SlideShare a Scribd company logo
1 of 15
Codes and Ciphers
By,
Chirag Umraniya 160280116107
Mayank Timbal 160280116104
Matin Shaikh 160280116092
Karmishth Tandel 160280116102
• Codes generally substitute different length strings of character
in the output, while Ciphers generally substitute the same
number of characters as are input.
• There are exceptions and some cipher systems may use slightly
more, or fewer, characters when output versus the number that
were input.
Definition of Code and Cipher
How it works?
• Codes operated by substituting according to a large codebook
which linked a random string of characters or numbers to a word
or phrase.
• When using a Cipher the original information is known as
plaintext, and the encrypted form as ciphertext. The ciphertext
message contains all the information of the plaintext message, but
is not in a format readable by a human or computer without the
proper mechanism to decrypt it.
Some popular examples of
Codes and Ciphers
1. Morse Code
Information:
• Founded in 1836.
• By American artist Samuel Morse, with
the American physicist Joseph Henry,
and Alfred Vail.
• Note: The name "Morse code" is
misleading because, this is in fact a cipher
not a code. All the letters of the alphabet,
number from 0-9 and some punctuation
marks have been replaced by dots,
dashes or short and long beeps.
Working:
• Messages could be sent long-distance
electrically using the Morse code via the
telegraph.
• It was not used for concealing message,
but transmitting information as a series
of clicks, tones or lights.
• A skilled observer or listener can directly
understand the information without any
equipment.
• A basic understanding is required by pilots
and air traffic controllers.
• SOS, the most common distress signal,
recognized internationally is depicted as
three dots, three dashes and three dots. Simple example:
2. Caesar Shift Cipher
• This particular cipher has been named after Julius
Caesar, since he used it himself.
• In G cipher, A becomes G, B becomes H and so on. In
Y Cipher, A becomes Y and so on.
• This particular cipher is not very difficult to decipher
and hence secret messages do not remain secret for
long.
• But on the bright side this particular cipher has been
used as the basis for creation of more complex
ciphers.
• Example:
3. Enigma Code
• The Germans used this sophisticated
cipher during the Second World War.
• It involved using an Enigma machine,
which is similar to the type writer.
• All Germans had the same Enigma
machine and the initial wheel
configuration of the machine was
communicated to all the teams. When
a letter was pressed on the machine, a
cipher letter lit up on the screen.
• It got even more difficult when the
wheel rotated after certain number of
letters, so that the cipher kept on
changing.
• There could be over one hundred
trillion possible configurations and
hence was difficult to decipher
Enigma.
4. Public-Key Crytography
• Public Key Cryptography is modern and is
made of two keys – the private and the
public key.
• The public key is a large number everyone
can get.
• The private key is made of two numbers
(apart from 1 and the number itself).
• These two numbers are multiplied
together and can produce the public
key. For example, the public key is 1764,
the private key can be 36 and 49
(36×49=1764).
• Without the private key, the code cannot
be deciphered.
5. Transposition Cipher
• This particular cipher was used during American Civil
War and World War I to communicate sensitive
messages.
• The letters of the alphabet are rearranged based on
pre-determined key or rule.
• It could be that all the words in the message are
written backwards, or every pair of letters is
swapped. If the rearrangement rule is complex, it
might seem very difficult to decipher, however, with
modern algorithms on the computer, it can be easily
deciphered.
• For example: “the yellow car belongs to him” can
become “eht wolley rac sgnoleb ot mih” when
written backwards.
6. Book Cipher
• This particular cipher involves the use of
some key, essentially in a book.
• Both the parties should have the same
book and the same edition to successfully
decipher the code.
• Locations in the book are used to replace
the plain text of the message.
• The ease of decoding depends on the how
well the key has been chosen.
• Also the book should be inconspicuous
and of the genre which is similar to the
type of messages required to be sent.
7. Pigpen Cipher
• This is also referred to as Tic-Tac-Toe Cipher,
and is fairly simple substitution cipher.
• The letters of the alphabet are replaced by
fragments of a geometrical grid.
• Although its origin cannot be ascertained, it
goes back to the 18th century.
• The grid and the dots are the core elements
of the cipher.
• The alphabets are arranged in two grids,
followed by two Xs.
8. Steganography
• This involves the concealment of a message,
image or a file in another message, image or file.
• The first record of its use is in 1499. Text could be
written using invisible ink between visible lines of
a text.
• The benefit of this type is that it does not arouse
suspicion like an encrypted message would.
• There are various ways in which this can be done
– physical, digital, social and using puzzles as well.
• Digital images are used largely for hiding
messages as bits.
• Various modern techniques are available by which
steganography can be performed.
9. Playfair Cipher
• Here we come to the last one on the list
of types of codes and ciphers.
• The Playfair cipher is also known as the
Playfair Square.
• It was invented by Charles Wheatstone
in 1854, but is named after the person
who promoted its use.
• In this type of cipher, pairs of letters
are encrypted instead of single letters.
• Thus it is harder to decipher. It creates
600 possible digraphs as compared to
26 monographs.
Thank You

More Related Content

What's hot

Columnar transposition cipher
Columnar transposition cipherColumnar transposition cipher
Columnar transposition cipherWaqar Memon
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
AES by example
AES by exampleAES by example
AES by exampleShiraz316
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution CipherSHUBHA CHATURVEDI
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key ExchangeSAURABHDHAGE6
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codesTedi Thug
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardDr.Florence Dayana
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Columnar transposition cipher
Columnar transposition cipherColumnar transposition cipher
Columnar transposition cipher
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
AES by example
AES by exampleAES by example
AES by example
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Rc4
Rc4Rc4
Rc4
 
SHA-256.pptx
SHA-256.pptxSHA-256.pptx
SHA-256.pptx
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 

Similar to Code and cipher

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Tales From the Crypt(ography)
Tales From the Crypt(ography)Tales From the Crypt(ography)
Tales From the Crypt(ography)Jeremiah Jackson
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Dark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 CryptographyDark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 CryptographyMarcus Leaning
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Cryptography & network security
Cryptography & network securityCryptography & network security
Cryptography & network securitysathu30
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Cryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdfCryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdfNirajKumar620142
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAbhishek Nand
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshopManojit Ballav
 

Similar to Code and cipher (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Tales From the Crypt(ography)
Tales From the Crypt(ography)Tales From the Crypt(ography)
Tales From the Crypt(ography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Dark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 CryptographyDark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 Cryptography
 
Unit – III.pptx
Unit – III.pptxUnit – III.pptx
Unit – III.pptx
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & network security
Cryptography & network securityCryptography & network security
Cryptography & network security
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdfCryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdf
 
8-encryption.ppt
8-encryption.ppt8-encryption.ppt
8-encryption.ppt
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 

Code and cipher

  • 1. Codes and Ciphers By, Chirag Umraniya 160280116107 Mayank Timbal 160280116104 Matin Shaikh 160280116092 Karmishth Tandel 160280116102
  • 2. • Codes generally substitute different length strings of character in the output, while Ciphers generally substitute the same number of characters as are input. • There are exceptions and some cipher systems may use slightly more, or fewer, characters when output versus the number that were input. Definition of Code and Cipher
  • 3. How it works? • Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. • When using a Cipher the original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it.
  • 4. Some popular examples of Codes and Ciphers
  • 5. 1. Morse Code Information: • Founded in 1836. • By American artist Samuel Morse, with the American physicist Joseph Henry, and Alfred Vail. • Note: The name "Morse code" is misleading because, this is in fact a cipher not a code. All the letters of the alphabet, number from 0-9 and some punctuation marks have been replaced by dots, dashes or short and long beeps.
  • 6. Working: • Messages could be sent long-distance electrically using the Morse code via the telegraph. • It was not used for concealing message, but transmitting information as a series of clicks, tones or lights. • A skilled observer or listener can directly understand the information without any equipment. • A basic understanding is required by pilots and air traffic controllers. • SOS, the most common distress signal, recognized internationally is depicted as three dots, three dashes and three dots. Simple example:
  • 7. 2. Caesar Shift Cipher • This particular cipher has been named after Julius Caesar, since he used it himself. • In G cipher, A becomes G, B becomes H and so on. In Y Cipher, A becomes Y and so on. • This particular cipher is not very difficult to decipher and hence secret messages do not remain secret for long. • But on the bright side this particular cipher has been used as the basis for creation of more complex ciphers. • Example:
  • 8. 3. Enigma Code • The Germans used this sophisticated cipher during the Second World War. • It involved using an Enigma machine, which is similar to the type writer. • All Germans had the same Enigma machine and the initial wheel configuration of the machine was communicated to all the teams. When a letter was pressed on the machine, a cipher letter lit up on the screen. • It got even more difficult when the wheel rotated after certain number of letters, so that the cipher kept on changing. • There could be over one hundred trillion possible configurations and hence was difficult to decipher Enigma.
  • 9. 4. Public-Key Crytography • Public Key Cryptography is modern and is made of two keys – the private and the public key. • The public key is a large number everyone can get. • The private key is made of two numbers (apart from 1 and the number itself). • These two numbers are multiplied together and can produce the public key. For example, the public key is 1764, the private key can be 36 and 49 (36×49=1764). • Without the private key, the code cannot be deciphered.
  • 10. 5. Transposition Cipher • This particular cipher was used during American Civil War and World War I to communicate sensitive messages. • The letters of the alphabet are rearranged based on pre-determined key or rule. • It could be that all the words in the message are written backwards, or every pair of letters is swapped. If the rearrangement rule is complex, it might seem very difficult to decipher, however, with modern algorithms on the computer, it can be easily deciphered. • For example: “the yellow car belongs to him” can become “eht wolley rac sgnoleb ot mih” when written backwards.
  • 11. 6. Book Cipher • This particular cipher involves the use of some key, essentially in a book. • Both the parties should have the same book and the same edition to successfully decipher the code. • Locations in the book are used to replace the plain text of the message. • The ease of decoding depends on the how well the key has been chosen. • Also the book should be inconspicuous and of the genre which is similar to the type of messages required to be sent.
  • 12. 7. Pigpen Cipher • This is also referred to as Tic-Tac-Toe Cipher, and is fairly simple substitution cipher. • The letters of the alphabet are replaced by fragments of a geometrical grid. • Although its origin cannot be ascertained, it goes back to the 18th century. • The grid and the dots are the core elements of the cipher. • The alphabets are arranged in two grids, followed by two Xs.
  • 13. 8. Steganography • This involves the concealment of a message, image or a file in another message, image or file. • The first record of its use is in 1499. Text could be written using invisible ink between visible lines of a text. • The benefit of this type is that it does not arouse suspicion like an encrypted message would. • There are various ways in which this can be done – physical, digital, social and using puzzles as well. • Digital images are used largely for hiding messages as bits. • Various modern techniques are available by which steganography can be performed.
  • 14. 9. Playfair Cipher • Here we come to the last one on the list of types of codes and ciphers. • The Playfair cipher is also known as the Playfair Square. • It was invented by Charles Wheatstone in 1854, but is named after the person who promoted its use. • In this type of cipher, pairs of letters are encrypted instead of single letters. • Thus it is harder to decipher. It creates 600 possible digraphs as compared to 26 monographs.