You are on page 1of 15

cryptography

TOPICS

INTRODUCTION TO CRYPTOGRAPHY

SUBSTITUTION CIPHERS

TRANSPOSITION CIPHERS
INTRODUCTION
Cryptography (or cryptology; from Greek Words
kryptos "hidden, secret"; and gráph, "writing", is the
practice and study of hiding information.
Cryptology prior to the modern age was almost
synonymous with encryption, the conversion of
information from a readable state to nonsense.
 The sender retained the ability to decrypt the
information and therefore avoid unwanted persons
being able to read it.
The art of breaking ciphers – CRYPTANALYSIS.
The art of devising them – CRYPTOLOGY.
Working of Cryptography
Contd…..
Encryption, which is the process of
converting ordinary information (plaintext)
into unintelligible gibberish (i.e., cipher
text).
Decryption is the reverse, in other words,
moving from the unintelligible cipher text
back to plaintext.
 A cipher (or cypher) is a pair
of algorithms that create the encryption
and the reversing decryption.
The detailed operation of a cipher is
controlled both by the algorithm and in
each instance by a key.
Secrecy lies in key called kerckhoff’s
CIPHER MACHINE
SUBSTITUTION CIPHER
a substitution cipher is a method of encryption by
which units of plaintext are replaced
with ciphertext according to a regular system.
There are several types of substitution
cryptosystems:
Monoalphabetic substitution involves replacing
each letter in the message with another letter of the
alphabet
Polyalphabetic substitution involves using a series
of monoalphabetic ciphers that are periodically reused
Homophonic substitution makes it possible to have
each letter of the plaintext message correspond to a
possible group of other characters
Polygraphic substitution involves replacing a group
CONTD…
The Ceasar Cipher was an early substitution cipher.
In the Caesar Cipher, each character is shifted three
places up. Therefore, A becomes D and B becomes E,
etc…
Example::
Plain text:: VOYAGER
Cipher text:: YRBDJHU
Key is shift 3 place for each letter.
Plaintext::VOYAGER
Key::+1+2+3+1+2+3+1
Cipher text::WQBBIHS
Contd….
ROT 13
CRACK A CODE
IMPORTANT POINTS
Most Frequent Single Letters::E T A O I N S H R D L
U
Most Frequent Digraphs :: th er on an re he in ed nd
ha at en es of or nt ea ti to it st io le is ou ar as de rt
ve.
Most Frequent Trigraphs::the and tha ent ion tio for
nde has nce edt tis oft sth men
Most Common Doubles::ss ee tt ff ll mm oo
Most Frequent Initial Letters::T O A W B C D S F M R
HIYEGLNPUJK
Most Frequent Final Letters::E S T D N R Y F L O G
HAKMPUW

TRANSPOSITION CIPHER
Transposition cipher is a method of encryption by
which the positions of Plain text is just reordered.
Types:-:
Rail Fence cipher:: is a form of transposition cipher
that gets its name from the way in which it is encoded.
Plain text:: we are discovered flee at
W. . . E . . .C . . . R . . . L . . . T . . . E
.E .R. D .S.O. E . E . F . E . A. O . C.
. . A . . . I ... V . . .D. . .E . . . N .
Cipher text:: . WECRL TEERD SOEEF EAOCA IVDEN
TYPES OF TRANSPOSITION
CIPHER
Route cipher::the plaintext is first written out in a grid
of given dimensions, then read off in a pattern given in
the key
WRIORFEOE
E E S V E LAN J key :spiral inwards, clockwise,
starting from
ADCEDETCX the top right
Cipher text:: EJXCTEDECDAEWRIORFEONALEVSE
Contd…
Columnar cipher :: the message is written out in rows
of a fixed length, and then read out again column by
column, and the columns are chosen in some
scrambled order. Both the width of the rows and the
permutation of the columns are usually defined by a
keyword.

Plain text:: meet me at next midnight.


Cipher text:: EATITNIHMEXNETMGMEDT
CONTD…
Double Transposition:: A single columnar
transposition could be attacked by guessing possible
column lengths, writing the message out in its columns
(but in the wrong order, as the key is not yet known),
and then looking for possible anagrams. Thus to make
it stronger, a double transposition was often used. This
is simply a columnar transposition applied twice. The
same key can be used for both transpositions, or two
Fdifferent
A keys
N can C be used.
Y
3From1previous,
4 cipher
2 5text:
EEATITNIHMEXNETMGMEDT
A T I T
N I H M E FINAL CIPHER TEXT::
X N E T M
AINMIMTDENXGTHEETEMT
G M E D T
UIBOL ZPV!!!
THANK YOU!!!

You might also like