SlideShare a Scribd company logo
1 of 23
CRYPTOGRAPHY
Lecture 2
Course structure
• Format: Part lecture, part group
activities
• HW:
– Daily assignments, some in-class and some
take home. Keep these in a portfolio.
– One 7-10 page essay on a related topic of
your choice. Final project and presentation
(you propose the topic and format)
– Final grade will be determined by portfolio
of work including the above.
Expectations
• Most work should be typed. Even work
done in class should (usually) be typed
and added to portfolio.
• Attendance is mandatory.
• Respectful behavior to your peers.
• Your day is devoted to this class.
General Rules
• When decrypting or deciphering, all
tools are fair. You may do anything legal
to obtain the information you want.
• However, you must disclose the methods
you used. In unusual cases, you can keep
some technique secret from your peers,
with my approval, for a limited amount
of time.
Cryptography
The aim is to hide the
meaning of the message
rather than its presence.
This can be done by
scrambling the letters
around.
Transposition Ciphers
Make an anagram according to a
straightforward system (404 BCE):
The sender winds a piece of cloth or
leather on the scytale and writes the
message along the length of the
scytale. Then unwinds the strip,
which now appears to carry a list of
meaningless letters. The messenger
would take the leather strip
(sometime wearing it as a belt) and
when he arrives at his destination,
the receiver winds the strip back on
a scytale of the same diameter.
Transposition Ciphers
Rail fence transposition:
Round and round the mulberry bush the monkey chased
the weasel
r u d n r u d h m l e r b s t e o k y h s d h w a e
o n a d o n t e u b r y u h h m n e c a e t e e s l
Becomes:
rudnrudhmlerbsteokyhsdhwaeonadonteubryuhhmneca
eteesl
Simple Transposition
• Simple Columnar Transposition
• The key information is the number k of
columns.
• Encipherment: Plaintext is written in lines k
letters wide and then transcribed column by
column left to right to produce ciphertext.
This and the next few slides copied from:
http://www.rhodes.edu/mathcs/faculty/barr/Math103CUSummer04/TranspositionSlides.pdf
Simple Transposition: example
“April come she will
When streams are ripe and swelled
with rain”
Convert to a transposition cipher
using k=10
Simple Transposition: example
1234567890
APRILCOMES
HEWILLWHEN
STREAMSARE
RIPEANDSWE
LLEDWITHRA
IN
AHSRL IPETI LNRWR
PEIIE EDLLA AWCLM
NIOWS DTMHA SHEER
WRSNE EA
Simple Transposition
• Decipherment: If n is the length of the ciphertext,it is
written column by column left to right down in a k
×(n DIV k )rectangular array with a “tail ” of length n
MOD k as shown. Transcribing row by row produces
plaintext.
M E S S A G E
A N D M O R E
A N D S T I L
L M O R E U N
T I L I T E N
D S
The message is n=37
letters long. It is set up
in k=7 columns. So there
are
37 DIV 7 = 5 rows
and the tail is
37 mod 7 = 2
HW#2a
1. Given the message
NNDATEAOIIOTINHRNNODTHSGAECSUIHEMENI
ECSTIWORSGAISYNOROINNETGREUNODNUILDS
CRCTP
with k=8: Decipher it.
HW#2a
2. Encipher 3 messages with with some value of k.
Now the groups swap messages and are given the
value of k. Decipher the messages.
3. Encipher a message with a value of k between 2
and 10 and swap ciphers. Now swap messages,
without sharing the value of k. Now decipher
the message . . .
Transposition Ciphers
A double transposition offers more
security:
rudnrudhmlerbsteokyhsdhwaeonadonteubryuhhmnecaeteesl
Becomes
unuhlrsekhdwendnebyhmeatelrdrdmebtoyshaoaoturuhncees
Column Transposition
A G A M E M N O N key phrase
1 4 2 5 3 6 7 9 8 convert to numbers
ABCDEFGHIJKLMNOPQRSTUVWXYZ
AEGMNO delete the letters not used
134579 assign them numbers
2 68 according to how they appear
Example from http://hem.passagen.se/tan01/transpo.html
Column Transposition
A G A M E M N O N key phrase
1 4 2 5 3 6 7 9 8 convert to numbers
s e n d a r m o u
r e d c a r t o h
e a d q u a r t e
r s j * * * * * *
The code is then
Srer-nddj-aau-eeas-dcq-rra-mtr-uhe-oot
Double Column Transposition
M Y C E N A E key phrase
5 7 2 3 6 1 4 convert to numbers
s r e r n d d
j a a u e e a
s d c q r r a
m t r u h e o
o t
The code is then
DEREE ACRRU QUDAA OSJSM ONERH RADTT
Transposition Grille
Example from http://hem.passagen.se/tan01/transpo.html
Transposition Grille
We need
more
machine
gun
ammunition
fast xx
Transposition Grille
Transposition
How do you get back to where you started?
Reverse the process.
Secure transmission
Steganography cryptography
Transposition Substitution
HW #2b
• Use each of the transposition ciphers we
talked about today to encode your own
messages. Now swap them and (without
sharing the key, or even the method of
encryption) try to decipher them.
http://math.ucsd.edu/~crypto/java/EARLYCIPHERS/RectTran.html
Don’t feel bad if you can’t decipher. It is hard, that’s the point!
• Look online for tools to help decipher
transposition cipher and use them.

More Related Content

Similar to new.technique.column transposional CTi college.ppt

CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18
jemtallon
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
BARATH800940
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
maninthemirrorrror
 

Similar to new.technique.column transposional CTi college.ppt (20)

CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
RSA.ppt
RSA.pptRSA.ppt
RSA.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Perly Parallel Processing of Fixed Width Data Records
Perly Parallel Processing of Fixed Width Data RecordsPerly Parallel Processing of Fixed Width Data Records
Perly Parallel Processing of Fixed Width Data Records
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Unit – III.pptx
Unit – III.pptxUnit – III.pptx
Unit – III.pptx
 
Lecture6 rsa
Lecture6 rsaLecture6 rsa
Lecture6 rsa
 

More from halosidiq1 (11)

my net security and its models which are explained here
my net security and its models which are explained heremy net security and its models which are explained here
my net security and its models which are explained here
 
row.coliumn,transitio,.Polyetchnical.colleage.ppt
row.coliumn,transitio,.Polyetchnical.colleage.pptrow.coliumn,transitio,.Polyetchnical.colleage.ppt
row.coliumn,transitio,.Polyetchnical.colleage.ppt
 
symet.crypto.hill.cipher.2023.ppt
symet.crypto.hill.cipher.2023.pptsymet.crypto.hill.cipher.2023.ppt
symet.crypto.hill.cipher.2023.ppt
 
CTI.Vigenir Cipher.pptx
CTI.Vigenir Cipher.pptxCTI.Vigenir Cipher.pptx
CTI.Vigenir Cipher.pptx
 
my lecture 21.network security.2023.ppt
my lecture 21.network security.2023.pptmy lecture 21.network security.2023.ppt
my lecture 21.network security.2023.ppt
 
My Project on Cryptograpghy.2023.ppt
My Project on Cryptograpghy.2023.pptMy Project on Cryptograpghy.2023.ppt
My Project on Cryptograpghy.2023.ppt
 
my.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxmy.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptx
 
MyCryptography.2023.ppt
MyCryptography.2023.pptMyCryptography.2023.ppt
MyCryptography.2023.ppt
 
MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppt
 
new.deadlock.ppt
new.deadlock.pptnew.deadlock.ppt
new.deadlock.ppt
 
CNF.Chap.5.pptx
CNF.Chap.5.pptxCNF.Chap.5.pptx
CNF.Chap.5.pptx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

new.technique.column transposional CTi college.ppt

  • 2. Course structure • Format: Part lecture, part group activities • HW: – Daily assignments, some in-class and some take home. Keep these in a portfolio. – One 7-10 page essay on a related topic of your choice. Final project and presentation (you propose the topic and format) – Final grade will be determined by portfolio of work including the above.
  • 3. Expectations • Most work should be typed. Even work done in class should (usually) be typed and added to portfolio. • Attendance is mandatory. • Respectful behavior to your peers. • Your day is devoted to this class.
  • 4. General Rules • When decrypting or deciphering, all tools are fair. You may do anything legal to obtain the information you want. • However, you must disclose the methods you used. In unusual cases, you can keep some technique secret from your peers, with my approval, for a limited amount of time.
  • 5. Cryptography The aim is to hide the meaning of the message rather than its presence. This can be done by scrambling the letters around.
  • 6. Transposition Ciphers Make an anagram according to a straightforward system (404 BCE): The sender winds a piece of cloth or leather on the scytale and writes the message along the length of the scytale. Then unwinds the strip, which now appears to carry a list of meaningless letters. The messenger would take the leather strip (sometime wearing it as a belt) and when he arrives at his destination, the receiver winds the strip back on a scytale of the same diameter.
  • 7. Transposition Ciphers Rail fence transposition: Round and round the mulberry bush the monkey chased the weasel r u d n r u d h m l e r b s t e o k y h s d h w a e o n a d o n t e u b r y u h h m n e c a e t e e s l Becomes: rudnrudhmlerbsteokyhsdhwaeonadonteubryuhhmneca eteesl
  • 8. Simple Transposition • Simple Columnar Transposition • The key information is the number k of columns. • Encipherment: Plaintext is written in lines k letters wide and then transcribed column by column left to right to produce ciphertext. This and the next few slides copied from: http://www.rhodes.edu/mathcs/faculty/barr/Math103CUSummer04/TranspositionSlides.pdf
  • 9. Simple Transposition: example “April come she will When streams are ripe and swelled with rain” Convert to a transposition cipher using k=10
  • 11. Simple Transposition • Decipherment: If n is the length of the ciphertext,it is written column by column left to right down in a k ×(n DIV k )rectangular array with a “tail ” of length n MOD k as shown. Transcribing row by row produces plaintext. M E S S A G E A N D M O R E A N D S T I L L M O R E U N T I L I T E N D S The message is n=37 letters long. It is set up in k=7 columns. So there are 37 DIV 7 = 5 rows and the tail is 37 mod 7 = 2
  • 12. HW#2a 1. Given the message NNDATEAOIIOTINHRNNODTHSGAECSUIHEMENI ECSTIWORSGAISYNOROINNETGREUNODNUILDS CRCTP with k=8: Decipher it.
  • 13. HW#2a 2. Encipher 3 messages with with some value of k. Now the groups swap messages and are given the value of k. Decipher the messages. 3. Encipher a message with a value of k between 2 and 10 and swap ciphers. Now swap messages, without sharing the value of k. Now decipher the message . . .
  • 14. Transposition Ciphers A double transposition offers more security: rudnrudhmlerbsteokyhsdhwaeonadonteubryuhhmnecaeteesl Becomes unuhlrsekhdwendnebyhmeatelrdrdmebtoyshaoaoturuhncees
  • 15. Column Transposition A G A M E M N O N key phrase 1 4 2 5 3 6 7 9 8 convert to numbers ABCDEFGHIJKLMNOPQRSTUVWXYZ AEGMNO delete the letters not used 134579 assign them numbers 2 68 according to how they appear Example from http://hem.passagen.se/tan01/transpo.html
  • 16. Column Transposition A G A M E M N O N key phrase 1 4 2 5 3 6 7 9 8 convert to numbers s e n d a r m o u r e d c a r t o h e a d q u a r t e r s j * * * * * * The code is then Srer-nddj-aau-eeas-dcq-rra-mtr-uhe-oot
  • 17. Double Column Transposition M Y C E N A E key phrase 5 7 2 3 6 1 4 convert to numbers s r e r n d d j a a u e e a s d c q r r a m t r u h e o o t The code is then DEREE ACRRU QUDAA OSJSM ONERH RADTT
  • 18. Transposition Grille Example from http://hem.passagen.se/tan01/transpo.html
  • 21. Transposition How do you get back to where you started? Reverse the process.
  • 23. HW #2b • Use each of the transposition ciphers we talked about today to encode your own messages. Now swap them and (without sharing the key, or even the method of encryption) try to decipher them. http://math.ucsd.edu/~crypto/java/EARLYCIPHERS/RectTran.html Don’t feel bad if you can’t decipher. It is hard, that’s the point! • Look online for tools to help decipher transposition cipher and use them.