SlideShare a Scribd company logo
1 of 19
Sanjivani Rural Education Society’s
Sanjivani College of Engineering, Kopargaon
(An Autonomous Institute Affiliated to Savitribai Phule Pune University)
Cyber Security CIA Presentation On
“Web based Application for Encryption using Substitution and Transposition Techniques”
Presented By
Ms. Mahajan Vaishnavi (82)
Ms. Bornare Gauri (83)
Ms. Nagpure Latika (84)
Ms. Bornare Anjali (86) Prof. M. Agrawal Mam
(Subject Teacher)
Department of Computer Engineering
Problem Statement
The problem that the Web-based application for encryption using substitution and transposition techniques
project aims to solve the need for a secure way of transmitting and storing sensitive information over the internet.
With the increasing use of the internet, there is a significant risk of sensitive information being intercepted by
unauthorized parties, which can lead to severe consequences such as identity theft, financial loss, and privacy
breaches. Therefore, there is a need for a secure way of transmitting and storing sensitive information over the
internet.
Objectives
● To develop a user-friendly web-based application that allows users to encrypt sensitive information using
substitution and transposition techniques.
● To make encryption techniques accessible to users who may not have specialized knowledge or skills in
computer science or cryptography.
● To implement substitution and transposition techniques to increase the security of messages and protect them
from interception by unauthorized parties.
Substitution
Substitution involves replacing each letter or character in the plaintext with a corresponding letter or
character from a substitution table. The substitution table contains a set of predefined mappings between letters or
characters in the plaintext and ciphertext. For example, in a simple substitution cipher, every occurrence of the letter
'A' in the plaintext could be replaced with the letter 'X' in the ciphertext, and so on.
Substitution Techniques:
1. Caesar Cipher
2. Playfair Cipher
1. Caesar Cipher
A Caesar cipher is a simple method of encoding messages. Caesar ciphers use a substitution method where letters in
the alphabet are shifted by some fixed number of spaces to yield an encoding alphabet. A Caesar cipher with a shift
of 1. 1 would encode an A as a B, an M as an N, and a Z as an A, and so on.
The formula of encryption is:
En (x) = (x + n) mod 26
Example
Plain Text: Security
Key: 3
Solution:
Key: 3
Cipher Text: VHFXULWB
Plain Text S → 18 En = (18+ 3) mod 26 Cipher Text 21 → V
Plain Text E → 04 En = (04+ 3) mod 26 Cipher Text 07 → H
Plain Text C → 02 En = (02+ 3) mod 26 Cipher Text 05 → F
Plain Text U → 20 En = (20+ 3) mod 26 Cipher Text 23 → X
Plain Text R → 17 En = (17+ 3) mod 26 Cipher Text 20 → U
Plain Text I → 08 En = (08+ 3) mod 26 Cipher Text 11 → L
Plain Text T → 19 En = (19+ 3) mod 26 Cipher Text 22 → W
Plain Text Y → 24 En = (24+ 3) mod 26 Cipher Text 27 → B
2. Playfair Cipher
Playfair cipher is an encryption algorithm to encrypt or encode a message. It is the same as a traditional
cipher. The only difference is that it encrypts a digraph (a pair of two letters) instead of a single letter. The Playfair
cipher is the earliest and best-known digraph substitution cipher to use symmetry encryption.
Example
Plain text: Hide the key
Key: Playfair
Solution
Step 1: 5 X 5 Matrix
Step 2: Pair of two letters:
Hi de th ek ey
Step 3:
Cipher Text: ebimqmgmkp
Transposition
Transposition involves rearranging the order of the characters or letters in the plaintext to form the
ciphertext. In transposition, the position of the letters in the plaintext is changed to create the ciphertext. For
example, a transposition cipher might rearrange the order of the letters in the plaintext message so that the letter in
the first position is moved to the third position, the letter in the second position is moved to the fifth position, and so
on.
Transposition Techniques:
1. Rail Fence Transposition
2. Simple Columnar
1. Rail Fence Transposition
The rail fence cipher (sometimes called zigzag cipher) is a transposition cipher that jumbles up the order of
the letters of a message using a basic algorithm.
The rail fence cipher works by writing your message on alternate lines across the page, and then reading off
each line in turn.
Example
Plain text: Security
Key: 2
Solution:
Cipher text: scrteuiy
2. Simple Columnar Transposition
The columnar transposition cipher is a fairly simple, easy to implement cipher. It is a transposition cipher that
follows a simple rule for mixing up the characters in the plaintext to form the ciphertext.Although weak on its own,
it can be combined with other ciphers, such as a substitution cipher, the combination of which can be more difficult
to break than either cipher on it's own.
Example
Plain text: Security
Key: key
Solution:
Cipher Text: erysutci_
Output
Fig. Caesar Fig. Playfair
Fig. Simple Columnar
Fig. Rail Fence
Applications
● Military communication
● Online transactions
● Email encryption
● Password protection
● Digital signature
● Secure messaging apps
Conclusion
In conclusion, the system that uses the concepts of transposition and substitution for encrypting the messages
using Rail fence, Playfair cipher, Caesar cipher, and Simple Columnar Transposition is a secure and effective
method of ensuring the confidentiality and privacy of sensitive information. Overall, the use of a combination of
these above ciphers in a system ensures that the message is encrypted in a way that is difficult to crack without the
key.
References
● https://www.tutorialspoint.com
● https://geeksforgeeks.com
● https://www.javatpoint.com
Thank You..!!

More Related Content

What's hot

What's hot (20)

Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 
Cryptography
CryptographyCryptography
Cryptography
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Cryptography
CryptographyCryptography
Cryptography
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
One time Pad Encryption
One time Pad EncryptionOne time Pad Encryption
One time Pad Encryption
 

Similar to substitution and transposition techniques_ppt.pptx

A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmIJERD Editor
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Journals
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxdesalewminale
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Publishing House
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network securityPriyanka Karancy
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)SrideviM4
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)Somaditya Basak
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY Santosh Naidu
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfParshantYadav13
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipherVasuki Ramasamy
 

Similar to substitution and transposition techniques_ppt.pptx (20)

A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Cns 1
Cns 1Cns 1
Cns 1
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

substitution and transposition techniques_ppt.pptx

  • 1. Sanjivani Rural Education Society’s Sanjivani College of Engineering, Kopargaon (An Autonomous Institute Affiliated to Savitribai Phule Pune University) Cyber Security CIA Presentation On “Web based Application for Encryption using Substitution and Transposition Techniques” Presented By Ms. Mahajan Vaishnavi (82) Ms. Bornare Gauri (83) Ms. Nagpure Latika (84) Ms. Bornare Anjali (86) Prof. M. Agrawal Mam (Subject Teacher) Department of Computer Engineering
  • 2. Problem Statement The problem that the Web-based application for encryption using substitution and transposition techniques project aims to solve the need for a secure way of transmitting and storing sensitive information over the internet. With the increasing use of the internet, there is a significant risk of sensitive information being intercepted by unauthorized parties, which can lead to severe consequences such as identity theft, financial loss, and privacy breaches. Therefore, there is a need for a secure way of transmitting and storing sensitive information over the internet.
  • 3. Objectives ● To develop a user-friendly web-based application that allows users to encrypt sensitive information using substitution and transposition techniques. ● To make encryption techniques accessible to users who may not have specialized knowledge or skills in computer science or cryptography. ● To implement substitution and transposition techniques to increase the security of messages and protect them from interception by unauthorized parties.
  • 4. Substitution Substitution involves replacing each letter or character in the plaintext with a corresponding letter or character from a substitution table. The substitution table contains a set of predefined mappings between letters or characters in the plaintext and ciphertext. For example, in a simple substitution cipher, every occurrence of the letter 'A' in the plaintext could be replaced with the letter 'X' in the ciphertext, and so on. Substitution Techniques: 1. Caesar Cipher 2. Playfair Cipher
  • 5. 1. Caesar Cipher A Caesar cipher is a simple method of encoding messages. Caesar ciphers use a substitution method where letters in the alphabet are shifted by some fixed number of spaces to yield an encoding alphabet. A Caesar cipher with a shift of 1. 1 would encode an A as a B, an M as an N, and a Z as an A, and so on. The formula of encryption is: En (x) = (x + n) mod 26 Example Plain Text: Security Key: 3
  • 6. Solution: Key: 3 Cipher Text: VHFXULWB Plain Text S → 18 En = (18+ 3) mod 26 Cipher Text 21 → V Plain Text E → 04 En = (04+ 3) mod 26 Cipher Text 07 → H Plain Text C → 02 En = (02+ 3) mod 26 Cipher Text 05 → F Plain Text U → 20 En = (20+ 3) mod 26 Cipher Text 23 → X Plain Text R → 17 En = (17+ 3) mod 26 Cipher Text 20 → U Plain Text I → 08 En = (08+ 3) mod 26 Cipher Text 11 → L Plain Text T → 19 En = (19+ 3) mod 26 Cipher Text 22 → W Plain Text Y → 24 En = (24+ 3) mod 26 Cipher Text 27 → B
  • 7. 2. Playfair Cipher Playfair cipher is an encryption algorithm to encrypt or encode a message. It is the same as a traditional cipher. The only difference is that it encrypts a digraph (a pair of two letters) instead of a single letter. The Playfair cipher is the earliest and best-known digraph substitution cipher to use symmetry encryption. Example Plain text: Hide the key Key: Playfair
  • 8. Solution Step 1: 5 X 5 Matrix Step 2: Pair of two letters: Hi de th ek ey
  • 9. Step 3: Cipher Text: ebimqmgmkp
  • 10. Transposition Transposition involves rearranging the order of the characters or letters in the plaintext to form the ciphertext. In transposition, the position of the letters in the plaintext is changed to create the ciphertext. For example, a transposition cipher might rearrange the order of the letters in the plaintext message so that the letter in the first position is moved to the third position, the letter in the second position is moved to the fifth position, and so on. Transposition Techniques: 1. Rail Fence Transposition 2. Simple Columnar
  • 11. 1. Rail Fence Transposition The rail fence cipher (sometimes called zigzag cipher) is a transposition cipher that jumbles up the order of the letters of a message using a basic algorithm. The rail fence cipher works by writing your message on alternate lines across the page, and then reading off each line in turn. Example Plain text: Security Key: 2
  • 13. 2. Simple Columnar Transposition The columnar transposition cipher is a fairly simple, easy to implement cipher. It is a transposition cipher that follows a simple rule for mixing up the characters in the plaintext to form the ciphertext.Although weak on its own, it can be combined with other ciphers, such as a substitution cipher, the combination of which can be more difficult to break than either cipher on it's own. Example Plain text: Security Key: key
  • 15. Output Fig. Caesar Fig. Playfair Fig. Simple Columnar Fig. Rail Fence
  • 16. Applications ● Military communication ● Online transactions ● Email encryption ● Password protection ● Digital signature ● Secure messaging apps
  • 17. Conclusion In conclusion, the system that uses the concepts of transposition and substitution for encrypting the messages using Rail fence, Playfair cipher, Caesar cipher, and Simple Columnar Transposition is a secure and effective method of ensuring the confidentiality and privacy of sensitive information. Overall, the use of a combination of these above ciphers in a system ensures that the message is encrypted in a way that is difficult to crack without the key.