SlideShare a Scribd company logo
1 of 30
The Rail-Fence Cipher
Matt Brems
Melissa Hannebaum
Franklin College
Cryptology
Be
Rational.
Get
Real.
Methods of Character Encryption
Substitution Transposition
Plaintext
Ciphertext
Methods of Character Encryption
Substitution
Plaintext
Ciphertext
Part
Of
Key
Methods of Character Encryption
Transposition
Plaintext
Ciphertext
Transposition Cipher
• Columnar
• A method of encryption in which the plaintext
is shifted according to a regular system, so
that the ciphertext constitutes a permutation
of the plaintext.
Columnar Transposition As A Function
f(x) = y
Columnar Transposition As A Function
Transposition Cipher
Plaintext
Ciphertext
Columnar Transposition As A Function
• The columnar transposition cipher uses a
bijective (one-to-one and onto) function to
encrypt the text and an inverse function to
decrypt the text.
Columnar Transposition
• Three Columns
C = 3
Rail-Fence Cipher
• Two Columns
• C = 2
Rail-Fence Cipher
• C = 2
Selected Formulas
Rail-Fence Cipher
Rail-Fence Cipher
• 4 permutations
• Conjecture: Length n
implies order (n-1)
Rail-Fence Cipher
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
F A K I C L E E A H N C M U I G R N L N O L G M T A D O P T N !
F K C E A N M I R L O G T D P N A I L E H C U G N N L M A O T !
F C A M R O T P A L H U N L A T K E N I L G D N I E C G N M O !
F A R T A H N A K N L D I C N O C M O P L U L T E I G N E G M !
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
Rail-Fence Cipher
• Length of plaintext = 5
• Cycles of characters
• Can be numerous cycles
in one encryption
0 1 2 3 4
0 1 2 3 4
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length Cycle
2 1
3 2
4 2
5 4
6 4
7 3
8 3
9 6, 2
10 6, 2
Length Cycle
11 10
12 10
13 12
14 12
15 4, 2
16 4, 2
32 5
49 21
64 6
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
F A K I C L E E A H N C M U I G R N L N O L G M T A D O P T N !
F K C E A N M I R L O G T D P N A I L E H C U G N N L M A O T !
F C A M R O T P A L H U N L A T K E N I L G D N I E C G N M O !
F A R T A H N A K N L D I C N O C M O P L U L T E I G N E G M !
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
Primes
General Rules
Answered Questions
• What are the fixed points in a RFC?
• What are the fixed points in a general CTC?
• Can we tell when the RFC has a k-cycle?
Unanswered Questions
• Simple way to calculate length of initial cycle?
• Can we tell when the CTC has a k-cycle?
• How much of this works if C > 2?
Questions?

More Related Content

What's hot

TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipherVasuki Ramasamy
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream CiphersSam Bowne
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptxjaytanwani
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityshraddha mane
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithmRuchi Maurya
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution CipherSHUBHA CHATURVEDI
 

What's hot (20)

TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
IP Security
IP SecurityIP Security
IP Security
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
Web Security
Web SecurityWeb Security
Web Security
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
IPv4
IPv4IPv4
IPv4
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 

Similar to Rail-Fence Cipher Presentation

4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz Kowalczewski4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz KowalczewskiPROIDEA
 
Quantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesQuantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesGokul Alex
 
Ccm mechanical design-presentation
Ccm mechanical design-presentationCcm mechanical design-presentation
Ccm mechanical design-presentationRadi Nasr
 
Coastal processes blog erosion
Coastal processes blog erosionCoastal processes blog erosion
Coastal processes blog erosionMissST
 
Hacking the kodak funsaver flash
Hacking the kodak funsaver flashHacking the kodak funsaver flash
Hacking the kodak funsaver flashMechEProdigy
 
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitCanary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitAmazon Web Services
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersGokul Alex
 
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerQuantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerGokul Alex
 

Similar to Rail-Fence Cipher Presentation (11)

4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz Kowalczewski4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz Kowalczewski
 
Measure to fail
Measure to failMeasure to fail
Measure to fail
 
SF2500 brochure
SF2500 brochureSF2500 brochure
SF2500 brochure
 
Quantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesQuantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different Perspectives
 
Ccm mechanical design-presentation
Ccm mechanical design-presentationCcm mechanical design-presentation
Ccm mechanical design-presentation
 
Coastal processes blog erosion
Coastal processes blog erosionCoastal processes blog erosion
Coastal processes blog erosion
 
Hacking the kodak funsaver flash
Hacking the kodak funsaver flashHacking the kodak funsaver flash
Hacking the kodak funsaver flash
 
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitCanary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
 
300k w transmitter
300k w transmitter300k w transmitter
300k w transmitter
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging Frontiers
 
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerQuantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
 

Rail-Fence Cipher Presentation

Editor's Notes

  1. Column 3 or 4 example like a last name etc Transition to c=2 columnar aka rail fence
  2. Column 3 or 4 example like a last name etc Transition to c=2 columnar aka rail fence
  3. Conjecture only on the last slide
  4. Also only takes 5 (ie conjecture is wrong) How can we know how many? Cycles (answer)
  5. WHAT”S GOING ON WITHIN THE FUNCTION???
  6. N=16
  7. LENGTH OF 3^n etc and prime factors
  8. What we accomplished, add patterns Initial length – check Fixed points – moderate check for RFC Factors PRIMES!! :D REARRANGE