AFFINE CIPHER
Ammar Amjad
Kainat Khalid
Zakriya Ali Sabir
Syed Mohammad Ali
Hamza Tariq
Qazi Talha Hamid
INTRODUCTION
BACKGROUND
ENCODING
Convert into a coded form.
ENCRYPT
Convert (information or data) into a cipher or code,
especially to prevent unauthorized access.
JEAN-FRANCOIS
CHAMPOLLION
French soldier
Philologist
Orientalist
DECIPHER of the EGYPTIAN
HIEROGLYPHS
ENCRYPTION
TECHNIQE
Y=(aP+k)%26
a=multiplier
k=shift
p=data
gcd(a,26)
Why 26??
g=6
Suppose we want to encrypt ‘g’
Checking corresponding numeric value
( 7, 2)
using
Plugging the values
in formula:
=(7*6+2)%26
=44%26
=18
as s=18
we get :
‘ g ’  ‘ s ’
DECRYPTION TECHNIQUE
Y=(aP+k)%26
( a , k )KEY 
P=[(a^-1)(Y-k)] % 26
Here this (a^-1) is not the multiplicative
inverse of a but it is the modular inverse of a.
a = 7
k = 2
As we had encrypted :
‘ g ’  ‘ s ’
Using :
( a . a inverse) % 26 = 1
If we take :
1 <= a <= 25
εa ^ -1 { 1,3,5,7,9,11,15,17,19,21,23,25}
key( a , k )=( 7,2 )
a inverse = 15
Y = 18
P = [a inverse ( Y – k) ] % 26
P = [ 15 ( 18 - 2 ) ] % 26
P = 6
key( a , k )=( 7,2 )
a inverse = 15
Y = 18
P = [a inverse ( Y – k) ] % 26
P = [ 15 ( 18 - 2 ) ] % 26
P = 6
Its CORRECT !
ALGORITHM & CODE
FLOW-CHART
PROCESS OF ENCRYPTION
PROCESS OF DECRYPTION
START
TAKE INPUT FROM USER
CONVERT ALPHABETS TO
NUMBERS
ENCRYPT NUMBERS
CONVERT ENCRYPTED
NUMBERS TO LETTERS
CONVERT LETTERS
BACK TO NUMBERS
DECRYPT NUMBERS
CONVERT NUMBERS TO
LETTERS
END
LIMITATIONS
 Case of the alphabets
 Spaces
 Shift
 Multiplier
CONCLUSION
Thank-you!

Affine Cypher Encryption - Decryption