SlideShare a Scribd company logo
1 of 8
CYBER SECURITY
Chapter 3: Cryptography
TOPICS
 Introduction to Cryptography, Cryptanalysis,
Cryptology
 Substitution techniques
 Transposition techniques
 Symmetric and asymmetric cryptography
INTRODUCTION TO CRYPTOGRAPHY,
CRYPTANALYSIS, CRYPTOLOGY
 Cryptography:- Cryptography is the art and science of achieving
security by encoding messages to make them non-readable.
 Cryptanalysis:- Cryptanalysis is the technique of decoding cipher
text back to plaintext without knowing how they were initially
converted & key used.
 Cryptology:- It is a combination of cryptography and Cryptanalysis.
Book Of
Security
Cryptography
R#5%^”;p0s89 -
$*-233409llgh
R#5%^”;p0s89 -
$*-233409llgh
Cryptanalysi
s
Book Of
Security
SUBSTITUTION TECHNIQUES
 Caesar cipher:- The Caesar cipher involves replacing
each letter of the alphabet with the letter standing three
places further down the alphabet.
 For example:-plain: meet me after the toga party cipher:
PHHW PH DIWHU WKH WRJD SDUWB
 plain: a b c d e f g h i j k l m n o p q r s t u v w x y z
 cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z
A B C
 MONO-ALPHABETIC CIPHER:- Here, Random
Substitution is used. In the plaintext message each A is
replaced with any alphabet i.e. B....Z.& each B replaced
with any alphabet A or C...Z.
 POLYGRAM SUBSTITUTION CIPHER:- PolyGram
Substitution Cipher Technique replaces one block of plain
text with a block of cipher text. It does not work on a
Character-by-Character basis.
Example:
HELLO YUQQW
HELL TEUI
TRANSPOSITION TECHNIQUES
 Rail Fence Cipher:- In the Rail Fence Cipher, the plain
text is written downwards on successive rails of an
imaginary fence then moving up when we get to the
bottom then message is then read off in rows.
Plaintext – Welcome Students
cipher text- WLOETDNSECMSUET
 SIMPLE COLUMNAR TRANSPOSITION:- The message
is written in rows of fixed length and read out column by
column.
W L O E T D N S
E C M S U E T
Plain text message : come home tomorrow
Cipher text message : CMROERMTOEOWHMOO
• SIMPLE COLUMNAR TRANSPOSITION:- Plaintext-
attack postponed until two am Key: 4312567
Column Out 3 4 1 2 5 6 7
Plaintext:
Cipher text: TTNAAPTMTSUOAODWCOIXKNLYPETZ
c o m e h o
m e t o m o
r r o w
a t t a c k p
o s t p o n e
d u n t i l t
w o a m x y z
SYMMETRIC AND ASYMMETRIC
CRYPTOGRAPHY
 Symmetric key cryptography: Involves the use of same key for
encryption and decryption.
 Asymmetric key cryptography : Involves the use of one key for
encryption and another, different key for decryption.

More Related Content

What's hot

Information Security
Information SecurityInformation Security
Information Security
raxosz
 

What's hot (20)

Cryptography with caesar Cipher
Cryptography with caesar CipherCryptography with caesar Cipher
Cryptography with caesar Cipher
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
S.Praveena,II-M.sc(Computer science),Bon Secours college for women,thanjavur
S.Praveena,II-M.sc(Computer science),Bon Secours college for women,thanjavurS.Praveena,II-M.sc(Computer science),Bon Secours college for women,thanjavur
S.Praveena,II-M.sc(Computer science),Bon Secours college for women,thanjavur
 
caeser chiper
caeser chiper caeser chiper
caeser chiper
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Bakiya
BakiyaBakiya
Bakiya
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic Concepts
 
Cryptography using probability
Cryptography using probabilityCryptography using probability
Cryptography using probability
 
Information Security
Information SecurityInformation Security
Information Security
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 

Similar to Cyber security

Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
robert345678
 

Similar to Cyber security (20)

Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
 
Cryptography Crash Course
Cryptography Crash CourseCryptography Crash Course
Cryptography Crash Course
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Unit – III.pptx
Unit – III.pptxUnit – III.pptx
Unit – III.pptx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
CNS UNIT-II.pptx
CNS UNIT-II.pptxCNS UNIT-II.pptx
CNS UNIT-II.pptx
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Cyber security

  • 2. TOPICS  Introduction to Cryptography, Cryptanalysis, Cryptology  Substitution techniques  Transposition techniques  Symmetric and asymmetric cryptography
  • 3. INTRODUCTION TO CRYPTOGRAPHY, CRYPTANALYSIS, CRYPTOLOGY  Cryptography:- Cryptography is the art and science of achieving security by encoding messages to make them non-readable.  Cryptanalysis:- Cryptanalysis is the technique of decoding cipher text back to plaintext without knowing how they were initially converted & key used.  Cryptology:- It is a combination of cryptography and Cryptanalysis. Book Of Security Cryptography R#5%^”;p0s89 - $*-233409llgh R#5%^”;p0s89 - $*-233409llgh Cryptanalysi s Book Of Security
  • 4. SUBSTITUTION TECHNIQUES  Caesar cipher:- The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet.  For example:-plain: meet me after the toga party cipher: PHHW PH DIWHU WKH WRJD SDUWB  plain: a b c d e f g h i j k l m n o p q r s t u v w x y z  cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
  • 5.  MONO-ALPHABETIC CIPHER:- Here, Random Substitution is used. In the plaintext message each A is replaced with any alphabet i.e. B....Z.& each B replaced with any alphabet A or C...Z.  POLYGRAM SUBSTITUTION CIPHER:- PolyGram Substitution Cipher Technique replaces one block of plain text with a block of cipher text. It does not work on a Character-by-Character basis. Example: HELLO YUQQW HELL TEUI
  • 6. TRANSPOSITION TECHNIQUES  Rail Fence Cipher:- In the Rail Fence Cipher, the plain text is written downwards on successive rails of an imaginary fence then moving up when we get to the bottom then message is then read off in rows. Plaintext – Welcome Students cipher text- WLOETDNSECMSUET  SIMPLE COLUMNAR TRANSPOSITION:- The message is written in rows of fixed length and read out column by column. W L O E T D N S E C M S U E T
  • 7. Plain text message : come home tomorrow Cipher text message : CMROERMTOEOWHMOO • SIMPLE COLUMNAR TRANSPOSITION:- Plaintext- attack postponed until two am Key: 4312567 Column Out 3 4 1 2 5 6 7 Plaintext: Cipher text: TTNAAPTMTSUOAODWCOIXKNLYPETZ c o m e h o m e t o m o r r o w a t t a c k p o s t p o n e d u n t i l t w o a m x y z
  • 8. SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY  Symmetric key cryptography: Involves the use of same key for encryption and decryption.  Asymmetric key cryptography : Involves the use of one key for encryption and another, different key for decryption.