SlideShare a Scribd company logo
1 of 17
Download to read offline
PRESENTED BY
Name :S.PRAVEENA
Class : II-MSc CS
Batch : 2017 -2019
Incharge Staff : Ms. M. Florence Dayana
ROTOR MACHINCES
Each cylinder has 26 input pins and 26
output pins.
 The machine consist of a set of
independently rotating cylinder.
 we associate each input and output pin
with a letter of the alphabet, then a single
cylinder defines a monoalphabetic
substitution.
for example:
 An operate depresses the key for the
letter
The result is there are 26*26*26=17,576
Different substitution alphabets used before
the system repeats
setting o a5- rotor machine is equivalent to
a vigenere cipher with a key length of
11,881,376.
such a scheme presents a formidable
cryptanalytic challenge
STEGANOGRAPHY:
 A plaintext message may be hidden in one
of two ways.
 The method of steganography conceal the
Existence of the message.
 one that is time-consuming to construct
 The sequence of first letter of each word
the overall message spells out the hidden
message.
Character marking:
 b Selected letters of printed or typewritten
text are over written in pencil.
Invisible:
 A number of substances can be used for
writing but leave no visible trace until heat or
some chemical is applied to the paper
TRANSPOSITION TECHNIQUES
 A very different kind of mapping is
achieved by performing some sort of
permutation on the plaintext letter.
 The simplest such cipher is the rail
fence technique.
 meet me after the toga party with
Railway fence of depth2,we write the
following
for ex:
m e m a t r h t g p r y
e t e f e t e o a a t
The encrypted message is
MEMATRHTGPRYETEFETEOAAT
ROWS AND COLUMNS TRANSPOSITION
ONE TIME PAD:
 New message requires a new
key of the same length as the new message
 Such a scheme known as a
one-time-pad.
 it produces random output that
bears no statistical relationship to the
plaintext.
 Simply no way to break the code.
VERNAM CHIPHER:
 Vern am cipher is a
symmetrical stream cipher.
 The same length, to generate
the ciphertext,using the Boolean "exclusive
or”(XOR)function.
 The result will be a truly
random cipher text which bears no relation to
the original plaintext.
for ex:
 In the example below,we want to the
transmitted the word HELLO which is stored
on the plaintext tape.
 Incase the sequence AXHJB.
VERNAM CIPHER AUTOKEY SYSTEM:
In the illustration below,the
ciphertext tape is on the left`
It is XOR ad with a copy of the
original.
Key tape (AXHJB),resulting in the
original plaintext: "HELLO”.
For ex:
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for women

More Related Content

What's hot (6)

Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
 
Cn tutorial (6 cs119)
Cn tutorial (6 cs119)Cn tutorial (6 cs119)
Cn tutorial (6 cs119)
 
Bakiya
BakiyaBakiya
Bakiya
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 
Mid term
Mid termMid term
Mid term
 

Similar to NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for women

11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...
Alexander Decker
 

Similar to NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for women (20)

Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information and network security 16 transposition ciphers
Information and network security 16 transposition ciphersInformation and network security 16 transposition ciphers
Information and network security 16 transposition ciphers
 
Password Cracking with Rainbow Tables
Password Cracking with Rainbow TablesPassword Cracking with Rainbow Tables
Password Cracking with Rainbow Tables
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
 
11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
C string
C stringC string
C string
 
Unit 2
Unit  2Unit  2
Unit 2
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for women

  • 1. PRESENTED BY Name :S.PRAVEENA Class : II-MSc CS Batch : 2017 -2019 Incharge Staff : Ms. M. Florence Dayana
  • 2. ROTOR MACHINCES Each cylinder has 26 input pins and 26 output pins.
  • 3.  The machine consist of a set of independently rotating cylinder.  we associate each input and output pin with a letter of the alphabet, then a single cylinder defines a monoalphabetic substitution. for example:  An operate depresses the key for the letter
  • 4.
  • 5. The result is there are 26*26*26=17,576 Different substitution alphabets used before the system repeats setting o a5- rotor machine is equivalent to a vigenere cipher with a key length of 11,881,376. such a scheme presents a formidable cryptanalytic challenge
  • 7.  A plaintext message may be hidden in one of two ways.  The method of steganography conceal the Existence of the message.  one that is time-consuming to construct  The sequence of first letter of each word the overall message spells out the hidden message.
  • 8. Character marking:  b Selected letters of printed or typewritten text are over written in pencil. Invisible:  A number of substances can be used for writing but leave no visible trace until heat or some chemical is applied to the paper
  • 9. TRANSPOSITION TECHNIQUES  A very different kind of mapping is achieved by performing some sort of permutation on the plaintext letter.  The simplest such cipher is the rail fence technique.  meet me after the toga party with Railway fence of depth2,we write the following
  • 10. for ex: m e m a t r h t g p r y e t e f e t e o a a t The encrypted message is MEMATRHTGPRYETEFETEOAAT
  • 11. ROWS AND COLUMNS TRANSPOSITION
  • 12. ONE TIME PAD:  New message requires a new key of the same length as the new message  Such a scheme known as a one-time-pad.  it produces random output that bears no statistical relationship to the plaintext.  Simply no way to break the code.
  • 13. VERNAM CHIPHER:  Vern am cipher is a symmetrical stream cipher.  The same length, to generate the ciphertext,using the Boolean "exclusive or”(XOR)function.  The result will be a truly random cipher text which bears no relation to the original plaintext.
  • 14. for ex:  In the example below,we want to the transmitted the word HELLO which is stored on the plaintext tape.  Incase the sequence AXHJB.
  • 15. VERNAM CIPHER AUTOKEY SYSTEM: In the illustration below,the ciphertext tape is on the left` It is XOR ad with a copy of the original. Key tape (AXHJB),resulting in the original plaintext: "HELLO”.