The most common method used is Vigenère
cipher
• Vigenère cipher starts with a 26 x 26 matrix of
alphabets in sequence. First row starts with ‘A’,
second row starts with ‘B’, etc.
• Like the ADFGVX cipher, this cipher also
requires a keyword that the sender and receiver
know ahead of time
• Each character of the message is combined with
the characters of the keyword to find the
ciphertext character
18
Vigenère Cipher Table
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B B A B C D E F G H I J K L M N O P Q R S T U V W X Y
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
19
Vigenère Cipher Table (cont’d)
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
20
Polyalphabetic Cipher
• E.g., Message = SEE ME IN MALL
• Take keyword as INFOSEC
• Vigenère cipher works as follows:
S E E M E I N M A L L
I N F O S E C I N F O
-------------------------------------
A R J A W M P U N Q Z
21
Polyalphabetic Cipher
• To decrypt, the receiver places the
keyword characters below each ciphertext
character
• Using the table, choose the row
corresponding to the keyword character
and look for the ciphertext character in that
row
• Plaintext character is then at the top of
that column
22
Polyalphabetic Cipher
• Decryption of ciphertext:
A R J A W M P U N Q Z
I N F O S E C I N F O
-------------------------------------
S E E M E I N M A L L
• Best feature is that same plaintext
character is substituted by different
ciphertext characters (i.e., polyalphabetic)
23
Vigenère Cipher
• Easiest way to handle Vigenère cipher is
to use arithmetic modulo 26
• This approach dispenses with the need for
the table
• Keyword is converted to numbers and
corresponding numbers in message and
keyword are added modulo 26
24
Beale Cipher
• Also known as book cipher
• Keyword is taken as the first few words of
a book that is agreed upon by sender and
receiver
• Everything else works like the Vigenère
cipher
25
Hill Cipher
• This involves the mathematical concept of
matrices which we did not discuss
• If you are interested then you can see
pages 37-40 of Stallings, 2nd edition book
on Cryptography
26
Polyalphabetic cipher
• Vigenère cipher uses the fact that the keyword
character helps to get different ciphertext
characters from the table
• Instead of the Vigenère table, one could develop
a new table in which each character is
represented as an integer and the ciphertext
could use multiple digits for substitution
depending on the frequency analysis of the letter
• E.g., Q gets only one substitution value where
as E gets 12 different substitution values, and so
on
27
Transposition Cipher
• Also known as a permutation cipher
• Permutation is an arrangement of the
original order of letters or numbers
• E.g., a = 1 2 3
3 1 2
• “a” is a permutation of 1, 2, 3 such that
1 3 2 1 3 2
28
Transposition Cipher
• a2 = 1 2 3 a3 = 1 2 3
2 3 1 1 2 3
• a3 is really identity as it does not change
the order of the elements
• “a” is said to have order 3, written |a| = 3
• “a” is an odd permutation as its order is an
odd number
29
Transposition Cipher
• In Transposition cipher position of
character changes but not its value
• This is different from substitution cipher
• Assign values 0, 1, 2, …, 25 to the
alphabets
• Choose an integer n as the size of a
block
• Split the message into blocks of size n
30
Transposition Cipher
• p = (p(1), p(2), …, p(n)) be a permutation
of (1, 2, …, n)
• Message is encrypted using the values of
p(1), p(2), …, p(n)
• E.g. Let n = 4
• Let p = 1 2 3 4
2 4 1 3
31
Transposition Cipher
• message = proceed meeting as agreed
• Since n = 4, we split the message as
follows: proc eedm eeti ngas agre ed
• We pad the last block with two spaces
• Encrypt using the permutation order
• Last block becomes d _ e _ where _
denotes a blank space
• Delete the blank spaces in encrypted text
32
Transposition Cipher
• Ciphertext using the permutation is:
rcpoemedeietgsnagearde
• To decrypt, the receiver simply takes the
inverse of the permutation
• In the last block of ciphertext we have de
• The two missing characters corresponding
to 3-1 and 4-1 are thus blanks in plaintext
33
Multiple Letter Cipher
• Playfair cipher is a multiple letter cipher
• Each plaintext letter is replaced by a digram in
this cipher
• Number of digrams is 26 x 26 = 676
• User chooses a keyword and puts it in the cells
of a 5 x 5 matrix. I and J stay in one cell.
Duplicate letters appear only once.
• Alphabets that are not in the keyword are
arranged in the remaining cells from left to right
in successive rows in ascending order
34
Playfair Cipher
• Keyword “Infosec”
I / J N F O S
E C A B D
G H K L M
P Q R T U
V W X Y Z
35
Playfair Cipher
• Rules:
– Group plaintext letters two at a time
– Separate repeating letters with an x
– Take a pair of letters from plaintext
– Plaintext letters in the same row are replaced by
letters to the right (cyclic manner)
– Plaintext letters in the same column are replaced by
letters below (cyclic manner)
– Plaintext letters in different row and column are
replaced by the letter in the row corresponding to the
column of the other letter and vice versa
36
Playfair Cipher
• E.g., Plaintext: “CRYPTO IS TOO EASY”
• Keyword is “INFOSEC”
• Grouped text: CR YP TO IS TO XO EA SY
• Ciphertext: AQ VT YB NI YB YF CB OZ
• To decrypt, the receiver reconstructs the 5
x 5 matrix using the keyword and then
uses the same rules as for encryption
37
Vernam Cipher
• U.S. Army Major Joseph Mauborgne and
AT&T’s Gilbert Vernam developed a cipher
in 1917
• Uses a one time arrangement of a key
string that is as long as the plaintext
• Plaintexts are assumed to be short
• Also known as One-Time Pad cipher
• Key is used only once but characters in
key may not be distinct
38
Vernam Cipher
• E.g., Plaintext: HELLO
Key: KTBXZ
--------------
Ciphertext : RXMIN (using addition mod 26)
Key: KTBXZ
--------------
Plaintext: HELLO (using subtraction mod 26)

Mais conteúdo relacionado

Mais procurados (20)

RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
 
Cryptography
CryptographyCryptography
Cryptography
 
Des
DesDes
Des
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)
 
Cryptography
CryptographyCryptography
Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Key management
Key managementKey management
Key management
 
Cryptography
CryptographyCryptography
Cryptography
 

Semelhante a cypher tex.ppt

Cryptography (Distributed computing)
Cryptography (Distributed computing)Cryptography (Distributed computing)
Cryptography (Distributed computing)Sri Prasanna
 
Cryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit moreCryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit moreThings Lab
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
Vigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxVigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxpeter1097
 
The Effect Of Varying Key Length On A Vigenère Cipher
The Effect Of Varying Key Length On A Vigenère CipherThe Effect Of Varying Key Length On A Vigenère Cipher
The Effect Of Varying Key Length On A Vigenère Cipheriosrjce
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerQuantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerGokul Alex
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Quantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesQuantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesGokul Alex
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersGokul Alex
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution CipherSHUBHA CHATURVEDI
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1SHUBHA CHATURVEDI
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptographyG Prachi
 

Semelhante a cypher tex.ppt (20)

Network Security Lec 3.pptx
Network Security Lec 3.pptxNetwork Security Lec 3.pptx
Network Security Lec 3.pptx
 
Cryptography (Distributed computing)
Cryptography (Distributed computing)Cryptography (Distributed computing)
Cryptography (Distributed computing)
 
Cryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit moreCryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit more
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
Vigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptxVigenere Cipher computer security and network.pptx
Vigenere Cipher computer security and network.pptx
 
C017261823
C017261823C017261823
C017261823
 
The Effect Of Varying Key Length On A Vigenère Cipher
The Effect Of Varying Key Length On A Vigenère CipherThe Effect Of Varying Key Length On A Vigenère Cipher
The Effect Of Varying Key Length On A Vigenère Cipher
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerQuantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Quantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesQuantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different Perspectives
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging Frontiers
 
CH4__crypto.pptx
CH4__crypto.pptxCH4__crypto.pptx
CH4__crypto.pptx
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 
Cryptology
CryptologyCryptology
Cryptology
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Mais de bcanawakadalcollege (20)

Intro to Javascript.pptx
Intro to Javascript.pptxIntro to Javascript.pptx
Intro to Javascript.pptx
 
computer and software are changing.pptx
computer and software are changing.pptxcomputer and software are changing.pptx
computer and software are changing.pptx
 
tIME LINE.pptx
tIME LINE.pptxtIME LINE.pptx
tIME LINE.pptx
 
Basic HTML Tags.PPT
Basic HTML Tags.PPTBasic HTML Tags.PPT
Basic HTML Tags.PPT
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
17javascript.ppt
17javascript.ppt17javascript.ppt
17javascript.ppt
 
Logic gates and boolean algebra.ppt
Logic gates and boolean algebra.pptLogic gates and boolean algebra.ppt
Logic gates and boolean algebra.ppt
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Hidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptxHidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptx
 
Hidden Surface Removal.pptx
Hidden Surface Removal.pptxHidden Surface Removal.pptx
Hidden Surface Removal.pptx
 
Lecture6.orig.ppt
Lecture6.orig.pptLecture6.orig.ppt
Lecture6.orig.ppt
 
Bezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docxBezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docx
 
reliable_unreliable.pptx
reliable_unreliable.pptxreliable_unreliable.pptx
reliable_unreliable.pptx
 
2D-transformation-1.pdf
2D-transformation-1.pdf2D-transformation-1.pdf
2D-transformation-1.pdf
 
computer graphics unit 1-I.pptx
computer graphics unit 1-I.pptxcomputer graphics unit 1-I.pptx
computer graphics unit 1-I.pptx
 
CG_1.pdf
CG_1.pdfCG_1.pdf
CG_1.pdf
 
File System.pptx
File System.pptxFile System.pptx
File System.pptx
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 

Último (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

cypher tex.ppt

  • 2. 2 Substitution Ciphers • Monoalphabetic cipher – Caesar cipher • Polyalphabetic cipher – Vigenère cipher • Multiple letter cipher – Playfair cipher
  • 3. 3 Monoalphabetic cipher • Plaintext characters are substituted by a different alphabet stream of characters shifted to the right or left by n positions • E.g., ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC • Caesar cipher corresponds to n = 3 • Julius Caesar used the Caesar cipher method
  • 4. 4 Monoalphabetic cipher • The substitution cipher by shifting alphabets gives 26! > 4 x 1026 possibilities • This might appear to be too many choices to try for an exhaustive attack • This is a weak cipher because it would be easy to guess the pattern • Mono-alphabetic ciphers are vulnerable to cryptanalysis attack
  • 5. 5 Monoalphabetic cipher • The shift pattern above could be replaced by random assignment of characters for each alphabet • E.g., ABCDEFGHIJKLMNOPQRSTUVWXYZ PMJSQOLEYTVUAXIKCGBWDRNHZF • This would also give 26! possibilities
  • 6. 6 Pigpen Cipher • Pigpen cipher is a variation on letter substitution • Alphabets are arranged as follows: A B C D E F G H I J K L M N O P Q R
  • 7. 7 Pigpen Cipher diagram (cont’d) T S U V X W Y Z C G A W
  • 8. 8 Pigpen Cipher • Alphabets will be represented by the corresponding diagram • E.g., WAG would be • This is a weak cipher
  • 9. 9 ADFGVX Cipher • This is a variation on substitution cipher and is a strong cipher A D F G V X A 8 p 3 d 1 n D l t 4 o a h F 7 k b c 5 z G j u 6 w g m V x s v i r 2 X 9 e y 0 f q
  • 10. 10 ADFGVX Cipher • Rules: – Remove spaces and punctuation marks from message – For each letter or number substitute the letter pair from the column and row heading – Next, use a transposition operation on the pair of letters using a key word (which the receiver knows) – Rearrange the columns of the new arrangement in alphabetical order – Finally, arrange the letters from consecutive columns
  • 11. 11 ADFGVX Cipher • E.g., Message = SEE ME IN MALL – SEEMEINMALL – VDXDXDGXXDVGAXGXDVDADA – Use keyword of INFOSEC – Arrange the stage 1 ciphertext characters in a fresh grid with keyword as the column heading – Ciphertext is written in column order from left to right
  • 12. 12 ADFGVX Cipher I N F O S E C V D X D X D G X X D V G A X G X D V D A V
  • 13. 13 ADFGVX Cipher C E F I N O S G D X V D D X X A D X X V G V A D G X V D
  • 14. 14 ADFGVX Cipher • Ciphertext is: GXVDAAXDDVXGDXXDVVXGD • Recipient reverses the process using the same keyword and gets the plaintext • Reason for this cipher using the name ADFGVX is that in Morse code these characters all have dissimilar patterns of dots and dashes
  • 15. 15 Polyalphabetic Cipher • In monoalphabetic cipher the problem was that each character was substituted by a single character • Cryptanalysts are helped by the fact that they have to see what character would correspond in plaintext for a given ciphertext character • Polyalphabetic cipher’s goal is to make this process difficult
  • 16. 16 Polyalphabetic Cipher • In polyalphabetic cipher, each plaintext character may be replaced by more than one character • Since there are only 26 alphabets this process will require using a different representation than the alphabets • Alphabets ‘A’ through ‘Z’ are replaced by 00, 01, 02, …, 25 • We need two digits in this representation since we need to know how to reverse the process at the decryption side
  • 17. 17 Polyalphabetic Cipher • The most common method used is Vigenère cipher • Vigenère cipher starts with a 26 x 26 matrix of alphabets in sequence. First row starts with ‘A’, second row starts with ‘B’, etc. • Like the ADFGVX cipher, this cipher also requires a keyword that the sender and receiver know ahead of time • Each character of the message is combined with the characters of the keyword to find the ciphertext character
  • 18. 18 Vigenère Cipher Table A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B B A B C D E F G H I J K L M N O P Q R S T U V W X Y C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
  • 19. 19 Vigenère Cipher Table (cont’d) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
  • 20. 20 Polyalphabetic Cipher • E.g., Message = SEE ME IN MALL • Take keyword as INFOSEC • Vigenère cipher works as follows: S E E M E I N M A L L I N F O S E C I N F O ------------------------------------- A R J A W M P U N Q Z
  • 21. 21 Polyalphabetic Cipher • To decrypt, the receiver places the keyword characters below each ciphertext character • Using the table, choose the row corresponding to the keyword character and look for the ciphertext character in that row • Plaintext character is then at the top of that column
  • 22. 22 Polyalphabetic Cipher • Decryption of ciphertext: A R J A W M P U N Q Z I N F O S E C I N F O ------------------------------------- S E E M E I N M A L L • Best feature is that same plaintext character is substituted by different ciphertext characters (i.e., polyalphabetic)
  • 23. 23 Vigenère Cipher • Easiest way to handle Vigenère cipher is to use arithmetic modulo 26 • This approach dispenses with the need for the table • Keyword is converted to numbers and corresponding numbers in message and keyword are added modulo 26
  • 24. 24 Beale Cipher • Also known as book cipher • Keyword is taken as the first few words of a book that is agreed upon by sender and receiver • Everything else works like the Vigenère cipher
  • 25. 25 Hill Cipher • This involves the mathematical concept of matrices which we did not discuss • If you are interested then you can see pages 37-40 of Stallings, 2nd edition book on Cryptography
  • 26. 26 Polyalphabetic cipher • Vigenère cipher uses the fact that the keyword character helps to get different ciphertext characters from the table • Instead of the Vigenère table, one could develop a new table in which each character is represented as an integer and the ciphertext could use multiple digits for substitution depending on the frequency analysis of the letter • E.g., Q gets only one substitution value where as E gets 12 different substitution values, and so on
  • 27. 27 Transposition Cipher • Also known as a permutation cipher • Permutation is an arrangement of the original order of letters or numbers • E.g., a = 1 2 3 3 1 2 • “a” is a permutation of 1, 2, 3 such that 1 3 2 1 3 2
  • 28. 28 Transposition Cipher • a2 = 1 2 3 a3 = 1 2 3 2 3 1 1 2 3 • a3 is really identity as it does not change the order of the elements • “a” is said to have order 3, written |a| = 3 • “a” is an odd permutation as its order is an odd number
  • 29. 29 Transposition Cipher • In Transposition cipher position of character changes but not its value • This is different from substitution cipher • Assign values 0, 1, 2, …, 25 to the alphabets • Choose an integer n as the size of a block • Split the message into blocks of size n
  • 30. 30 Transposition Cipher • p = (p(1), p(2), …, p(n)) be a permutation of (1, 2, …, n) • Message is encrypted using the values of p(1), p(2), …, p(n) • E.g. Let n = 4 • Let p = 1 2 3 4 2 4 1 3
  • 31. 31 Transposition Cipher • message = proceed meeting as agreed • Since n = 4, we split the message as follows: proc eedm eeti ngas agre ed • We pad the last block with two spaces • Encrypt using the permutation order • Last block becomes d _ e _ where _ denotes a blank space • Delete the blank spaces in encrypted text
  • 32. 32 Transposition Cipher • Ciphertext using the permutation is: rcpoemedeietgsnagearde • To decrypt, the receiver simply takes the inverse of the permutation • In the last block of ciphertext we have de • The two missing characters corresponding to 3-1 and 4-1 are thus blanks in plaintext
  • 33. 33 Multiple Letter Cipher • Playfair cipher is a multiple letter cipher • Each plaintext letter is replaced by a digram in this cipher • Number of digrams is 26 x 26 = 676 • User chooses a keyword and puts it in the cells of a 5 x 5 matrix. I and J stay in one cell. Duplicate letters appear only once. • Alphabets that are not in the keyword are arranged in the remaining cells from left to right in successive rows in ascending order
  • 34. 34 Playfair Cipher • Keyword “Infosec” I / J N F O S E C A B D G H K L M P Q R T U V W X Y Z
  • 35. 35 Playfair Cipher • Rules: – Group plaintext letters two at a time – Separate repeating letters with an x – Take a pair of letters from plaintext – Plaintext letters in the same row are replaced by letters to the right (cyclic manner) – Plaintext letters in the same column are replaced by letters below (cyclic manner) – Plaintext letters in different row and column are replaced by the letter in the row corresponding to the column of the other letter and vice versa
  • 36. 36 Playfair Cipher • E.g., Plaintext: “CRYPTO IS TOO EASY” • Keyword is “INFOSEC” • Grouped text: CR YP TO IS TO XO EA SY • Ciphertext: AQ VT YB NI YB YF CB OZ • To decrypt, the receiver reconstructs the 5 x 5 matrix using the keyword and then uses the same rules as for encryption
  • 37. 37 Vernam Cipher • U.S. Army Major Joseph Mauborgne and AT&T’s Gilbert Vernam developed a cipher in 1917 • Uses a one time arrangement of a key string that is as long as the plaintext • Plaintexts are assumed to be short • Also known as One-Time Pad cipher • Key is used only once but characters in key may not be distinct
  • 38. 38 Vernam Cipher • E.g., Plaintext: HELLO Key: KTBXZ -------------- Ciphertext : RXMIN (using addition mod 26) Key: KTBXZ -------------- Plaintext: HELLO (using subtraction mod 26)