Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer Security Lecture 2: Classical Encryption Techniques 1

1,401 views

Published on

https://mloey.github.io/courses/security2017.html

https://www.youtube.com/watch?v=td_8AM80DUA&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=2&t=37s

We will discuss the following: Symmetric Encryption, Substitution Techniques, Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher

Published in: Education
  • Make 16,000 Projects With Step By Step Plans, ...even if you don't have a large workshop or expensive tools! ✱✱✱ https://t.cn/A62Ygslz
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD THAT BOOKS INTO AVAILABLE FORMAT (2019 Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer that is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBooks .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money That the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths that Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD THAT BOOKS INTO AVAILABLE FORMAT (2019 Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { http://bit.ly/2m77EgH } ......................................................................................................................... Download Full EPUB Ebook here { http://bit.ly/2m77EgH } ......................................................................................................................... Download Full doc Ebook here { http://bit.ly/2m77EgH } ......................................................................................................................... Download PDF EBOOK here { http://bit.ly/2m77EgH } ......................................................................................................................... Download EPUB Ebook here { http://bit.ly/2m77EgH } ......................................................................................................................... Download doc Ebook here { http://bit.ly/2m77EgH } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer that is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBooks .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money That the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths that Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD THAT BOOKS INTO AVAILABLE FORMAT (2019 Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { https://urlzs.com/UABbn } ......................................................................................................................... Download Full EPUB Ebook here { https://urlzs.com/UABbn } ......................................................................................................................... Download Full doc Ebook here { https://urlzs.com/UABbn } ......................................................................................................................... Download PDF EBOOK here { https://urlzs.com/UABbn } ......................................................................................................................... Download EPUB Ebook here { https://urlzs.com/UABbn } ......................................................................................................................... Download doc Ebook here { https://urlzs.com/UABbn } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer that is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBooks .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money That the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths that Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Justin Sinclair has helped thousands of women get their Ex boyfriends back using his methods. Learn them at: ●●● http://goo.gl/nkXEkK
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Computer Security Lecture 2: Classical Encryption Techniques 1

  1. 1. Classical Encryption Techniques 1 Classical Encryption Techniques 1
  2. 2. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  3. 3. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  4. 4. Classical Encryption Techniques 1
  5. 5. Classical Encryption Techniques 1  Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext.  Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time.
  6. 6. Classical Encryption Techniques 1  Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the secret key.  Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the ciphertext and the secret key and produces the original plaintext.
  7. 7. Classical Encryption Techniques 1  Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
  8. 8. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  9. 9. Classical Encryption Techniques 1 Cipherered text 3 IODQN HDVW DWWDFN DW GDZQ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The clear text message would be encoded using a key of 3. 1 FLANK EAST ATTACK AT DAWN Shift the top scroll over by three characters (key of 3), an A becomes D, B becomes E, and so on. 2 The clear text message would be encrypted as follows using a key of 3. Clear text
  10. 10. Classical Encryption Techniques 1  Caesar Cipher  Monoalphabetic Ciphers  Playfair Cipher  Hill Cipher  Polyalphabetic Ciphers  Vigenère Cipher  Autokey Cipher  Vernam Cipher
  11. 11. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  12. 12. Classical Encryption Techniques 1 Caesar Cipher is one of the simplest and most widely known encryption techniques.
  13. 13. Classical Encryption Techniques 1
  14. 14. Classical Encryption Techniques 1
  15. 15. Classical Encryption Techniques 1
  16. 16. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=d 2) P=3 3) C=P+K mod 26=3+3 mod 26=6 mod 26 =6 4) C=g
  17. 17. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=x 2) P=23 3) C=P+K mod 26=23+3 mod 26=26 mod 26= 0 4) C=a
  18. 18. Classical Encryption Techniques 1  P= dcodex  C= gfrgha  K=3
  19. 19. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=g 2) C=6 3) P=C-K mod 26=6-3 mod 26=3 4) P=d
  20. 20. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=a 2) C=0 3) P=C-K mod 26=0-3 mod 26=-3 mod 26 =23 4) P=x
  21. 21. Classical Encryption Techniques 1  C= gfrgha  P= dcodex  K=3
  22. 22. Classical Encryption Techniques 1  Three important characteristics of this problem enabled us to use a bruteforce cryptanalysis: The encryption and decryption algorithms are known. There are only 25 keys to try. The language of the plaintext is known and easily recognizable.
  23. 23. Classical Encryption Techniques 1
  24. 24. Classical Encryption Techniques 1 How to implement Caesar Cipher technique on Arabic letters?
  25. 25. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  26. 26. Classical Encryption Techniques 1 A monoalphabetic cipher uses fixed substitution over the entire message Random Key
  27. 27. Classical Encryption Techniques 1  Example: Plaintext alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY  P= ITEMS  Encoding  C= FQAIP  Decoding  P= ITEMS
  28. 28. Classical Encryption Techniques 1  Relative Frequency of Letters in English Text
  29. 29. Classical Encryption Techniques 1  C=
  30. 30. Classical Encryption Techniques 1  cipher letters P and Z are the equivalents of plain letters e and t
  31. 31. Classical Encryption Techniques 1  Finally, The complete plaintext
  32. 32. Classical Encryption Techniques 1 How to implement Monoalphabetic Cipher technique on Arabic letters?
  33. 33. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  34. 34. Classical Encryption Techniques 1  The Playfair system was invented by Charles Wheatstone, who first described it in 1854.  Used by many countries during wartime  The Playfair algorithm is based on the use of a 5 x 5 matrix of letters constructed using a keyword.
  35. 35. Classical Encryption Techniques 1  In this case, the keyword is monarchy.
  36. 36. Classical Encryption Techniques 1  4 Rules: 1) If both letters are the same (or only one letter is left), add an "X" after the first letter. 2) If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively
  37. 37. Classical Encryption Techniques 1  4 Rules: 3) If the letters appear on the same column of your table, replace them with the letters immediately below respectively 4) If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair.
  38. 38. Classical Encryption Techniques 1  P=Hide the gold in the tree stump (note the null "X" used to separate the repeated "E"s)  P= HI DE TH EG OL DI NT HE TR EX ES TU MP  K= playfair example
  39. 39. Classical Encryption Techniques 1  How to build 5x5 Matrix (assuming that I and J are interchangeable), the table becomes (omitted letters in red):
  40. 40. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  41. 41. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  42. 42. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  43. 43. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  44. 44. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  45. 45. Classical Encryption Techniques 1 C= BM OD ZB XD NA BE KU DM UI XM MO UV IF the message "Hide the gold in the tree stump" becomes "BMODZ BXDNA BEKUD MUIXM MOUVI F"
  46. 46. Classical Encryption Techniques 1 Using Playfair Cipher how to decrepit the following cipher text: C= “BMODZ BXDNA BEKUD MUIXM MOUVI F” K= playfair example
  47. 47. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  48. 48. Classical Encryption Techniques 1  The Hill Cipher was invented by Lester S. Hill in 1929  The Hill Cipher based on linear algebra  Encryption  2 x 2 Matrix Encryption  3 x 3 Matrix Encryption
  49. 49. Classical Encryption Techniques 1  square matrix 𝑀 by the equation 𝑀𝑀−1 = 𝑀−1 𝑀= 𝐼, where 𝐼 is the identity matrix.  C = P*K mod 26
  50. 50. Classical Encryption Techniques 1
  51. 51. Classical Encryption Techniques 1  Example of Key 2 x 2  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  plaintext message "short example“  𝑃= short example  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  52. 52. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4  𝐶 = 𝐾 ∗ 𝑃 𝑚𝑜𝑑 26  𝑘0 𝑘1 𝑘2 𝑘3 ∗ 𝑝0 𝑝1 = 𝑘0 ∗ 𝑝0 + 𝑘1 ∗ 𝑝1 𝑘2 ∗ 𝑝0 + 𝑘3 ∗ 𝑝1  7 8 11 11 ∗ 18 7 = 7 ∗ 18 + 8 ∗ 7 11 ∗ 18 + 11 ∗ 7 = 182 275  𝐶 = 182 275 𝑚𝑜𝑑 26 = 0 15 = 𝑎 𝑝
  53. 53. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  54. 54. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  55. 55. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  56. 56. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  57. 57. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  58. 58. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ"
  59. 59. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ“  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  We want to find 𝐾−1
  60. 60. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 1 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝐷 𝐾 = 7 ∗ 11 − 8 ∗ 11 = −11 𝑚𝑜𝑑 26 = 15 𝐷𝐷−1 = 1 𝑚𝑜𝑑 26 = 15 ∗ 𝐷−1 15 ∗ 𝐷−1 𝑚𝑜𝑑 26 = 1 Try and Test 1 𝑚𝑜𝑑 26 = 105 105 mod 26 =1 𝐷−1 = 7
  61. 61. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 2 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥 𝑜𝑓 𝐾𝑒𝑦 𝑎𝑑𝑗 𝑎 𝑏 𝑐 𝑑 = 𝑑 −𝑏 −𝑐 𝑎 𝑎𝑑𝑗 7 8 11 11 = 11 −8 −11 7 mod 26 = 11 18 15 7
  62. 62. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 3 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑦 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝑏𝑦 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥  7 ∗ 11 18 15 7 = 77 126 105 49 𝑚𝑜𝑑 26 = 25 22 1 23 = 𝐾−1
  63. 63. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  64. 64. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  65. 65. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  66. 66. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  67. 67. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  68. 68. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  69. 69. Classical Encryption Techniques 1 Using Hill Cipher how to implement 3x3 matrix encryption ? The key for a hill cipher is a matrix e.g. 𝒌 = 2 4 5 9 2 1 3 17 7 and message= ATTACK AT DAWN
  70. 70. Classical Encryption Techniques 1  Use MS Word  Send me mail to mloey@live.com with email subject “ Classical Encryption Techniques 1 “  Put your name on Arabic with department and section on word and email body  Finally, press Send  Deadline Next Lecture
  71. 71. Classical Encryption Techniques 1 facebook.com/mloey mohamedloey@gmail.com twitter.com/mloey linkedin.com/in/mloey mloey@fci.bu.edu.eg mloey.github.io
  72. 72. Classical Encryption Techniques 1 www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME

×