SlideShare a Scribd company logo
1 of 25
It is the practice and study of techniques for secure
communication in the presence of third parties.
Science and art of transforming messages to make them
secure and immune to attack.
The art of protecting information by transforming it ie;
encrypting it into an unreadable format is called
ciphertext.Only those who possess a secret key can decipher
the message into plain text.
Substitution ciphers
Transposition ciphers
It is a method of encoding by which units of plaintext are
replaced with ciphertext ,according to a fixed system;the
“units” may be single letters,pairs of letters,triplets of
letters,mixtures of the above and so forth.
The receiver deciphers the text by performing the inverse
substitution.
It is a simple data encryption scheme in which
plaintext characters are shifted in some regular pattern
to form cipher text.
In transposition ciphers letters are jumbled up together.
Highly secure
SUBSTITUTION CIPHERS
CAESAR
CIPHERS
AUTOKEY
CIPHERS
AFFINE
CIPHERS
VIGNERE
CIPHERS
Caesar cipher involves replacing each letter of alphabet
with the letter standing three places further down the
alphabet.
Encryption
Algorithm: C= (p+3)mod26
Decryption
Algorithm: P= (c-3)mod26
In an Autokey cipher the plain text itself is used
as a keyword with a slight modification.
Encryption
We have to start the keyword with a short seed,
Generally a plain text followed by a single letter.
Then write that seed letter below to first letter and plain
text itself is written below all other letters. Then sum up
the corresponding digital equivalence of the letters, and
convert it into cipher text.
Decryption
Decryption is done by rewriting to each numerical term of
both plaintext and cipher text. Suppose the plain text has
digital equivalent cipher text is c1,c2,……..cn.
If S indicate the numeral for C then the plain text number is,
P1 = (c1-S) mod26
Pk = (ck- P k-1)mod 26
Example of Monoalphabetic Cipher.
Here the encryption process is substantially mathematical.
Encryption
The first step in the encryption process is to transform each
of the letters in the plaintext alphabet to the corresponding
integer in the range 0 to m-1. With this done, the
encryption process for each letter is given by
E(x) = (ax + b) mod m Where a and b are the key for the cipher.
Decryption
In deciphering the cipher text, we must perform the
opposite (or inverse) functions on the cipher text to
retrieve the plaintext. Once again, the first step is to
convert each of the cipher text letters into their integer
values. We must now perform the following calculation
on each integer
D(x) = c(x - b) mod m
Where c is the modular multiplicative inverse of a.
The Vigenere Cipher is an adaptation of the Trithemius
Cipher, but instead of systematically progressing through the
cipher text alphabets in the Tabula Recta, it uses a keyword to
pick which columns to use.
Encryption
A sequence of n letters with numerical equivalence b1,b2,...bn will serve as
keyword. The plane text message is expressed as p1,p2....pn say pi.Then
conversion to cipher text using the congruence relation.
Ci=Pi +bi (mod26) ; i=1,2....n
For eg: plaintext message is “a simple example”
Decryption
Deciphering is carried out by the relation
Pi =Ci –bi (mod26)
Plain text a s i m p l e e x a m p l e
Key
stream
b a t t i s t a b a t t i s
TRANSPOSITION CIPHERS
RAIL
FENCE
CIPHERS
ROUTE
CIPHERS
COLUMNAR
TRANSPOSITION
CIPHER
MYSZKOWSKI
TRANSPOSITION
CIPHER
The Rail fence cipher is an easy to apply transposition cipher
that jumbles up the order of the letters of a message in a quick
convenient way.
It also has the security of a key to make it a little bit harder to
break.
The Rail Fence cipher works by writing your message on
alternate lines across the page, and then reading off each line in
turn.
Encryption
Write the plaintext message in zigzag lines across the page,
and then read off each row.
 Firstly, we need to have a key, which for this cipher is the
number of rows you are going to have. then start writing the
letters of the plaintext diagonally down to the right until you
reach the number of rows specified by the key. then bounce
back up diagonally until we hit the first row again. This
continues until the end of the plaintext.
Eg:
Decryption
We start writing the message, but leaving a dash in place of
the spaces yet to be occupied. Gradually, you can replace all
the dashes with the corresponding letters, and read off the
plaintext from the table.
We start by making a grid with as many rows as the key is,
and as many columns as the length of the cipher text. We then
place the first letter in the top left Square, and dashes
diagonally downwards where the letters will be. When we get
back to the top row, we place the next letter in the cipher text.
Continue like this across the row, and start the next row when
you reach the end.
The Route Cipher is a transposition cipher where the key is which
route to follow when reading the cipher text from the block created
with the plaintext. The plaintext is written in a grid, and then read
off the following route chosen
Encryption
 First we write the plaintext in a block of reasonable size for the
plaintext. Part of your key is the size of this grid, so you need to decide
on either a number of columns or number of rows in the grid before
starting. Once the plaintext is written out in the grid, you use the Route
assigned. This could be spiralling inwards from the top right corner in a
clockwise direction, or zigzagging up and down.
Decryption
To decrypt a message received that has been encoded with the
Route Cipher, we need to know the route used and the width
or height of the grid. We then start by constructing a blank
grid of the right size, and then place the cipher text letters in
the grid following the route specified.
 Columnar Transposition involves writing the plaintext out in rows, and then reading
the cipher text off in columns.
 In its simplest form, it is the Route cipher where the route is to read down each
column in order.
Encryption
 We first pick a keyword for our encryption. We write the plaintext out in a grid
where the number of columns is the number of letters in the keyword. We then title
each column with the respective letter from the keyword. We take the letters in the
keyword in alphabetical order, and read down the columns in this order. If a letter
is repeated, we do the one that appears first, then the next and so on.
 Eg:
Decryption
The decryption process is significantly easier if nulls have been
used to pad out the message in the encryption process. Below
we shall talk about how to go about decrypting a message in
both scenarios.
Firstly, if nulls have been used, then you start by writing out the
keyword and the alphabetical order of the letters of the
keyword. You must then divide the length of the cipher text by
the length of the keyword. The answer to this is the number of
rows you need to add to the grid. You then write the cipher text
down the first column until you reach the last row. The next
letter becomes the first letter in the second column (by the
alphabetical order of the keyword), and so on.
 The same methodology as for Columnar Transposition is
used, where the plaintext is written out in rows under the
keyword. The only difference is that when there are repeated
Letters in the keyword, rather than number them from left to
right, give all the same letters the same number.
 Then read across columns which have the same number in
the keyword.
Encryption
We have to choose our keyword for the encryption process first.
We then write out the plaintext in a grid, where the number of
columns in the grid is the number of letters in the keyword. We
then number each letter in the keyword with its alphabetical
position, giving repeated letters the same numbers. We then start at
number 1 (the first letter alphabetically in the keyword), and if it is
the only appearance of 1, we read down the column just like
in Columnar Transposition. If, however, the number 1 appears
more than once, we read from left to right all the first letters of the
columns headed by 1. Then we move to the next row, and read
across, left to right, the letters in the rows headed by 1. Once
complete, we move on to the number 2, and so on.
Decryption
The decryption process is very similar to Columnar
Transposition. We shall go through how to do it if nulls have
been used to fill spaces. By comparing this method with that
given in Columnar Transposition when nulls are not used, you
should be able to work out what to do.
We start by writing out the keyword, and the alphabetical order
of the letters, remembering to give repeated letters the same
number. We then divide the length of the cipher text by the
length of the keyword to work out how many rows we need to
add to our grid. We then have to systematically put the cipher
text back in to the grid. Start at number 1, and continue to the
highest number. If the number only appears once, we fill down
the column. If the number appears twice, we move from left to
right across the columns with that number heading them.
Introduction to cryptography and types of ciphers

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 

Similar to Introduction to cryptography and types of ciphers

Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniquesSHUBHA CHATURVEDI
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques parves kamal
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptxRavikumarVadana
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...SrideviM4
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)SrideviM4
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfParshantYadav13
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codesTedi Thug
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxGauriBornare1
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Journals
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Publishing House
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programmingShaishavShah8
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid) Shafiqah Emilia
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesramya marichamy
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.nagwaAboElenein
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docxmariuse18nolet
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdfrachanaprade
 

Similar to Introduction to cryptography and types of ciphers (20)

Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdf
 

Recently uploaded

VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 

Recently uploaded (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 

Introduction to cryptography and types of ciphers

  • 1.
  • 2. It is the practice and study of techniques for secure communication in the presence of third parties. Science and art of transforming messages to make them secure and immune to attack. The art of protecting information by transforming it ie; encrypting it into an unreadable format is called ciphertext.Only those who possess a secret key can decipher the message into plain text.
  • 4. It is a method of encoding by which units of plaintext are replaced with ciphertext ,according to a fixed system;the “units” may be single letters,pairs of letters,triplets of letters,mixtures of the above and so forth. The receiver deciphers the text by performing the inverse substitution.
  • 5. It is a simple data encryption scheme in which plaintext characters are shifted in some regular pattern to form cipher text. In transposition ciphers letters are jumbled up together. Highly secure
  • 7. Caesar cipher involves replacing each letter of alphabet with the letter standing three places further down the alphabet. Encryption Algorithm: C= (p+3)mod26 Decryption Algorithm: P= (c-3)mod26
  • 8. In an Autokey cipher the plain text itself is used as a keyword with a slight modification. Encryption We have to start the keyword with a short seed, Generally a plain text followed by a single letter. Then write that seed letter below to first letter and plain text itself is written below all other letters. Then sum up the corresponding digital equivalence of the letters, and convert it into cipher text.
  • 9. Decryption Decryption is done by rewriting to each numerical term of both plaintext and cipher text. Suppose the plain text has digital equivalent cipher text is c1,c2,……..cn. If S indicate the numeral for C then the plain text number is, P1 = (c1-S) mod26 Pk = (ck- P k-1)mod 26
  • 10. Example of Monoalphabetic Cipher. Here the encryption process is substantially mathematical. Encryption The first step in the encryption process is to transform each of the letters in the plaintext alphabet to the corresponding integer in the range 0 to m-1. With this done, the encryption process for each letter is given by E(x) = (ax + b) mod m Where a and b are the key for the cipher.
  • 11. Decryption In deciphering the cipher text, we must perform the opposite (or inverse) functions on the cipher text to retrieve the plaintext. Once again, the first step is to convert each of the cipher text letters into their integer values. We must now perform the following calculation on each integer D(x) = c(x - b) mod m Where c is the modular multiplicative inverse of a.
  • 12. The Vigenere Cipher is an adaptation of the Trithemius Cipher, but instead of systematically progressing through the cipher text alphabets in the Tabula Recta, it uses a keyword to pick which columns to use.
  • 13. Encryption A sequence of n letters with numerical equivalence b1,b2,...bn will serve as keyword. The plane text message is expressed as p1,p2....pn say pi.Then conversion to cipher text using the congruence relation. Ci=Pi +bi (mod26) ; i=1,2....n For eg: plaintext message is “a simple example” Decryption Deciphering is carried out by the relation Pi =Ci –bi (mod26) Plain text a s i m p l e e x a m p l e Key stream b a t t i s t a b a t t i s
  • 15. The Rail fence cipher is an easy to apply transposition cipher that jumbles up the order of the letters of a message in a quick convenient way. It also has the security of a key to make it a little bit harder to break. The Rail Fence cipher works by writing your message on alternate lines across the page, and then reading off each line in turn.
  • 16. Encryption Write the plaintext message in zigzag lines across the page, and then read off each row.  Firstly, we need to have a key, which for this cipher is the number of rows you are going to have. then start writing the letters of the plaintext diagonally down to the right until you reach the number of rows specified by the key. then bounce back up diagonally until we hit the first row again. This continues until the end of the plaintext. Eg:
  • 17. Decryption We start writing the message, but leaving a dash in place of the spaces yet to be occupied. Gradually, you can replace all the dashes with the corresponding letters, and read off the plaintext from the table. We start by making a grid with as many rows as the key is, and as many columns as the length of the cipher text. We then place the first letter in the top left Square, and dashes diagonally downwards where the letters will be. When we get back to the top row, we place the next letter in the cipher text. Continue like this across the row, and start the next row when you reach the end.
  • 18. The Route Cipher is a transposition cipher where the key is which route to follow when reading the cipher text from the block created with the plaintext. The plaintext is written in a grid, and then read off the following route chosen Encryption  First we write the plaintext in a block of reasonable size for the plaintext. Part of your key is the size of this grid, so you need to decide on either a number of columns or number of rows in the grid before starting. Once the plaintext is written out in the grid, you use the Route assigned. This could be spiralling inwards from the top right corner in a clockwise direction, or zigzagging up and down.
  • 19. Decryption To decrypt a message received that has been encoded with the Route Cipher, we need to know the route used and the width or height of the grid. We then start by constructing a blank grid of the right size, and then place the cipher text letters in the grid following the route specified.
  • 20.  Columnar Transposition involves writing the plaintext out in rows, and then reading the cipher text off in columns.  In its simplest form, it is the Route cipher where the route is to read down each column in order. Encryption  We first pick a keyword for our encryption. We write the plaintext out in a grid where the number of columns is the number of letters in the keyword. We then title each column with the respective letter from the keyword. We take the letters in the keyword in alphabetical order, and read down the columns in this order. If a letter is repeated, we do the one that appears first, then the next and so on.  Eg:
  • 21. Decryption The decryption process is significantly easier if nulls have been used to pad out the message in the encryption process. Below we shall talk about how to go about decrypting a message in both scenarios. Firstly, if nulls have been used, then you start by writing out the keyword and the alphabetical order of the letters of the keyword. You must then divide the length of the cipher text by the length of the keyword. The answer to this is the number of rows you need to add to the grid. You then write the cipher text down the first column until you reach the last row. The next letter becomes the first letter in the second column (by the alphabetical order of the keyword), and so on.
  • 22.  The same methodology as for Columnar Transposition is used, where the plaintext is written out in rows under the keyword. The only difference is that when there are repeated Letters in the keyword, rather than number them from left to right, give all the same letters the same number.  Then read across columns which have the same number in the keyword.
  • 23. Encryption We have to choose our keyword for the encryption process first. We then write out the plaintext in a grid, where the number of columns in the grid is the number of letters in the keyword. We then number each letter in the keyword with its alphabetical position, giving repeated letters the same numbers. We then start at number 1 (the first letter alphabetically in the keyword), and if it is the only appearance of 1, we read down the column just like in Columnar Transposition. If, however, the number 1 appears more than once, we read from left to right all the first letters of the columns headed by 1. Then we move to the next row, and read across, left to right, the letters in the rows headed by 1. Once complete, we move on to the number 2, and so on.
  • 24. Decryption The decryption process is very similar to Columnar Transposition. We shall go through how to do it if nulls have been used to fill spaces. By comparing this method with that given in Columnar Transposition when nulls are not used, you should be able to work out what to do. We start by writing out the keyword, and the alphabetical order of the letters, remembering to give repeated letters the same number. We then divide the length of the cipher text by the length of the keyword to work out how many rows we need to add to our grid. We then have to systematically put the cipher text back in to the grid. Start at number 1, and continue to the highest number. If the number only appears once, we fill down the column. If the number appears twice, we move from left to right across the columns with that number heading them.