0
Upcoming SlideShare
×

# Transposition cipher

888

Published on

Cipher

Published in: Technology
0 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• Be the first to comment

• Be the first to like this

Views
Total Views
888
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
22
0
Likes
0
Embeds 0
No embeds

No notes for slide

### Transcript of "Transposition cipher"

1. 1. TranspositionTransposition CipherCipher A . Antony Alex MCA Dr G R D College of Science – CBE Tamil Nadu - India
2. 2. KeywordsKeywords Cryptography EncryptionEncryption Decryption Cipher
3. 3. In cryptography, a TRANSPOSITION CIPHER is a method of encryption by which the positions held by units of plaintext are shifted according to a regular system, soshifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.
4. 4. The order of the units is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.and an inverse function to decrypt.
5. 5. Most Common GameMost Common Game -- AnagramAnagram TSPSH ALSIS EASAM GIMEE THIS IS A SAMPLE MESSAGE
6. 6. Rail Fence cipher Route cipher Columnar transpositionColumnar transposition Double transposition Myszkowski transposition
7. 7. Rail Fence cipherRail Fence cipher
8. 8. Route cipherRoute cipher
9. 9. Columnar transpositionColumnar transposition ZEBRAS "6 3 2 4 1 5“ EVLNA CDTES EAROF ODEEC WIREE
10. 10. Double transpositionDouble transposition STRIPE "564231“ CAEEN SOIAE DRLEF WEDRE EVTOC
11. 11. Myszkowski transpositionMyszkowski transposition TOMATO 532164 TOMATO 432143 ROFOA CDTED SEEEA CWEIV RLENE
12. 12. Break Columnar TranspositionBreak Columnar Transposition CipherCipher Cryptanalyst must be aware that he is dealing with cipher Frequency of E,T,A,O,I,N, etcFrequency of E,T,A,O,I,N, etc No of Columns Suspect Assumption
13. 13. OneOne--Time PadsTime Pads Random Bit String Converting plain text to bit String ◦ Converting plant text into its ASCII Representation • EXCLUSIVE OR of two string DisadvantageDisadvantage • Key cannot be memorized – written • The amount of data is limited to key available • Sensitivity Can de advantage in computers Using storage devices along with huge data for key transporting.
14. 14. THANK U………….THANK U………….
1. #### A particular slide catching your eye?

Clipping is a handy way to collect important slides you want to go back to later.