SlideShare a Scribd company logo
It is the practice and study of techniques for secure
communication in the presence of third parties.
Science and art of transforming messages to make them
secure and immune to attack.
The art of protecting information by transforming it ie;
encrypting it into an unreadable format is called
ciphertext.Only those who possess a secret key can decipher
the message into plain text.
Substitution ciphers
Transposition ciphers
It is a method of encoding by which units of plaintext are
replaced with ciphertext ,according to a fixed system;the
“units” may be single letters,pairs of letters,triplets of
letters,mixtures of the above and so forth.
The receiver deciphers the text by performing the inverse
substitution.
It is a simple data encryption scheme in which
plaintext characters are shifted in some regular pattern
to form cipher text.
In transposition ciphers letters are jumbled up together.
Highly secure
SUBSTITUTION CIPHERS
CAESAR
CIPHERS
AUTOKEY
CIPHERS
AFFINE
CIPHERS
VIGNERE
CIPHERS
Caesar cipher involves replacing each letter of alphabet
with the letter standing three places further down the
alphabet.
Encryption
Algorithm: C= (p+3)mod26
Decryption
Algorithm: P= (c-3)mod26
In an Autokey cipher the plain text itself is used
as a keyword with a slight modification.
Encryption
We have to start the keyword with a short seed,
Generally a plain text followed by a single letter.
Then write that seed letter below to first letter and plain
text itself is written below all other letters. Then sum up
the corresponding digital equivalence of the letters, and
convert it into cipher text.
Decryption
Decryption is done by rewriting to each numerical term of
both plaintext and cipher text. Suppose the plain text has
digital equivalent cipher text is c1,c2,……..cn.
If S indicate the numeral for C then the plain text number is,
P1 = (c1-S) mod26
Pk = (ck- P k-1)mod 26
Example of Monoalphabetic Cipher.
Here the encryption process is substantially mathematical.
Encryption
The first step in the encryption process is to transform each
of the letters in the plaintext alphabet to the corresponding
integer in the range 0 to m-1. With this done, the
encryption process for each letter is given by
E(x) = (ax + b) mod m Where a and b are the key for the cipher.
Decryption
In deciphering the cipher text, we must perform the
opposite (or inverse) functions on the cipher text to
retrieve the plaintext. Once again, the first step is to
convert each of the cipher text letters into their integer
values. We must now perform the following calculation
on each integer
D(x) = c(x - b) mod m
Where c is the modular multiplicative inverse of a.
The Vigenere Cipher is an adaptation of the Trithemius
Cipher, but instead of systematically progressing through the
cipher text alphabets in the Tabula Recta, it uses a keyword to
pick which columns to use.
Encryption
A sequence of n letters with numerical equivalence b1,b2,...bn will serve as
keyword. The plane text message is expressed as p1,p2....pn say pi.Then
conversion to cipher text using the congruence relation.
Ci=Pi +bi (mod26) ; i=1,2....n
For eg: plaintext message is “a simple example”
Decryption
Deciphering is carried out by the relation
Pi =Ci –bi (mod26)
Plain text a s i m p l e e x a m p l e
Key
stream
b a t t i s t a b a t t i s
TRANSPOSITION CIPHERS
RAIL
FENCE
CIPHERS
ROUTE
CIPHERS
COLUMNAR
TRANSPOSITION
CIPHER
MYSZKOWSKI
TRANSPOSITION
CIPHER
The Rail fence cipher is an easy to apply transposition cipher
that jumbles up the order of the letters of a message in a quick
convenient way.
It also has the security of a key to make it a little bit harder to
break.
The Rail Fence cipher works by writing your message on
alternate lines across the page, and then reading off each line in
turn.
Encryption
Write the plaintext message in zigzag lines across the page,
and then read off each row.
 Firstly, we need to have a key, which for this cipher is the
number of rows you are going to have. then start writing the
letters of the plaintext diagonally down to the right until you
reach the number of rows specified by the key. then bounce
back up diagonally until we hit the first row again. This
continues until the end of the plaintext.
Eg:
Decryption
We start writing the message, but leaving a dash in place of
the spaces yet to be occupied. Gradually, you can replace all
the dashes with the corresponding letters, and read off the
plaintext from the table.
We start by making a grid with as many rows as the key is,
and as many columns as the length of the cipher text. We then
place the first letter in the top left Square, and dashes
diagonally downwards where the letters will be. When we get
back to the top row, we place the next letter in the cipher text.
Continue like this across the row, and start the next row when
you reach the end.
The Route Cipher is a transposition cipher where the key is which
route to follow when reading the cipher text from the block created
with the plaintext. The plaintext is written in a grid, and then read
off the following route chosen
Encryption
 First we write the plaintext in a block of reasonable size for the
plaintext. Part of your key is the size of this grid, so you need to decide
on either a number of columns or number of rows in the grid before
starting. Once the plaintext is written out in the grid, you use the Route
assigned. This could be spiralling inwards from the top right corner in a
clockwise direction, or zigzagging up and down.
Decryption
To decrypt a message received that has been encoded with the
Route Cipher, we need to know the route used and the width
or height of the grid. We then start by constructing a blank
grid of the right size, and then place the cipher text letters in
the grid following the route specified.
 Columnar Transposition involves writing the plaintext out in rows, and then reading
the cipher text off in columns.
 In its simplest form, it is the Route cipher where the route is to read down each
column in order.
Encryption
 We first pick a keyword for our encryption. We write the plaintext out in a grid
where the number of columns is the number of letters in the keyword. We then title
each column with the respective letter from the keyword. We take the letters in the
keyword in alphabetical order, and read down the columns in this order. If a letter
is repeated, we do the one that appears first, then the next and so on.
 Eg:
Decryption
The decryption process is significantly easier if nulls have been
used to pad out the message in the encryption process. Below
we shall talk about how to go about decrypting a message in
both scenarios.
Firstly, if nulls have been used, then you start by writing out the
keyword and the alphabetical order of the letters of the
keyword. You must then divide the length of the cipher text by
the length of the keyword. The answer to this is the number of
rows you need to add to the grid. You then write the cipher text
down the first column until you reach the last row. The next
letter becomes the first letter in the second column (by the
alphabetical order of the keyword), and so on.
 The same methodology as for Columnar Transposition is
used, where the plaintext is written out in rows under the
keyword. The only difference is that when there are repeated
Letters in the keyword, rather than number them from left to
right, give all the same letters the same number.
 Then read across columns which have the same number in
the keyword.
Encryption
We have to choose our keyword for the encryption process first.
We then write out the plaintext in a grid, where the number of
columns in the grid is the number of letters in the keyword. We
then number each letter in the keyword with its alphabetical
position, giving repeated letters the same numbers. We then start at
number 1 (the first letter alphabetically in the keyword), and if it is
the only appearance of 1, we read down the column just like
in Columnar Transposition. If, however, the number 1 appears
more than once, we read from left to right all the first letters of the
columns headed by 1. Then we move to the next row, and read
across, left to right, the letters in the rows headed by 1. Once
complete, we move on to the number 2, and so on.
Decryption
The decryption process is very similar to Columnar
Transposition. We shall go through how to do it if nulls have
been used to fill spaces. By comparing this method with that
given in Columnar Transposition when nulls are not used, you
should be able to work out what to do.
We start by writing out the keyword, and the alphabetical order
of the letters, remembering to give repeated letters the same
number. We then divide the length of the cipher text by the
length of the keyword to work out how many rows we need to
add to our grid. We then have to systematically put the cipher
text back in to the grid. Start at number 1, and continue to the
highest number. If the number only appears once, we fill down
the column. If the number appears twice, we move from left to
right across the columns with that number heading them.
Introduction to cryptography and types of ciphers

More Related Content

What's hot

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Email security
Email securityEmail security
Email security
Baliram Yadav
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 

What's hot (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Unit 2
Unit 2Unit 2
Unit 2
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Email security
Email securityEmail security
Email security
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 

Similar to Introduction to cryptography and types of ciphers

Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
SHUBHA CHATURVEDI
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
parves kamal
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
RavikumarVadana
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
SrideviM4
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
SarwatDilawaiz
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
ParshantYadav13
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ShilpaShettyA1
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
Tedi Thug
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
GauriBornare1
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
eSAT Journals
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
Prabhat Goel
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
eSAT Publishing House
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
ShaishavShah8
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
Shafiqah Emilia
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
ramya marichamy
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
nagwaAboElenein
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 

Similar to Introduction to cryptography and types of ciphers (20)

Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 

Recently uploaded

Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
Richard Gill
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
muralinath2
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
muralinath2
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
muralinath2
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
ssuserbfdca9
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
Sérgio Sacani
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
sachin783648
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
AADYARAJPANDEY1
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
Scintica Instrumentation
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
Nistarini College, Purulia (W.B) India
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Ana Luísa Pinho
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
AADYARAJPANDEY1
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SELF-EXPLANATORY
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 

Recently uploaded (20)

Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 

Introduction to cryptography and types of ciphers

  • 1.
  • 2. It is the practice and study of techniques for secure communication in the presence of third parties. Science and art of transforming messages to make them secure and immune to attack. The art of protecting information by transforming it ie; encrypting it into an unreadable format is called ciphertext.Only those who possess a secret key can decipher the message into plain text.
  • 4. It is a method of encoding by which units of plaintext are replaced with ciphertext ,according to a fixed system;the “units” may be single letters,pairs of letters,triplets of letters,mixtures of the above and so forth. The receiver deciphers the text by performing the inverse substitution.
  • 5. It is a simple data encryption scheme in which plaintext characters are shifted in some regular pattern to form cipher text. In transposition ciphers letters are jumbled up together. Highly secure
  • 7. Caesar cipher involves replacing each letter of alphabet with the letter standing three places further down the alphabet. Encryption Algorithm: C= (p+3)mod26 Decryption Algorithm: P= (c-3)mod26
  • 8. In an Autokey cipher the plain text itself is used as a keyword with a slight modification. Encryption We have to start the keyword with a short seed, Generally a plain text followed by a single letter. Then write that seed letter below to first letter and plain text itself is written below all other letters. Then sum up the corresponding digital equivalence of the letters, and convert it into cipher text.
  • 9. Decryption Decryption is done by rewriting to each numerical term of both plaintext and cipher text. Suppose the plain text has digital equivalent cipher text is c1,c2,……..cn. If S indicate the numeral for C then the plain text number is, P1 = (c1-S) mod26 Pk = (ck- P k-1)mod 26
  • 10. Example of Monoalphabetic Cipher. Here the encryption process is substantially mathematical. Encryption The first step in the encryption process is to transform each of the letters in the plaintext alphabet to the corresponding integer in the range 0 to m-1. With this done, the encryption process for each letter is given by E(x) = (ax + b) mod m Where a and b are the key for the cipher.
  • 11. Decryption In deciphering the cipher text, we must perform the opposite (or inverse) functions on the cipher text to retrieve the plaintext. Once again, the first step is to convert each of the cipher text letters into their integer values. We must now perform the following calculation on each integer D(x) = c(x - b) mod m Where c is the modular multiplicative inverse of a.
  • 12. The Vigenere Cipher is an adaptation of the Trithemius Cipher, but instead of systematically progressing through the cipher text alphabets in the Tabula Recta, it uses a keyword to pick which columns to use.
  • 13. Encryption A sequence of n letters with numerical equivalence b1,b2,...bn will serve as keyword. The plane text message is expressed as p1,p2....pn say pi.Then conversion to cipher text using the congruence relation. Ci=Pi +bi (mod26) ; i=1,2....n For eg: plaintext message is “a simple example” Decryption Deciphering is carried out by the relation Pi =Ci –bi (mod26) Plain text a s i m p l e e x a m p l e Key stream b a t t i s t a b a t t i s
  • 15. The Rail fence cipher is an easy to apply transposition cipher that jumbles up the order of the letters of a message in a quick convenient way. It also has the security of a key to make it a little bit harder to break. The Rail Fence cipher works by writing your message on alternate lines across the page, and then reading off each line in turn.
  • 16. Encryption Write the plaintext message in zigzag lines across the page, and then read off each row.  Firstly, we need to have a key, which for this cipher is the number of rows you are going to have. then start writing the letters of the plaintext diagonally down to the right until you reach the number of rows specified by the key. then bounce back up diagonally until we hit the first row again. This continues until the end of the plaintext. Eg:
  • 17. Decryption We start writing the message, but leaving a dash in place of the spaces yet to be occupied. Gradually, you can replace all the dashes with the corresponding letters, and read off the plaintext from the table. We start by making a grid with as many rows as the key is, and as many columns as the length of the cipher text. We then place the first letter in the top left Square, and dashes diagonally downwards where the letters will be. When we get back to the top row, we place the next letter in the cipher text. Continue like this across the row, and start the next row when you reach the end.
  • 18. The Route Cipher is a transposition cipher where the key is which route to follow when reading the cipher text from the block created with the plaintext. The plaintext is written in a grid, and then read off the following route chosen Encryption  First we write the plaintext in a block of reasonable size for the plaintext. Part of your key is the size of this grid, so you need to decide on either a number of columns or number of rows in the grid before starting. Once the plaintext is written out in the grid, you use the Route assigned. This could be spiralling inwards from the top right corner in a clockwise direction, or zigzagging up and down.
  • 19. Decryption To decrypt a message received that has been encoded with the Route Cipher, we need to know the route used and the width or height of the grid. We then start by constructing a blank grid of the right size, and then place the cipher text letters in the grid following the route specified.
  • 20.  Columnar Transposition involves writing the plaintext out in rows, and then reading the cipher text off in columns.  In its simplest form, it is the Route cipher where the route is to read down each column in order. Encryption  We first pick a keyword for our encryption. We write the plaintext out in a grid where the number of columns is the number of letters in the keyword. We then title each column with the respective letter from the keyword. We take the letters in the keyword in alphabetical order, and read down the columns in this order. If a letter is repeated, we do the one that appears first, then the next and so on.  Eg:
  • 21. Decryption The decryption process is significantly easier if nulls have been used to pad out the message in the encryption process. Below we shall talk about how to go about decrypting a message in both scenarios. Firstly, if nulls have been used, then you start by writing out the keyword and the alphabetical order of the letters of the keyword. You must then divide the length of the cipher text by the length of the keyword. The answer to this is the number of rows you need to add to the grid. You then write the cipher text down the first column until you reach the last row. The next letter becomes the first letter in the second column (by the alphabetical order of the keyword), and so on.
  • 22.  The same methodology as for Columnar Transposition is used, where the plaintext is written out in rows under the keyword. The only difference is that when there are repeated Letters in the keyword, rather than number them from left to right, give all the same letters the same number.  Then read across columns which have the same number in the keyword.
  • 23. Encryption We have to choose our keyword for the encryption process first. We then write out the plaintext in a grid, where the number of columns in the grid is the number of letters in the keyword. We then number each letter in the keyword with its alphabetical position, giving repeated letters the same numbers. We then start at number 1 (the first letter alphabetically in the keyword), and if it is the only appearance of 1, we read down the column just like in Columnar Transposition. If, however, the number 1 appears more than once, we read from left to right all the first letters of the columns headed by 1. Then we move to the next row, and read across, left to right, the letters in the rows headed by 1. Once complete, we move on to the number 2, and so on.
  • 24. Decryption The decryption process is very similar to Columnar Transposition. We shall go through how to do it if nulls have been used to fill spaces. By comparing this method with that given in Columnar Transposition when nulls are not used, you should be able to work out what to do. We start by writing out the keyword, and the alphabetical order of the letters, remembering to give repeated letters the same number. We then divide the length of the cipher text by the length of the keyword to work out how many rows we need to add to our grid. We then have to systematically put the cipher text back in to the grid. Start at number 1, and continue to the highest number. If the number only appears once, we fill down the column. If the number appears twice, we move from left to right across the columns with that number heading them.