SlideShare a Scribd company logo
1 of 21
Presented By
 Ali Raza Fa-2020-BSSE-240
 Waseem Akram Fa2020-BSSE-225
 Tahir Manzoor Fa-2020-BSSE-235
What is Substitution Cipher?
 Substitution Cipher is an encryption
technique that replaces individual
characters in a plaintext with different
characters to create ciphertext.
 It has been used for thousands of years,
including by Julius Caesar.
 A specific set of rules and parameters
used to encrypt and decrypt messages.
How Substitution Cipher Works?
Encryption Process
A substitution cipher encrypts
plaintext by replacing each
character with a different character
in the ciphertext.
Decryption Process
The decryption process is the
reverse of encryption, with each
character in the ciphertext being
replaced by the corresponding
character in the plaintext.
Types of Substitution Cipher
 Caesar Cipher
Caesar cipher is a monoalphabetic substitution cipher in which each letter in the
plaintext is shifted a fixed number of places down the alphabet.
 Monoalphabetic Cipher
Monoalphabetic cipher is a type of substitution cipher where each letter in the plaintext
is replaced with another letter based on a fixed substitution key.
 Polyalphabetic Cipher
Polyalphabetic cipher, on the other hand, uses a series of different substitution
alphabets, thus rendering the frequency analysis much harder.
History and the Evolution of Substitution
Ancient
The earliest known use of
substitution ciphers can be traced
back to the ancient Greeks.
Modern
Throughout history, cryptography
advanced from simple ciphers to
complex machines like the Enigma.
The Future
The future of cryptography lies in
quantum computers and quantum
cryptography, which are still under
development.
Homophonic Substitution Cipher
 Homophonic cipher is a substitution
algorithm used to provide a higher
level of encryption by substituting
multiple characters for each
character in the plaintext.
 A homophonic algorithm is a complex
substitution cipher that replaces
plaintext characters with multiple
ciphertext characters, creating
ambiguity and making the cipher
more difficult to crack.
Encryption Process
Selection of alphabets
Creation of key
Encryption
Selections of alphabetics
The first step in homophonic encryption is
the selection of alphabets. We select and
write all those alphabets which we are going
to replace into cipher text.
Creation of key
The key is the core of the encryption process.
It should link each letter of the alphabet to a
unique symbol or group of numeric symbols.
Each letter should have several possible
substitutions, making it hard to decipher.
Encryption
For each letter in your message, use the key
to substitute the letter with a numeric key
symbol respectively. Write down the numeric
symbols and send them to the receiver.
Decryption
To decrypt a message, you need the key that
was used to encrypt it. The key should link
each symbol to a corresponding letter. Write
down all letters and you'll get the original plain
message from cipher text.
Example
Words to Encrypt = HELLO WORLD
Homophonic Key
H : {2, 7}
E : {12, 3, 9}
L : {6, 8}
W : {1, 11}
O : {13, 4, 6}
R : {5, 8}
D : {10}
Ciphertext = 2 9 6 8 13 11 4 5 6 10
Example
plaintext: DEFEND THE EAST WALL OF THE CASTLE
ciphertext: F7EZ5F UC2 1DR6 M9PP 0E 6CZ SD4UP1
Advantages
High
security
Low key
complexity
Easy to
learn
High Security
Homophonic encryption is much harder
to break than many other types of
encryption, making it ideal for use in
sensitive situations. It is also easy to
implement.
Low key complexity
Unlike other encryption methods, homophonic
encryption keys can be relatively simple to
create, while still providing excellent security.
Its key is easy to make just we had to allocate
the different numeric values to each
alphabetic
Easy to Learn
Homophonic encryption can be taught to
anyone with basic computer skills, making it
accessible and effective for those who are
unfamiliar with other encryption methods.it is
easy to learn and also easy to implement
Limitations of Homophonic
Algorithms
 Homophonic algorithms can be slower than other encryption
methods due to the amount of ciphertext they generate.
 They may require more computational power to decipher.
 They can generate longer ciphertexts than other encryption
methods, creating storage issues.
Applications of Homophonic
Algorithms
 Military Communication
Ensuring sensitive and confidential information cannot be decoded by the
enemy.
 Banking Security
play a critical role in banking security, encrypting custom..er data and
transactions, ensuring secure communication.
is 2.pptx

More Related Content

Similar to is 2.pptx

Information Security
Information SecurityInformation Security
Information Security
Technocratz
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdf
rachanaprade
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164
Thivya Devaraj
 

Similar to is 2.pptx (20)

presentation based on data encryption standards
presentation based on data encryption standardspresentation based on data encryption standards
presentation based on data encryption standards
 
Information Security
Information SecurityInformation Security
Information Security
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Cryptography
CryptographyCryptography
Cryptography
 
4.Cryptography handout 2.pptx
4.Cryptography  handout 2.pptx4.Cryptography  handout 2.pptx
4.Cryptography handout 2.pptx
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdf
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptx
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCL
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 

More from Hamidhussain73

More from Hamidhussain73 (11)

functions of Liver.pptx
functions of Liver.pptxfunctions of Liver.pptx
functions of Liver.pptx
 
Pathological Changes in the Human Body during Autopsy.pptx
Pathological Changes in the Human Body during Autopsy.pptxPathological Changes in the Human Body during Autopsy.pptx
Pathological Changes in the Human Body during Autopsy.pptx
 
Biochemical functions.pptx
Biochemical functions.pptxBiochemical functions.pptx
Biochemical functions.pptx
 
enzymology.pptx
enzymology.pptxenzymology.pptx
enzymology.pptx
 
Biochemical functions of Liver.pptx
Biochemical functions of Liver.pptxBiochemical functions of Liver.pptx
Biochemical functions of Liver.pptx
 
Hyperbilirubinemia.pptx
Hyperbilirubinemia.pptxHyperbilirubinemia.pptx
Hyperbilirubinemia.pptx
 
Staphylococci...ppt
Staphylococci...pptStaphylococci...ppt
Staphylococci...ppt
 
elisa ppt class-converted.pptx
elisa ppt class-converted.pptxelisa ppt class-converted.pptx
elisa ppt class-converted.pptx
 
04 Digestive enzymes of pancreatic origin.pptx
04 Digestive enzymes of pancreatic origin.pptx04 Digestive enzymes of pancreatic origin.pptx
04 Digestive enzymes of pancreatic origin.pptx
 
jaundice.pptx
jaundice.pptxjaundice.pptx
jaundice.pptx
 
Water crisis in pakistan
Water crisis in pakistanWater crisis in pakistan
Water crisis in pakistan
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

is 2.pptx

  • 1.
  • 2. Presented By  Ali Raza Fa-2020-BSSE-240  Waseem Akram Fa2020-BSSE-225  Tahir Manzoor Fa-2020-BSSE-235
  • 3. What is Substitution Cipher?  Substitution Cipher is an encryption technique that replaces individual characters in a plaintext with different characters to create ciphertext.  It has been used for thousands of years, including by Julius Caesar.  A specific set of rules and parameters used to encrypt and decrypt messages.
  • 4. How Substitution Cipher Works? Encryption Process A substitution cipher encrypts plaintext by replacing each character with a different character in the ciphertext. Decryption Process The decryption process is the reverse of encryption, with each character in the ciphertext being replaced by the corresponding character in the plaintext.
  • 5. Types of Substitution Cipher  Caesar Cipher Caesar cipher is a monoalphabetic substitution cipher in which each letter in the plaintext is shifted a fixed number of places down the alphabet.  Monoalphabetic Cipher Monoalphabetic cipher is a type of substitution cipher where each letter in the plaintext is replaced with another letter based on a fixed substitution key.  Polyalphabetic Cipher Polyalphabetic cipher, on the other hand, uses a series of different substitution alphabets, thus rendering the frequency analysis much harder.
  • 6. History and the Evolution of Substitution Ancient The earliest known use of substitution ciphers can be traced back to the ancient Greeks. Modern Throughout history, cryptography advanced from simple ciphers to complex machines like the Enigma. The Future The future of cryptography lies in quantum computers and quantum cryptography, which are still under development.
  • 7. Homophonic Substitution Cipher  Homophonic cipher is a substitution algorithm used to provide a higher level of encryption by substituting multiple characters for each character in the plaintext.  A homophonic algorithm is a complex substitution cipher that replaces plaintext characters with multiple ciphertext characters, creating ambiguity and making the cipher more difficult to crack.
  • 8. Encryption Process Selection of alphabets Creation of key Encryption
  • 9. Selections of alphabetics The first step in homophonic encryption is the selection of alphabets. We select and write all those alphabets which we are going to replace into cipher text.
  • 10. Creation of key The key is the core of the encryption process. It should link each letter of the alphabet to a unique symbol or group of numeric symbols. Each letter should have several possible substitutions, making it hard to decipher.
  • 11. Encryption For each letter in your message, use the key to substitute the letter with a numeric key symbol respectively. Write down the numeric symbols and send them to the receiver.
  • 12. Decryption To decrypt a message, you need the key that was used to encrypt it. The key should link each symbol to a corresponding letter. Write down all letters and you'll get the original plain message from cipher text.
  • 13. Example Words to Encrypt = HELLO WORLD Homophonic Key H : {2, 7} E : {12, 3, 9} L : {6, 8} W : {1, 11} O : {13, 4, 6} R : {5, 8} D : {10} Ciphertext = 2 9 6 8 13 11 4 5 6 10
  • 14. Example plaintext: DEFEND THE EAST WALL OF THE CASTLE ciphertext: F7EZ5F UC2 1DR6 M9PP 0E 6CZ SD4UP1
  • 16. High Security Homophonic encryption is much harder to break than many other types of encryption, making it ideal for use in sensitive situations. It is also easy to implement.
  • 17. Low key complexity Unlike other encryption methods, homophonic encryption keys can be relatively simple to create, while still providing excellent security. Its key is easy to make just we had to allocate the different numeric values to each alphabetic
  • 18. Easy to Learn Homophonic encryption can be taught to anyone with basic computer skills, making it accessible and effective for those who are unfamiliar with other encryption methods.it is easy to learn and also easy to implement
  • 19. Limitations of Homophonic Algorithms  Homophonic algorithms can be slower than other encryption methods due to the amount of ciphertext they generate.  They may require more computational power to decipher.  They can generate longer ciphertexts than other encryption methods, creating storage issues.
  • 20. Applications of Homophonic Algorithms  Military Communication Ensuring sensitive and confidential information cannot be decoded by the enemy.  Banking Security play a critical role in banking security, encrypting custom..er data and transactions, ensuring secure communication.