Your SlideShare is downloading. ×
0
TranspositionTransposition
CipherCipher
A . Antony Alex MCA
Dr G R D College of Science – CBE
Tamil Nadu - India
KeywordsKeywords
Cryptography
EncryptionEncryption
Decryption
Cipher
In cryptography, a TRANSPOSITION CIPHER is
a method of encryption by which the
positions held by units of plaintext are
sh...
The order of the units is changed.
Mathematically a bijective function is used
on the characters' positions to encrypt
and...
Most Common GameMost Common Game --
AnagramAnagram
TSPSH ALSIS EASAM GIMEE
THIS IS A SAMPLE MESSAGE
Rail Fence cipher
Route cipher
Columnar transpositionColumnar transposition
Double transposition
Myszkowski transposition
Rail Fence cipherRail Fence cipher
Route cipherRoute cipher
Columnar transpositionColumnar transposition
ZEBRAS
"6 3 2 4 1 5“
EVLNA CDTES EAROF ODEEC WIREE
Double transpositionDouble transposition
STRIPE
"564231“
CAEEN SOIAE DRLEF WEDRE EVTOC
Myszkowski transpositionMyszkowski transposition
TOMATO
532164
TOMATO
432143
ROFOA CDTED SEEEA CWEIV RLENE
Break Columnar TranspositionBreak Columnar Transposition
CipherCipher
Cryptanalyst must be aware that he is
dealing with c...
OneOne--Time PadsTime Pads
Random Bit String
Converting plain text to bit String
◦ Converting plant text into its ASCII Re...
THANK U………….THANK U………….
Upcoming SlideShare
Loading in...5
×

Transposition cipher

888

Published on

Cipher

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
888
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Transposition cipher"

  1. 1. TranspositionTransposition CipherCipher A . Antony Alex MCA Dr G R D College of Science – CBE Tamil Nadu - India
  2. 2. KeywordsKeywords Cryptography EncryptionEncryption Decryption Cipher
  3. 3. In cryptography, a TRANSPOSITION CIPHER is a method of encryption by which the positions held by units of plaintext are shifted according to a regular system, soshifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.
  4. 4. The order of the units is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.and an inverse function to decrypt.
  5. 5. Most Common GameMost Common Game -- AnagramAnagram TSPSH ALSIS EASAM GIMEE THIS IS A SAMPLE MESSAGE
  6. 6. Rail Fence cipher Route cipher Columnar transpositionColumnar transposition Double transposition Myszkowski transposition
  7. 7. Rail Fence cipherRail Fence cipher
  8. 8. Route cipherRoute cipher
  9. 9. Columnar transpositionColumnar transposition ZEBRAS "6 3 2 4 1 5“ EVLNA CDTES EAROF ODEEC WIREE
  10. 10. Double transpositionDouble transposition STRIPE "564231“ CAEEN SOIAE DRLEF WEDRE EVTOC
  11. 11. Myszkowski transpositionMyszkowski transposition TOMATO 532164 TOMATO 432143 ROFOA CDTED SEEEA CWEIV RLENE
  12. 12. Break Columnar TranspositionBreak Columnar Transposition CipherCipher Cryptanalyst must be aware that he is dealing with cipher Frequency of E,T,A,O,I,N, etcFrequency of E,T,A,O,I,N, etc No of Columns Suspect Assumption
  13. 13. OneOne--Time PadsTime Pads Random Bit String Converting plain text to bit String ◦ Converting plant text into its ASCII Representation • EXCLUSIVE OR of two string DisadvantageDisadvantage • Key cannot be memorized – written • The amount of data is limited to key available • Sensitivity Can de advantage in computers Using storage devices along with huge data for key transporting.
  14. 14. THANK U………….THANK U………….
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×