SlideShare a Scribd company logo
1 of 22
11/6/2017 Ciesar Cipher 111/6/2017 Ciesar Cipher 1
Topic
Caesar Cipher Encryption Technique
MSC (Cs)-I (1ST SEM)
Year 2017-18
Submitted to Submitted by
Dr. H.S. HOTA (HOD) Dushhyant Kumar
(Department of CSA) Roll No. 06
11/6/2017 Ciesar Cipher 2
Content
11/6/2017 Ciesar Cipher 3
Introduction
The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’
meaning hidden and ‘graphene’ meaning writing.
Hieroglyph − The Oldest Cryptographic Technique
The first known evidence of cryptography can be traced to the use of ‘hieroglyph’.
Some 4000 years ago, the Egyptians used to communicate by messages written in
hieroglyph. This code was the secret known only to the scribes who used to transmit
messages on behalf of the kings.
Why need Cryptography?
Goal :- Secure communication(Protect data from Hackers & Crackers)
1. Confidentiality:- protection of data from unauthorized disclosure
2. Authentication:- The authentication service is concerned with assuring that a
communication is authentic persion.
3. Integrity:- assurance that data received is as sent by an authorized entity
11/6/2017 Ciesar Cipher 4
Introduction
11/6/2017 Ciesar Cipher 5
Introduction
Passive Attack: Traffic Analysis
11/6/2017 Ciesar Cipher 6
Introduction
Active Attack: Interruption
Block delivery of message
11/6/2017 Ciesar Cipher 7
Introduction
Fabricate message
Active Attack: Fabrication
11/6/2017 Caesar Cipher 8
Introduction
Modify messageModify message
Active Attack: Modification
11/6/2017 Ciesar Cipher 9
Introduction
Human being from ages had two inherent needs −
(a) to communicate and share information and
(b) to communicate selectively.
These two needs gave rise to the art of coding the messages in such a way
that only the intended people could have access to the information.
Unauthorized people could not extract any information, even if the
scrambled messages fell in their hand.
11/6/2017 Ciesar Cipher 10
What is cryptography?
Cryptography:-
The art or science encompassing the principles and methods
of transforming an intelligible message into one that is unintelligible, and
then retransforming that message back to its original form.
Cryptography can characterize by:
– type of encryption operations used
• substitution / transposition
– number of keys used
• single-key or private / two-key or public
– way in which plaintext is processed
• block / stream
11/6/2017 Ciesar Cipher 11
Basic Terminology
11/6/2017 Ciesar Cipher 12
Symmetric Encryption
11/6/2017 Ciesar Cipher 13
Symmetric Cipher Model
11/6/2017 Ciesar Cipher 14
Requirements
Two requirements for secure use of symmetric encryption:
– a strong encryption algorithm.
– a secret key known only to sender / receiver.
Y = EK(X)
X = DK(Y)
¨assume encryption algorithm is known
¨implies a secure channel to distribute key
Cipher text (y)
Plain text (x)
Key (K)
Encryption(E)
Decryption(D)
11/6/2017 Ciesar Cipher 15
Classical Encryption Technique
1. Substitution Ciphers:-
where letters of plaintext are replaced by
other letters or by numbers or symbols.
OR
if plaintext is viewed as a sequence of bits, then substitution involves replacing
plaintext bit patterns with cipher text t bit patterns.
Types of Substitution technique are :-
A. Caesar Cipher
B. Hill Cipher
C. Polyalphabetic Ciphers
D. One-Time Pad
E. Playfair Cipher
F. Monoalphabetic Ciphers
2. Transposition technique
11/6/2017 Ciesar Cipher 16
Caesar Cipher
Caesar Cipher earliest known substitution cipher “by Julius Caesar” first
attested use in military affairs replaces each letter by 3rd letter.
example:
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
Caesar Cipher
¨can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
replaces each letter by 3rd letter
11/6/2017 Ciesar Cipher 17
Caesar Cipher
Caesar Cipher can define Mathematical transformation as:
1. Now we apply the same method to calculation for encryption using the
Caesar cipher.
2. First we convert the letters of the alphabet to number so that we can
operate on them mathematically.
3. We convert ‘a’ to 0, ‘b’ to 1, ‘c’ to 3.right through to ‘z’ 25 as shown below.
then have Caesar cipher as:
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
11/6/2017 Caesar Cipher 18
Caesar Cipher
Caesar Cipher transformation Example:
1. Steps- Encryption and decryption process using Caesar cipher
2. Choose Plain text (original message).
3. Applying Caesar cipher replaces each letter by 3rd letter algorithm
4. Use key for Encryption
Key= Number of shift alphabet called key
Hello friend Plain text
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
11/6/2017 Ciesar Cipher 19
Caesar Cipher
Caesar Cipher transformation Example:
1. Encryption Process
= Plain text
K H O O R I U L H Q G
h e l l o f r i e n d
= E
= C
11/6/2017 Ciesar Cipher 20
Caesar Cipher
K H O O R I U L H Q G
Plain text
Cipher text =
Encryption process
h e l l o f r i e n d
Decryption process
h e l l o f r i e n dPlain text =
Key=Shift 3rd place alphabet
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
Cryptography with caesar Cipher
Cryptography with caesar Cipher

More Related Content

What's hot

What's hot (20)

cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Ch03
Ch03Ch03
Ch03
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
hill cipher
hill cipherhill cipher
hill cipher
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
A Brief History of Cryptography
A Brief History of CryptographyA Brief History of Cryptography
A Brief History of Cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 

Similar to Cryptography with caesar Cipher

Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Yekini Nureni
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Anas Rock
 
Cryptography basics
Cryptography basicsCryptography basics
Cryptography basicsShellmates
 
Cryptography
CryptographyCryptography
Cryptographymilanmath
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxdesalewminale
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003keyurbz
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureMike Gates
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docxrobert345678
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)Somaditya Basak
 

Similar to Cryptography with caesar Cipher (20)

Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
 
Cryptography basics
Cryptography basicsCryptography basics
Cryptography basics
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography (1)
Cryptography (1)Cryptography (1)
Cryptography (1)
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Cryptography with caesar Cipher

  • 1. 11/6/2017 Ciesar Cipher 111/6/2017 Ciesar Cipher 1 Topic Caesar Cipher Encryption Technique MSC (Cs)-I (1ST SEM) Year 2017-18 Submitted to Submitted by Dr. H.S. HOTA (HOD) Dushhyant Kumar (Department of CSA) Roll No. 06
  • 3. 11/6/2017 Ciesar Cipher 3 Introduction The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing. Hieroglyph − The Oldest Cryptographic Technique The first known evidence of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph. This code was the secret known only to the scribes who used to transmit messages on behalf of the kings. Why need Cryptography? Goal :- Secure communication(Protect data from Hackers & Crackers) 1. Confidentiality:- protection of data from unauthorized disclosure 2. Authentication:- The authentication service is concerned with assuring that a communication is authentic persion. 3. Integrity:- assurance that data received is as sent by an authorized entity
  • 4. 11/6/2017 Ciesar Cipher 4 Introduction
  • 5. 11/6/2017 Ciesar Cipher 5 Introduction Passive Attack: Traffic Analysis
  • 6. 11/6/2017 Ciesar Cipher 6 Introduction Active Attack: Interruption Block delivery of message
  • 7. 11/6/2017 Ciesar Cipher 7 Introduction Fabricate message Active Attack: Fabrication
  • 8. 11/6/2017 Caesar Cipher 8 Introduction Modify messageModify message Active Attack: Modification
  • 9. 11/6/2017 Ciesar Cipher 9 Introduction Human being from ages had two inherent needs − (a) to communicate and share information and (b) to communicate selectively. These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even if the scrambled messages fell in their hand.
  • 10. 11/6/2017 Ciesar Cipher 10 What is cryptography? Cryptography:- The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form. Cryptography can characterize by: – type of encryption operations used • substitution / transposition – number of keys used • single-key or private / two-key or public – way in which plaintext is processed • block / stream
  • 11. 11/6/2017 Ciesar Cipher 11 Basic Terminology
  • 12. 11/6/2017 Ciesar Cipher 12 Symmetric Encryption
  • 13. 11/6/2017 Ciesar Cipher 13 Symmetric Cipher Model
  • 14. 11/6/2017 Ciesar Cipher 14 Requirements Two requirements for secure use of symmetric encryption: – a strong encryption algorithm. – a secret key known only to sender / receiver. Y = EK(X) X = DK(Y) ¨assume encryption algorithm is known ¨implies a secure channel to distribute key Cipher text (y) Plain text (x) Key (K) Encryption(E) Decryption(D)
  • 15. 11/6/2017 Ciesar Cipher 15 Classical Encryption Technique 1. Substitution Ciphers:- where letters of plaintext are replaced by other letters or by numbers or symbols. OR if plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with cipher text t bit patterns. Types of Substitution technique are :- A. Caesar Cipher B. Hill Cipher C. Polyalphabetic Ciphers D. One-Time Pad E. Playfair Cipher F. Monoalphabetic Ciphers 2. Transposition technique
  • 16. 11/6/2017 Ciesar Cipher 16 Caesar Cipher Caesar Cipher earliest known substitution cipher “by Julius Caesar” first attested use in military affairs replaces each letter by 3rd letter. example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB Caesar Cipher ¨can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C replaces each letter by 3rd letter
  • 17. 11/6/2017 Ciesar Cipher 17 Caesar Cipher Caesar Cipher can define Mathematical transformation as: 1. Now we apply the same method to calculation for encryption using the Caesar cipher. 2. First we convert the letters of the alphabet to number so that we can operate on them mathematically. 3. We convert ‘a’ to 0, ‘b’ to 1, ‘c’ to 3.right through to ‘z’ 25 as shown below. then have Caesar cipher as: C = E(p) = (p + k) mod (26) p = D(C) = (C – k) mod (26)
  • 18. 11/6/2017 Caesar Cipher 18 Caesar Cipher Caesar Cipher transformation Example: 1. Steps- Encryption and decryption process using Caesar cipher 2. Choose Plain text (original message). 3. Applying Caesar cipher replaces each letter by 3rd letter algorithm 4. Use key for Encryption Key= Number of shift alphabet called key Hello friend Plain text a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
  • 19. a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C 11/6/2017 Ciesar Cipher 19 Caesar Cipher Caesar Cipher transformation Example: 1. Encryption Process = Plain text K H O O R I U L H Q G h e l l o f r i e n d = E = C
  • 20. 11/6/2017 Ciesar Cipher 20 Caesar Cipher K H O O R I U L H Q G Plain text Cipher text = Encryption process h e l l o f r i e n d Decryption process h e l l o f r i e n dPlain text = Key=Shift 3rd place alphabet C = E(p) = (p + k) mod (26) p = D(C) = (C – k) mod (26)