SlideShare a Scribd company logo
1 of 17
Download to read offline
Chapter 8
Principles of Information Security,
Fourth Edition
Michael E. Whitman and
Herbert J. Mattord
 The science of encryption, known as cryptology,
encompasses cryptography and cryptanalysis.
 Cryptography, which comes from the Greek
words kryptos, meaning “hidden,” and graphein,
meaning “to write,” is the process of making
and using codes to secure the transmission of
information.
 Cryptanalysis is the process of obtaining the
original message (called the plaintext) from an
encrypted message (called the ciphertext)
without knowing the algorithms and keys used to
perform the encryption.
 Cryptology — the art and science of making
and breaking "secret codes."
 Cryptography — the making of "secret
codes."
 Cryptanalysis — the breaking of "secret
codes."
 Encryption is the process of converting an
original message into a form that is unreadable
to unauthorized
 Decryption is the process of converting the
ciphertext message back into plaintext so that it
can be readily understood.
 A cipher or crypto system is used to encrypt
data. The original unencrypted data is known as
plaintext, and the result of encryption is
ciphertext.
 We decrypt the ciphertext to recover the original
plaintext. A key is used to configure a
cryptosystem for encryption and decryption
 Encryption and decryption performs on base
of same key
 Key and algorithm is secret
 Traditional symmetric encryption algorithms
are:
 Substitution techniques
 Change elements of plain text into element of cipher
text
 Transposition techniques
 Change position of plain text elements
 Cryptanalysis
 Get knowledge about encryption algorithm and
try to hack according to algorithm properties
 Brute-force attack
 Try all possible keys to crack algorithm
 There are two methods of encrypting plaintext: the
bit stream method or the block cipher method
 In the bit stream method, each bit in the plaintext is
transformed into a cipher bit one bit at a time.
 In the block cipher method, the message is divided into
blocks, for example, sets of 8-, 16-, 32-, or 64-bit
blocks, and then each block of plaintext bits is
transformed into an encrypted block of cipher bits using
an algorithm and a key.
 Bit stream methods commonly use algorithm
functions like the exclusive OR operation (XOR),
 whereas block methods can use substitution,
transposition, XOR, or some combination of these
operations.
 Note that most computer-based encryption methods
operate on data at the level of its binary digits (bits),
but some operate at the byte or character level.
 To use a substitution cipher, you substitute
one value for another, for example a letter in
the alphabet with the letter three values to
the right. Or you can substitute one bit for
another bit that is four places to its left.
 This is a simple enough method by itself but
very powerful if combined with other
operations. This type of substitution is based
on a monoalphabetic substitution, because it
only uses one alphabet. More advanced
substitution ciphers use two or more
alphabets, and are referred to as
polyalphabetic substitutions.
 First, we consider a particularly simple
implementation of a simple substitution
cipher. In the simplest case, the message is
encrypted by substituting the letter of the
alphabet n places ahead of the current
letter. For example, with n = 3, the
substitution which acts as the key—is
 plaintext: a b c d e f g h i j k l m n o p q r s t
u v w x y z
 ciphertext: D E F G H I J K L M N O P Q R S T
U V W X Y Z A B C
 The simple substitution with a shift of three
is known as the Caesar's cipher.
 C = E(k,P) = (P+k) mod 26
 If key = 3 and P=24
= E(3,P) =(24+3) mod 26
=27 mod 26
=1
 P = D(k,C) = (C-k) mod 26
 To extend the previous example, consider
the following block of text:
 Plaintext ABCDEFGHIJKLMNOPQRSTUVWXYZ
 Substitution cipher 1 DEFGHIJKLMNOPQRSTUVWXYZABC
 Substitution cipher 2 GHIJKLMNOPQRSTUVWXYZABCDEF
 Substitution cipher 3 JKLMNOPQRSTUVWXYZABCDEFGHI
 Substitution cipher 4 MNOPQRSTUVWXYZABCDEFGHIJKL
 The first row here is the plaintext, and the next four
rows are four sets of substitution ciphers, which
taken together constitute a single polyalphabetic
substitution cipher. To encode the word TEXT with
this cipher, you substitute a letter from the second
row for the first letter in TEXT, a letter from the
third row for the second letter, and so on—a process
that yields the ciphertext WKGF. Note how the
plaintext letter T is transformed into a W or a F,
depending on its order of appearance in the
plaintext. Complexities like these make this type of
encryption substantially more difficult to decipher
when one doesn’t have the algorithm (in this case,
the rows of ciphers) and the key, which is the method
used (in this case the use of the second row for first
letter, third for second, and so on). A logical
extension to this process is to randomize the cipher
rows completely in order to create a more complex
operation.
 An advanced type of substitution cipher that uses a
simple polyalphabetic code is the Vigenère cipher.
The cipher is implemented using the Vigenère square
(or table), which is made up of twenty-six distinct
cipher alphabets.
 Table 8-2 illustrates the setup of the Vigenère square.
In the header row, the alphabet is written in its
normal order. In each subsequent row, the alphabet is
shifted one letter to the right until a 26 26 block of
letters is formed. There are a number of ways to use
the Vigenère square. You could perform an encryption
by simply starting in the first row and finding a
substitute for the first letter of plaintext, and then
moving down the rows for each subsequent letter of
plaintext. With this method, the word SECURITY in
plaintext becomes TGFYWOAG in ciphertext.
 A much more sophisticated way to use the
Vigenère square is to use a keyword to
represent the shift. To accomplish this, you
begin by writing a keyword above the
plaintext message.
 For example, suppose the plaintext message
was “SACK GAUL SPARE NO ONE” and the
keyword was ITALY. We thus end up with the
following:
 ITALYITALYITALYITA
 SACKGAULSPARENOONE
 Now you use the keyword letter and the message
(plaintext) letter below it in combination.
Returning to the Vigenère square, notice how the
first column of text, like the first row, forms the
normal alphabet. To perform the substitution,
start with the first combination of keyword and
message letters, IS.
 Use the keyword letter to locate the column,
and the message letter to find the row, and then
look for the letter at their intersection.
 Thus, for column “I” and row “S,” you will find
the ciphertext letter “A.” After you follow this
procedure for each of the letters in the message,
you will produce the encrypted ciphertext
ATCVEINLDNIKEYMWGE.
 One weakness of this method is that any
keyword-message letter combination
containing an “A.” row or column reproduces
the plaintext message letter. For example,
the third letter in the plaintext message, the
C (of SACK), has a combination of AC, and
thus is unchanged in the ciphertext. To
minimize the effects of this weakness, you
should avoid choosing a keyword that
contains the letter “A.”
 https://www.youtube.com/watch?v=E352JJ8
xv48
 https://www.youtube.com/watch?v=VK3qc5L
v8QQ

More Related Content

Similar to IS LEC 6.pdf

Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
robert345678
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 

Similar to IS LEC 6.pdf (20)

Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Unit i
Unit iUnit i
Unit i
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
 
Unit 2
Unit 2Unit 2
Unit 2
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 

Recently uploaded

valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Recently uploaded (20)

Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 

IS LEC 6.pdf

  • 1. Chapter 8 Principles of Information Security, Fourth Edition Michael E. Whitman and Herbert J. Mattord
  • 2.  The science of encryption, known as cryptology, encompasses cryptography and cryptanalysis.  Cryptography, which comes from the Greek words kryptos, meaning “hidden,” and graphein, meaning “to write,” is the process of making and using codes to secure the transmission of information.  Cryptanalysis is the process of obtaining the original message (called the plaintext) from an encrypted message (called the ciphertext) without knowing the algorithms and keys used to perform the encryption.
  • 3.  Cryptology — the art and science of making and breaking "secret codes."  Cryptography — the making of "secret codes."  Cryptanalysis — the breaking of "secret codes."
  • 4.  Encryption is the process of converting an original message into a form that is unreadable to unauthorized  Decryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood.  A cipher or crypto system is used to encrypt data. The original unencrypted data is known as plaintext, and the result of encryption is ciphertext.  We decrypt the ciphertext to recover the original plaintext. A key is used to configure a cryptosystem for encryption and decryption
  • 5.  Encryption and decryption performs on base of same key  Key and algorithm is secret  Traditional symmetric encryption algorithms are:  Substitution techniques  Change elements of plain text into element of cipher text  Transposition techniques  Change position of plain text elements
  • 6.  Cryptanalysis  Get knowledge about encryption algorithm and try to hack according to algorithm properties  Brute-force attack  Try all possible keys to crack algorithm
  • 7.  There are two methods of encrypting plaintext: the bit stream method or the block cipher method  In the bit stream method, each bit in the plaintext is transformed into a cipher bit one bit at a time.  In the block cipher method, the message is divided into blocks, for example, sets of 8-, 16-, 32-, or 64-bit blocks, and then each block of plaintext bits is transformed into an encrypted block of cipher bits using an algorithm and a key.  Bit stream methods commonly use algorithm functions like the exclusive OR operation (XOR),  whereas block methods can use substitution, transposition, XOR, or some combination of these operations.  Note that most computer-based encryption methods operate on data at the level of its binary digits (bits), but some operate at the byte or character level.
  • 8.  To use a substitution cipher, you substitute one value for another, for example a letter in the alphabet with the letter three values to the right. Or you can substitute one bit for another bit that is four places to its left.  This is a simple enough method by itself but very powerful if combined with other operations. This type of substitution is based on a monoalphabetic substitution, because it only uses one alphabet. More advanced substitution ciphers use two or more alphabets, and are referred to as polyalphabetic substitutions.
  • 9.  First, we consider a particularly simple implementation of a simple substitution cipher. In the simplest case, the message is encrypted by substituting the letter of the alphabet n places ahead of the current letter. For example, with n = 3, the substitution which acts as the key—is  plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z  ciphertext: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  The simple substitution with a shift of three is known as the Caesar's cipher.
  • 10.  C = E(k,P) = (P+k) mod 26  If key = 3 and P=24 = E(3,P) =(24+3) mod 26 =27 mod 26 =1  P = D(k,C) = (C-k) mod 26
  • 11.  To extend the previous example, consider the following block of text:  Plaintext ABCDEFGHIJKLMNOPQRSTUVWXYZ  Substitution cipher 1 DEFGHIJKLMNOPQRSTUVWXYZABC  Substitution cipher 2 GHIJKLMNOPQRSTUVWXYZABCDEF  Substitution cipher 3 JKLMNOPQRSTUVWXYZABCDEFGHI  Substitution cipher 4 MNOPQRSTUVWXYZABCDEFGHIJKL
  • 12.  The first row here is the plaintext, and the next four rows are four sets of substitution ciphers, which taken together constitute a single polyalphabetic substitution cipher. To encode the word TEXT with this cipher, you substitute a letter from the second row for the first letter in TEXT, a letter from the third row for the second letter, and so on—a process that yields the ciphertext WKGF. Note how the plaintext letter T is transformed into a W or a F, depending on its order of appearance in the plaintext. Complexities like these make this type of encryption substantially more difficult to decipher when one doesn’t have the algorithm (in this case, the rows of ciphers) and the key, which is the method used (in this case the use of the second row for first letter, third for second, and so on). A logical extension to this process is to randomize the cipher rows completely in order to create a more complex operation.
  • 13.  An advanced type of substitution cipher that uses a simple polyalphabetic code is the Vigenère cipher. The cipher is implemented using the Vigenère square (or table), which is made up of twenty-six distinct cipher alphabets.  Table 8-2 illustrates the setup of the Vigenère square. In the header row, the alphabet is written in its normal order. In each subsequent row, the alphabet is shifted one letter to the right until a 26 26 block of letters is formed. There are a number of ways to use the Vigenère square. You could perform an encryption by simply starting in the first row and finding a substitute for the first letter of plaintext, and then moving down the rows for each subsequent letter of plaintext. With this method, the word SECURITY in plaintext becomes TGFYWOAG in ciphertext.
  • 14.
  • 15.  A much more sophisticated way to use the Vigenère square is to use a keyword to represent the shift. To accomplish this, you begin by writing a keyword above the plaintext message.  For example, suppose the plaintext message was “SACK GAUL SPARE NO ONE” and the keyword was ITALY. We thus end up with the following:  ITALYITALYITALYITA  SACKGAULSPARENOONE
  • 16.  Now you use the keyword letter and the message (plaintext) letter below it in combination. Returning to the Vigenère square, notice how the first column of text, like the first row, forms the normal alphabet. To perform the substitution, start with the first combination of keyword and message letters, IS.  Use the keyword letter to locate the column, and the message letter to find the row, and then look for the letter at their intersection.  Thus, for column “I” and row “S,” you will find the ciphertext letter “A.” After you follow this procedure for each of the letters in the message, you will produce the encrypted ciphertext ATCVEINLDNIKEYMWGE.
  • 17.  One weakness of this method is that any keyword-message letter combination containing an “A.” row or column reproduces the plaintext message letter. For example, the third letter in the plaintext message, the C (of SACK), has a combination of AC, and thus is unchanged in the ciphertext. To minimize the effects of this weakness, you should avoid choosing a keyword that contains the letter “A.”  https://www.youtube.com/watch?v=E352JJ8 xv48  https://www.youtube.com/watch?v=VK3qc5L v8QQ