SlideShare a Scribd company logo
 Plaintext:
This is often the initial intelligible message
or information that's fed into the algorithmic program as
input.
 Encryption algorithm:
The cryptography algorithmic
program performs numerous substitutions and
transformations on the plaintext.
 Secret key:
 The key key's conjointly input to
the coding algorithmic program.
 The key's a worth freelance of the plaintext and of
the algorithmic program.
 The algorithmic program can turn out a
special output betting on the precise key getting
used at the time.
 The precise substitutions and transformations
performed by the algorithmic program rely on the
key.
 Cipher text:
 It depends on the plaintext and also the secret
key.
 For a given message, 2 totally different
completely different} keys can turn
out 2 different cipher texts.
 The cipher text is Associate in
Nursing apparently random stream of
knowledge and, because it stands, is
unintelligible.
 Decryption algorithm:
 This is primarily the cryptography rule run in
reverse.It takes the ciphertext and also the secret
key and produces the first plaintext.
 This is primarily the cryptography rule run in
reverse.
 It takes the ciphertext and also the secret key
and produces the first plaintext.
 Cryptographic systems area
unit characterized 3 freelance dimensions.
The type of operation is
employed for remodeling plaintext to cipher text.
 All encoding algorithmic rule area
unit supported 2 general principles: substitution.
 within which every component within
the plaintext(bit, letter, cluster of bits or letter) is
mapped into another component and transposition.
 within which components within the plaintext area
unit rearranged.
 The basic demand is that no info be lost(i.e., that
each one operations area unit reversible).
 Most system, referred to as product systems,
involve multiple stages of substitution and
transpositions.
 Cryptanalysis:
cryptology attacks have faith in the character of
the algorithmic Program and maybe
some information of the overall characteristics
of the plaintext or maybe some sample plaintext-
cipher text pairs.
 this sort of attacks exploits the characteristics of
the algorithmic program to aim to deduce a
particular plaintext or to deduce the key getting
used.
 Brute-Force attack:
 The attacker tries every possible key on a piece
of cipher-text until an intelligible translation into
plaintext is obtained.
 On average, half of all possible keys must be
tried to achieve success.
 Is one during which the letters of
plaintext are replaced by alternative letters or by
numbers or symbols.
 If the plaintext is viewed as a sequence of bits,
then substitution involves exchange plaintext bit
patterns with ciphertext bit patterns
 Simplest and earliest best-known use of a
substitution cipher used by general.
 Involves replacement every letter of the alphabet
with the letter standing 3 places additional down the
alphabet
 Alphabet is wrapped around in order that the letter
following Z may be a
 plain: meet me after the toga party
 cipher: PHHW PH DIWHU WKH WRJD
SDUWB
 Can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
 Mathematically give each letter a number
a b c d e f g h i j k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
 Algorithm can be expressed as: c = E(3, p) = (p + 3) mod
(26)
 A shift may be of any amount, so that the general Caesar
algorithm is:
C = E(k , p ) = (p + k ) mod 26
 Where k takes on a value in the range 1 to 25;
the decryption algorithm is simply:
 p = D(k , C ) = (C - k ) mod 26
 With only 25 possible keys, the caeser cipher is so
far from secure.
 A dramatic increase in the key space can achieved
by allowing arbitrary substitution.
 Before proceeding, we define the term permutation.
 A Permutation of finite set of elements S is an
ordered sequence of all the elements of S, with each
element appearing exactly once.
 For example, if S={a, b, c}, there are six
permutations of S.
abc, acb, bac, bca, cab, cba,
 If the “cipher” line may be any permutation of
the twenty six alphabetic characters, then
there square measure 26!
or larger than 4x1026 potential keys. this is
often ten orders of magnitude larger than the
key house for DES
 Approach is named as a monoalphabetic
substitution cipher as a result of one cipher
alphabet is employed per message
 The known multiple letter cryptography cipher is
that the playfair, that treats diagrams within
the plaintext as single units and interprets these
units into ciphertext diagrams.
 The playfair algorithm is based on the use of 5x5
matrix of letters constructed using a keyword.
 Hill cipher is developed by the man of
science Lester Hill in 1929. Strength is that
it fully hides single-letter frequencies.
 The use of a bigger matrix hides a lot
of frequency info
 A 3x3 Hill cipher hides not solely single-
letter however additionally two-letter
frequency info try other relevant Tools
 This example will rely on some linear algebra
and some number theory. The key for a hill
cipher is a matrix
 e.g.
 In the higher than case, we've got taken the
dimensions to be 3×3, but it will be any size (as
long because it is square).
 Assume we wish to inscribe the message ATTACK
AT DAWN.
 To inscribe this, we'd like to interrupt the message
into chunks of three.
 we tend to currently take the
primary three characters from our plaintext, ATT
and produce a vector that corresponds to the letters
(replace A with 0, B with 1 ... Z with 25 etc.) to get:
[0 nineteen 19] (this is ['A' 'T' 'T']).
 To get our ciphertext we perform a matrix
multiplication (you may need to revise matrix
multiplication if this doesn't make sense):
 This method is performed for all three letter
blocks within the plaintext.
 The plaintext might have to be compelled
tube soft with some further letters to
create positive that there's a full range of
blocks.
 Now for the tricky part, the decryption.
 We need to find an inverse matrix modulo 26
to use as our 'decryption key.
 we want something that will take 'PFO'
back to 'ATT'. If our 3 by 3 key matrix is
called K, our decryption key will be the 3 by 3
matrix K-1, which is the inverse of K.
 To find K-1 we have to use a bit of maths.
 It turns out that K-1 above can be calculated
from our key
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer Science

More Related Content

What's hot

Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
koolkampus
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
Dom Mike
 

What's hot (18)

Ch03
Ch03Ch03
Ch03
 
Mid term
Mid termMid term
Mid term
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Huffman Code Decoding
Huffman Code DecodingHuffman Code Decoding
Huffman Code Decoding
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysis
 
Huffman coding01
Huffman coding01Huffman coding01
Huffman coding01
 
Huffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh AgarwalHuffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh Agarwal
 
Huffman Algorithm By Shuhin
Huffman Algorithm By ShuhinHuffman Algorithm By Shuhin
Huffman Algorithm By Shuhin
 
Data Communication & Computer network: Shanon fano coding
Data Communication & Computer network: Shanon fano codingData Communication & Computer network: Shanon fano coding
Data Communication & Computer network: Shanon fano coding
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Lec32
Lec32Lec32
Lec32
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
 

Similar to Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer Science

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
praveenaS25
 

Similar to Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer Science (20)

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
2. Classical Cryptosystems Classical.ppt
2. Classical Cryptosystems Classical.ppt2. Classical Cryptosystems Classical.ppt
2. Classical Cryptosystems Classical.ppt
 

Recently uploaded

Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 

Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer Science

  • 1.
  • 2.
  • 3.  Plaintext: This is often the initial intelligible message or information that's fed into the algorithmic program as input.  Encryption algorithm: The cryptography algorithmic program performs numerous substitutions and transformations on the plaintext.
  • 4.  Secret key:  The key key's conjointly input to the coding algorithmic program.  The key's a worth freelance of the plaintext and of the algorithmic program.  The algorithmic program can turn out a special output betting on the precise key getting used at the time.  The precise substitutions and transformations performed by the algorithmic program rely on the key.
  • 5.  Cipher text:  It depends on the plaintext and also the secret key.  For a given message, 2 totally different completely different} keys can turn out 2 different cipher texts.  The cipher text is Associate in Nursing apparently random stream of knowledge and, because it stands, is unintelligible.
  • 6.  Decryption algorithm:  This is primarily the cryptography rule run in reverse.It takes the ciphertext and also the secret key and produces the first plaintext.
  • 7.
  • 8.  This is primarily the cryptography rule run in reverse.  It takes the ciphertext and also the secret key and produces the first plaintext.  Cryptographic systems area unit characterized 3 freelance dimensions. The type of operation is employed for remodeling plaintext to cipher text.
  • 9.  All encoding algorithmic rule area unit supported 2 general principles: substitution.  within which every component within the plaintext(bit, letter, cluster of bits or letter) is mapped into another component and transposition.  within which components within the plaintext area unit rearranged.  The basic demand is that no info be lost(i.e., that each one operations area unit reversible).  Most system, referred to as product systems, involve multiple stages of substitution and transpositions.
  • 10.  Cryptanalysis: cryptology attacks have faith in the character of the algorithmic Program and maybe some information of the overall characteristics of the plaintext or maybe some sample plaintext- cipher text pairs.  this sort of attacks exploits the characteristics of the algorithmic program to aim to deduce a particular plaintext or to deduce the key getting used.
  • 11.  Brute-Force attack:  The attacker tries every possible key on a piece of cipher-text until an intelligible translation into plaintext is obtained.  On average, half of all possible keys must be tried to achieve success.
  • 12.
  • 13.  Is one during which the letters of plaintext are replaced by alternative letters or by numbers or symbols.  If the plaintext is viewed as a sequence of bits, then substitution involves exchange plaintext bit patterns with ciphertext bit patterns
  • 14.  Simplest and earliest best-known use of a substitution cipher used by general.  Involves replacement every letter of the alphabet with the letter standing 3 places additional down the alphabet  Alphabet is wrapped around in order that the letter following Z may be a  plain: meet me after the toga party  cipher: PHHW PH DIWHU WKH WRJD SDUWB
  • 15.  Can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  Mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25  Algorithm can be expressed as: c = E(3, p) = (p + 3) mod (26)  A shift may be of any amount, so that the general Caesar algorithm is: C = E(k , p ) = (p + k ) mod 26  Where k takes on a value in the range 1 to 25; the decryption algorithm is simply:  p = D(k , C ) = (C - k ) mod 26
  • 16.
  • 17.  With only 25 possible keys, the caeser cipher is so far from secure.  A dramatic increase in the key space can achieved by allowing arbitrary substitution.  Before proceeding, we define the term permutation.  A Permutation of finite set of elements S is an ordered sequence of all the elements of S, with each element appearing exactly once.  For example, if S={a, b, c}, there are six permutations of S. abc, acb, bac, bca, cab, cba,
  • 18.  If the “cipher” line may be any permutation of the twenty six alphabetic characters, then there square measure 26! or larger than 4x1026 potential keys. this is often ten orders of magnitude larger than the key house for DES  Approach is named as a monoalphabetic substitution cipher as a result of one cipher alphabet is employed per message
  • 19.  The known multiple letter cryptography cipher is that the playfair, that treats diagrams within the plaintext as single units and interprets these units into ciphertext diagrams.  The playfair algorithm is based on the use of 5x5 matrix of letters constructed using a keyword.
  • 20.  Hill cipher is developed by the man of science Lester Hill in 1929. Strength is that it fully hides single-letter frequencies.  The use of a bigger matrix hides a lot of frequency info  A 3x3 Hill cipher hides not solely single- letter however additionally two-letter frequency info try other relevant Tools
  • 21.  This example will rely on some linear algebra and some number theory. The key for a hill cipher is a matrix  e.g.
  • 22.  In the higher than case, we've got taken the dimensions to be 3×3, but it will be any size (as long because it is square).  Assume we wish to inscribe the message ATTACK AT DAWN.  To inscribe this, we'd like to interrupt the message into chunks of three.  we tend to currently take the primary three characters from our plaintext, ATT and produce a vector that corresponds to the letters (replace A with 0, B with 1 ... Z with 25 etc.) to get: [0 nineteen 19] (this is ['A' 'T' 'T']).
  • 23.  To get our ciphertext we perform a matrix multiplication (you may need to revise matrix multiplication if this doesn't make sense):
  • 24.  This method is performed for all three letter blocks within the plaintext.  The plaintext might have to be compelled tube soft with some further letters to create positive that there's a full range of blocks.  Now for the tricky part, the decryption.  We need to find an inverse matrix modulo 26 to use as our 'decryption key.
  • 25.  we want something that will take 'PFO' back to 'ATT'. If our 3 by 3 key matrix is called K, our decryption key will be the 3 by 3 matrix K-1, which is the inverse of K.  To find K-1 we have to use a bit of maths.  It turns out that K-1 above can be calculated from our key