SlideShare uma empresa Scribd logo
1 de 72
Baixar para ler offline
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 Encryption algorithm: The encryption algorithm performs various
substitutions and transformations on the plaintext.
 Secret key: The secret key is also input to the encryption algorithm.
The key is a value independent of the plaintext and of the algorithm.
The algorithm will produce a different output depending on the
specific key being used at the time.
Classical Encryption Techniques 1
 Ciphertext: This is the scrambled message produced as output. It
depends on the plaintext and the secret key.
 Decryption algorithm: This is essentially the encryption algorithm run
in reverse. It takes the ciphertext and the secret key and produces
the original plaintext.
Classical Encryption Techniques 1
 Symmetric-key algorithms are algorithms for cryptography that use
the same cryptographic keys for both encryption of plaintext and
decryption of ciphertext.
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Cipherered text
3
IODQN HDVW
DWWDFN DW GDZQ
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The clear text message would be
encoded using a key of 3.
1
FLANK EAST
ATTACK AT DAWN
Shift the top
scroll over by
three characters
(key of 3), an A
becomes D, B
becomes E, and
so on.
2
The clear text message would
be encrypted as follows using a
key of 3.
Clear text
Classical Encryption Techniques 1
 Caesar Cipher
 Monoalphabetic Ciphers
 Playfair Cipher
 Hill Cipher
 Polyalphabetic Ciphers
 Vigenère Cipher
 Autokey Cipher
 Vernam Cipher
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Caesar Cipher is one of the simplest and most
widely known encryption techniques.
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 PlainText = dcodex
 K=3
1) P=d
2) P=3
3) C=P+K mod 26=3+3 mod 26=6 mod 26 =6
4) C=g
Classical Encryption Techniques 1
 PlainText = dcodex
 K=3
1) P=x
2) P=23
3) C=P+K mod 26=23+3 mod 26=26 mod 26= 0
4) C=a
Classical Encryption Techniques 1
 P= dcodex
 C= gfrgha
 K=3
Classical Encryption Techniques 1
 CipherText = gfrgha
 K=3
1) C=g
2) C=6
3) P=C-K mod 26=6-3 mod 26=3
4) P=d
Classical Encryption Techniques 1
 CipherText = gfrgha
 K=3
1) C=a
2) C=0
3) P=C-K mod 26=0-3 mod 26=-3 mod 26 =23
4) P=x
Classical Encryption Techniques 1
 C= gfrgha
 P= dcodex
 K=3
Classical Encryption Techniques 1
 Three important characteristics of this problem enabled us to use a
bruteforce cryptanalysis:
The encryption and decryption algorithms are known.
There are only 25 keys to try.
The language of the plaintext is known and easily
recognizable.
Classical Encryption Techniques 1
Classical Encryption Techniques 1
How to implement Caesar Cipher
technique on Arabic letters?
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
A monoalphabetic cipher uses fixed substitution over
the entire message
Random Key
Classical Encryption Techniques 1
 Example:
Plaintext alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY
 P= ITEMS
 Encoding
 C= FQAIP
 Decoding
 P= ITEMS
Classical Encryption Techniques 1
 Relative Frequency of
Letters in English Text
Classical Encryption Techniques 1
 C=
Classical Encryption Techniques 1
 cipher letters P and Z are the equivalents of plain letters e and t
Classical Encryption Techniques 1
 Finally, The complete plaintext
Classical Encryption Techniques 1
How to implement Monoalphabetic
Cipher technique on Arabic letters?
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
 The Playfair system was invented by Charles Wheatstone, who first
described it in 1854.
 Used by many countries during wartime
 The Playfair algorithm is based on the use of a 5 x 5 matrix of
letters constructed using a keyword.
Classical Encryption Techniques 1
 In this case, the keyword is monarchy.
Classical Encryption Techniques 1
 4 Rules:
1) If both letters are the same (or only one letter is left),
add an "X" after the first letter.
2) If the letters appear on the same row of your table,
replace them with the letters to their immediate right
respectively
Classical Encryption Techniques 1
 4 Rules:
3) If the letters appear on the same column of your table,
replace them with the letters immediately below
respectively
4) If the letters are not on the same row or column, replace
them with the letters on the same row respectively but at
the other pair of corners of the rectangle defined by the
original pair.
Classical Encryption Techniques 1
 P=Hide the gold in the tree stump (note the null "X" used to separate
the repeated "E"s)
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
 K= playfair example
Classical Encryption Techniques 1
 How to build 5x5 Matrix (assuming that I and J are
interchangeable), the table becomes (omitted letters in red):
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
C= BM OD ZB XD NA BE KU DM UI XM MO UV IF
the message "Hide the gold in the tree stump" becomes
"BMODZ BXDNA BEKUD MUIXM MOUVI F"
Classical Encryption Techniques 1
Using Playfair Cipher how to decrepit the
following cipher text:
C= “BMODZ BXDNA BEKUD MUIXM MOUVI F”
K= playfair example
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
 The Hill Cipher was invented by Lester S. Hill in 1929
 The Hill Cipher based on linear algebra
 Encryption
 2 x 2 Matrix Encryption
 3 x 3 Matrix Encryption
Classical Encryption Techniques 1
 square matrix 𝑀 by the equation 𝑀𝑀−1
= 𝑀−1
𝑀= 𝐼, where 𝐼 is the
identity matrix.
 C = P*K mod 26
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 Example of Key 2 x 2
 𝐾 =
𝐻 𝐼
𝐿 𝐿
=
7 8
11 11
 plaintext message "short example“
 𝑃= short example
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
 𝐶 = 𝐾 ∗ 𝑃 𝑚𝑜𝑑 26

𝑘0 𝑘1
𝑘2 𝑘3
∗
𝑝0
𝑝1
=
𝑘0 ∗ 𝑝0 + 𝑘1 ∗ 𝑝1
𝑘2 ∗ 𝑝0 + 𝑘3 ∗ 𝑝1

7 8
11 11
∗
18
7
=
7 ∗ 18 + 8 ∗ 7
11 ∗ 18 + 11 ∗ 7
=
182
275
 𝐶 =
182
275
𝑚𝑜𝑑 26 =
0
15
=
𝑎
𝑝
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
 This gives us a final ciphertext of "APADJ TFTWLFJ"
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
 This gives us a final ciphertext of "APADJ TFTWLFJ“
 𝐾 =
𝐻 𝐼
𝐿 𝐿
=
7 8
11 11
 We want to find 𝐾−1
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 1 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡
𝐷 𝐾 = 7 ∗ 11 − 8 ∗ 11 = −11 𝑚𝑜𝑑 26 = 15
𝐷𝐷−1
= 1 𝑚𝑜𝑑 26 = 15 ∗ 𝐷−1
15 ∗ 𝐷−1
𝑚𝑜𝑑 26 = 1
Try and Test 1 𝑚𝑜𝑑 26 = 105
105 mod 26 =1
𝐷−1
= 7
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 2 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥 𝑜𝑓 𝐾𝑒𝑦
𝑎𝑑𝑗
𝑎 𝑏
𝑐 𝑑
=
𝑑 −𝑏
−𝑐 𝑎
𝑎𝑑𝑗
7 8
11 11
=
11 −8
−11 7
mod 26 =
11 18
15 7
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 3 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑦 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡
𝑏𝑦 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥
 7 ∗
11 18
15 7
=
77 126
105 49
𝑚𝑜𝑑 26 =
25 22
1 23
= 𝐾−1
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
Using Hill Cipher how to implement 3x3 matrix
encryption ? The key for a hill cipher is a matrix
e.g. 𝒌 =
2 4 5
9 2 1
3 17 7
and message= ATTACK AT DAWN
Classical Encryption Techniques 1
 Use MS Word
 Send me mail to mloey@live.com with email subject “
Classical Encryption Techniques 1 “
 Put your name on Arabic with department and section on word and
email body
 Finally, press Send
 Deadline Next Lecture
Classical Encryption Techniques 1
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
Classical Encryption Techniques 1
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

Mais conteúdo relacionado

Mais procurados

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 

Mais procurados (20)

El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Vigenere cipher
Vigenere cipherVigenere cipher
Vigenere cipher
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 

Destaque

Destaque (20)

Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
 
Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12
 
Tx 3 hill shuman_oliver
Tx 3 hill shuman_oliverTx 3 hill shuman_oliver
Tx 3 hill shuman_oliver
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Crypto tools
Crypto toolsCrypto tools
Crypto tools
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Excel Lecture
Excel LectureExcel Lecture
Excel Lecture
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
 
Decoding QR codes
Decoding QR codesDecoding QR codes
Decoding QR codes
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
 

Semelhante a Computer Security Lecture 2: Classical Encryption Techniques 1

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentation
MuneebZahid10
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
nagwaAboElenein
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
 

Semelhante a Computer Security Lecture 2: Classical Encryption Techniques 1 (20)

Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
IS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfIS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdf
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Unit 1
Unit 1Unit 1
Unit 1
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentation
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Symmetric
SymmetricSymmetric
Symmetric
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 

Mais de Mohamed Loey

Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
Mohamed Loey
 

Mais de Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Computer Security Lecture 2: Classical Encryption Techniques 1

  • 1. Classical Encryption Techniques 1 Classical Encryption Techniques 1
  • 2. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 3. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 5. Classical Encryption Techniques 1  Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext.  Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time.
  • 6. Classical Encryption Techniques 1  Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the secret key.  Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the ciphertext and the secret key and produces the original plaintext.
  • 7. Classical Encryption Techniques 1  Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
  • 8. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 9. Classical Encryption Techniques 1 Cipherered text 3 IODQN HDVW DWWDFN DW GDZQ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The clear text message would be encoded using a key of 3. 1 FLANK EAST ATTACK AT DAWN Shift the top scroll over by three characters (key of 3), an A becomes D, B becomes E, and so on. 2 The clear text message would be encrypted as follows using a key of 3. Clear text
  • 10. Classical Encryption Techniques 1  Caesar Cipher  Monoalphabetic Ciphers  Playfair Cipher  Hill Cipher  Polyalphabetic Ciphers  Vigenère Cipher  Autokey Cipher  Vernam Cipher
  • 11. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 12. Classical Encryption Techniques 1 Caesar Cipher is one of the simplest and most widely known encryption techniques.
  • 16. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=d 2) P=3 3) C=P+K mod 26=3+3 mod 26=6 mod 26 =6 4) C=g
  • 17. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=x 2) P=23 3) C=P+K mod 26=23+3 mod 26=26 mod 26= 0 4) C=a
  • 18. Classical Encryption Techniques 1  P= dcodex  C= gfrgha  K=3
  • 19. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=g 2) C=6 3) P=C-K mod 26=6-3 mod 26=3 4) P=d
  • 20. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=a 2) C=0 3) P=C-K mod 26=0-3 mod 26=-3 mod 26 =23 4) P=x
  • 21. Classical Encryption Techniques 1  C= gfrgha  P= dcodex  K=3
  • 22. Classical Encryption Techniques 1  Three important characteristics of this problem enabled us to use a bruteforce cryptanalysis: The encryption and decryption algorithms are known. There are only 25 keys to try. The language of the plaintext is known and easily recognizable.
  • 24. Classical Encryption Techniques 1 How to implement Caesar Cipher technique on Arabic letters?
  • 25. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 26. Classical Encryption Techniques 1 A monoalphabetic cipher uses fixed substitution over the entire message Random Key
  • 27. Classical Encryption Techniques 1  Example: Plaintext alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY  P= ITEMS  Encoding  C= FQAIP  Decoding  P= ITEMS
  • 28. Classical Encryption Techniques 1  Relative Frequency of Letters in English Text
  • 30. Classical Encryption Techniques 1  cipher letters P and Z are the equivalents of plain letters e and t
  • 31. Classical Encryption Techniques 1  Finally, The complete plaintext
  • 32. Classical Encryption Techniques 1 How to implement Monoalphabetic Cipher technique on Arabic letters?
  • 33. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 34. Classical Encryption Techniques 1  The Playfair system was invented by Charles Wheatstone, who first described it in 1854.  Used by many countries during wartime  The Playfair algorithm is based on the use of a 5 x 5 matrix of letters constructed using a keyword.
  • 35. Classical Encryption Techniques 1  In this case, the keyword is monarchy.
  • 36. Classical Encryption Techniques 1  4 Rules: 1) If both letters are the same (or only one letter is left), add an "X" after the first letter. 2) If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively
  • 37. Classical Encryption Techniques 1  4 Rules: 3) If the letters appear on the same column of your table, replace them with the letters immediately below respectively 4) If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair.
  • 38. Classical Encryption Techniques 1  P=Hide the gold in the tree stump (note the null "X" used to separate the repeated "E"s)  P= HI DE TH EG OL DI NT HE TR EX ES TU MP  K= playfair example
  • 39. Classical Encryption Techniques 1  How to build 5x5 Matrix (assuming that I and J are interchangeable), the table becomes (omitted letters in red):
  • 40. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 41. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 42. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 43. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 44. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 45. Classical Encryption Techniques 1 C= BM OD ZB XD NA BE KU DM UI XM MO UV IF the message "Hide the gold in the tree stump" becomes "BMODZ BXDNA BEKUD MUIXM MOUVI F"
  • 46. Classical Encryption Techniques 1 Using Playfair Cipher how to decrepit the following cipher text: C= “BMODZ BXDNA BEKUD MUIXM MOUVI F” K= playfair example
  • 47. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 48. Classical Encryption Techniques 1  The Hill Cipher was invented by Lester S. Hill in 1929  The Hill Cipher based on linear algebra  Encryption  2 x 2 Matrix Encryption  3 x 3 Matrix Encryption
  • 49. Classical Encryption Techniques 1  square matrix 𝑀 by the equation 𝑀𝑀−1 = 𝑀−1 𝑀= 𝐼, where 𝐼 is the identity matrix.  C = P*K mod 26
  • 51. Classical Encryption Techniques 1  Example of Key 2 x 2  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  plaintext message "short example“  𝑃= short example  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 52. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4  𝐶 = 𝐾 ∗ 𝑃 𝑚𝑜𝑑 26  𝑘0 𝑘1 𝑘2 𝑘3 ∗ 𝑝0 𝑝1 = 𝑘0 ∗ 𝑝0 + 𝑘1 ∗ 𝑝1 𝑘2 ∗ 𝑝0 + 𝑘3 ∗ 𝑝1  7 8 11 11 ∗ 18 7 = 7 ∗ 18 + 8 ∗ 7 11 ∗ 18 + 11 ∗ 7 = 182 275  𝐶 = 182 275 𝑚𝑜𝑑 26 = 0 15 = 𝑎 𝑝
  • 53. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 54. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 55. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 56. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 57. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 58. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ"
  • 59. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ“  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  We want to find 𝐾−1
  • 60. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 1 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝐷 𝐾 = 7 ∗ 11 − 8 ∗ 11 = −11 𝑚𝑜𝑑 26 = 15 𝐷𝐷−1 = 1 𝑚𝑜𝑑 26 = 15 ∗ 𝐷−1 15 ∗ 𝐷−1 𝑚𝑜𝑑 26 = 1 Try and Test 1 𝑚𝑜𝑑 26 = 105 105 mod 26 =1 𝐷−1 = 7
  • 61. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 2 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥 𝑜𝑓 𝐾𝑒𝑦 𝑎𝑑𝑗 𝑎 𝑏 𝑐 𝑑 = 𝑑 −𝑏 −𝑐 𝑎 𝑎𝑑𝑗 7 8 11 11 = 11 −8 −11 7 mod 26 = 11 18 15 7
  • 62. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 3 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑦 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝑏𝑦 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥  7 ∗ 11 18 15 7 = 77 126 105 49 𝑚𝑜𝑑 26 = 25 22 1 23 = 𝐾−1
  • 63. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 64. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 65. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 66. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 67. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 68. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 69. Classical Encryption Techniques 1 Using Hill Cipher how to implement 3x3 matrix encryption ? The key for a hill cipher is a matrix e.g. 𝒌 = 2 4 5 9 2 1 3 17 7 and message= ATTACK AT DAWN
  • 70. Classical Encryption Techniques 1  Use MS Word  Send me mail to mloey@live.com with email subject “ Classical Encryption Techniques 1 “  Put your name on Arabic with department and section on word and email body  Finally, press Send  Deadline Next Lecture
  • 71. Classical Encryption Techniques 1 facebook.com/mloey mohamedloey@gmail.com twitter.com/mloey linkedin.com/in/mloey mloey@fci.bu.edu.eg mloey.github.io
  • 72. Classical Encryption Techniques 1 www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME