SlideShare a Scribd company logo
1 of 26
CRYTOGRAPHY
Vasuki.R., MCA .M. Phil, NET
Dept of Computer Science,
Mannar Thirumalai Naicker College,
Madurai
Mrs.R.Vasuki, M.C.A., M.Phil, NET.,
Assistant Professor,
Department of Computer Applications
TRADITIONAL SYMMETRIC
KEY CIPHERS
Introduction
• Symmetric ciphers use symmetric algorithms
to encrypt and decrypt data.
• A symmetric key algorithm uses the same key to
encrypt data as it does to decrypt data.
• It have many important advantages like speed. But they
lack in other areas like security and management.
TRADITIONAL SYMMETRIC-KEY
CIPHERS
What?
Locking and unlocking with the same key.
General idea of Symmetric-key
cipher
Contd.
How the process works
If P is the plaintext, C is the ciphertext, and K isthe key,
We assume that Bob creates P1; we prove that P1 =P:
 Traditional symmetric-key ciphers can be classified into two
categories:
1. Substitution Ciphers
 Monoalphabetic Ciphers
 Polyalphabetic Ciphers
2. Transposition Ciphers
 Keyless Transposition Ciphers
 Keyed Transposition Ciphers
 Combining two approaches
Categories of Traditional Symmetric- Key
Substitution ciphers
It is a classical encryption technique where the characters present
in the original message are replaced by the other characters.
A substitution cipher replaces one symbol
with another.
Substitution ciphers
Types
1.Monoalphabetic Ciphres
2.Polyalphabetic Ciphers
Mono alphabetic cipher
In mono alphabetic substitution, the relationship between a
symbol in the plaintext to a symbol in the cipher text is always
one-one.
Additive cipher
Note
When the cipher is additive, the plaintext, ciphertext, and
keyare integers in Z26.
Use the additivecipherwith key = 15 to encryptthe
message “hello”.
Solution
We apply the encryption algorithm to the plaintext, character by
character:
Additive cipher
Use the additive cipher with key = 15 to decrypt the
message “WTAAD”.
Solution
We apply the decryption algorithm to the plaintext character by
character:
Additive cipher
Shift Cipher and Caesar Cipher
• Historically, additive ciphers are called shift
ciphers. Julius Caesar used an additive cipher to
communicate with his officers. For this reason,
additive ciphers are sometimes referred to as the
Caesar cipher. Caesar used a key of 3 for his
communications.
Example
• Plain text : Meet me Tomorrow
• Cipher Text: phhw ph wrpruurz
Note:
we have replaced “m” with “p” which occur
third place from m.
Shift Cipher and Caesar Cipher
Cryptanalysis
Eve has intercepted the ciphertext “UVACLYFZLJBYL”.
how she can use a brute-force attack to break the cipher.
Solution
Eve tries keys from 1 to 7. With a key of 7, the plaintext is “not very
secure”, which makes sense.
Cryptanalysis
Table3.2
Frequency of diagrams and trigrams
Eve has intercepted the following ciphertext. Using a
statistical attack, find the plaintext.
Solution
When Eve tabulates the frequency of letters in this ciphertext,
she gets: I =14, V =13, S =12, and so on. The most common
character is I with 14 occurrences. This means key = 4.
Cryptanalysis
Multiplicative cipher
In a multiplicative cipher, the plaintext and ciphertext are
integers in Z26; the key is an integer in Z26*.
C
P
Multiplicative cipher
We use a multiplicative cipher to encrypt the message “hello”
with a key of 7. The ciphertext is “XCZZU”.
Affine cipher
• The affine cipher is a combination of additive cipher and multiplicative
cipher.
• The key space is 26 * 12 (key space of additive * key space of
multiplicative) i.e. 312.
• It is relatively secure than the above two as the key space is larger.
Affine cipher
The affine cipher uses a pair of keys in which the first key is from
Z26* and the second is from Z26. The size of the key domain is
26 × 12 = 312.
Use an affine cipher to encrypt the message “hello” with the key
pair (7, 2).
Mono-alphabetic substitution
cipher
• A mono-alphabetic cipher (aka simple substitution cipher)
is a substitution cipher where each letter of the plain text is
replaced with another letter of the alphabet. It uses a fixed
key which consist of the 26 letters of a “shuffled alphabet”.
Mono-alphabetic substitution
cipher
P.T
C.T
Activity 1
1.Find the Cipher text using Additive method.
P.T :WORLD Key :3
2.C.T :HTRUZYJWXHNJSHJ find the plain text
using Caesar cipher

More Related Content

What's hot

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 

What's hot (20)

Hash Function
Hash FunctionHash Function
Hash Function
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Elements of dynamic programming
Elements of dynamic programmingElements of dynamic programming
Elements of dynamic programming
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DES
DESDES
DES
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 

Similar to Traditional symmetric-key cipher

Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdf
rachanaprade
 

Similar to Traditional symmetric-key cipher (20)

CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
4.Cryptography handout 2.pptx
4.Cryptography  handout 2.pptx4.Cryptography  handout 2.pptx
4.Cryptography handout 2.pptx
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
Cns 1
Cns 1Cns 1
Cns 1
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Crypt
CryptCrypt
Crypt
 
Topic2 caser hill_cripto
Topic2 caser hill_criptoTopic2 caser hill_cripto
Topic2 caser hill_cripto
 
Cryptography basics
Cryptography basicsCryptography basics
Cryptography basics
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdf
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography
Cryptography Cryptography
Cryptography
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Traditional symmetric-key cipher

  • 1. CRYTOGRAPHY Vasuki.R., MCA .M. Phil, NET Dept of Computer Science, Mannar Thirumalai Naicker College, Madurai
  • 2. Mrs.R.Vasuki, M.C.A., M.Phil, NET., Assistant Professor, Department of Computer Applications
  • 4. Introduction • Symmetric ciphers use symmetric algorithms to encrypt and decrypt data. • A symmetric key algorithm uses the same key to encrypt data as it does to decrypt data. • It have many important advantages like speed. But they lack in other areas like security and management.
  • 6. General idea of Symmetric-key cipher Contd.
  • 7. How the process works If P is the plaintext, C is the ciphertext, and K isthe key, We assume that Bob creates P1; we prove that P1 =P:
  • 8.  Traditional symmetric-key ciphers can be classified into two categories: 1. Substitution Ciphers  Monoalphabetic Ciphers  Polyalphabetic Ciphers 2. Transposition Ciphers  Keyless Transposition Ciphers  Keyed Transposition Ciphers  Combining two approaches Categories of Traditional Symmetric- Key
  • 9. Substitution ciphers It is a classical encryption technique where the characters present in the original message are replaced by the other characters. A substitution cipher replaces one symbol with another.
  • 11. Mono alphabetic cipher In mono alphabetic substitution, the relationship between a symbol in the plaintext to a symbol in the cipher text is always one-one.
  • 12. Additive cipher Note When the cipher is additive, the plaintext, ciphertext, and keyare integers in Z26.
  • 13. Use the additivecipherwith key = 15 to encryptthe message “hello”. Solution We apply the encryption algorithm to the plaintext, character by character: Additive cipher
  • 14. Use the additive cipher with key = 15 to decrypt the message “WTAAD”. Solution We apply the decryption algorithm to the plaintext character by character: Additive cipher
  • 15. Shift Cipher and Caesar Cipher • Historically, additive ciphers are called shift ciphers. Julius Caesar used an additive cipher to communicate with his officers. For this reason, additive ciphers are sometimes referred to as the Caesar cipher. Caesar used a key of 3 for his communications.
  • 16. Example • Plain text : Meet me Tomorrow • Cipher Text: phhw ph wrpruurz Note: we have replaced “m” with “p” which occur third place from m. Shift Cipher and Caesar Cipher
  • 17. Cryptanalysis Eve has intercepted the ciphertext “UVACLYFZLJBYL”. how she can use a brute-force attack to break the cipher. Solution Eve tries keys from 1 to 7. With a key of 7, the plaintext is “not very secure”, which makes sense.
  • 19. Eve has intercepted the following ciphertext. Using a statistical attack, find the plaintext. Solution When Eve tabulates the frequency of letters in this ciphertext, she gets: I =14, V =13, S =12, and so on. The most common character is I with 14 occurrences. This means key = 4. Cryptanalysis
  • 20. Multiplicative cipher In a multiplicative cipher, the plaintext and ciphertext are integers in Z26; the key is an integer in Z26*. C P
  • 21. Multiplicative cipher We use a multiplicative cipher to encrypt the message “hello” with a key of 7. The ciphertext is “XCZZU”.
  • 22. Affine cipher • The affine cipher is a combination of additive cipher and multiplicative cipher. • The key space is 26 * 12 (key space of additive * key space of multiplicative) i.e. 312. • It is relatively secure than the above two as the key space is larger.
  • 23. Affine cipher The affine cipher uses a pair of keys in which the first key is from Z26* and the second is from Z26. The size of the key domain is 26 × 12 = 312. Use an affine cipher to encrypt the message “hello” with the key pair (7, 2).
  • 24. Mono-alphabetic substitution cipher • A mono-alphabetic cipher (aka simple substitution cipher) is a substitution cipher where each letter of the plain text is replaced with another letter of the alphabet. It uses a fixed key which consist of the 26 letters of a “shuffled alphabet”.
  • 26. Activity 1 1.Find the Cipher text using Additive method. P.T :WORLD Key :3 2.C.T :HTRUZYJWXHNJSHJ find the plain text using Caesar cipher