SlideShare a Scribd company logo
1 of 30
The Rail-Fence Cipher
Matt Brems
Melissa Hannebaum
Franklin College
Cryptology
Be
Rational.
Get
Real.
Methods of Character Encryption
Substitution Transposition
Plaintext
Ciphertext
Methods of Character Encryption
Substitution
Plaintext
Ciphertext
Part
Of
Key
Methods of Character Encryption
Transposition
Plaintext
Ciphertext
Transposition Cipher
• Columnar
• A method of encryption in which the plaintext
is shifted according to a regular system, so
that the ciphertext constitutes a permutation
of the plaintext.
Columnar Transposition As A Function
f(x) = y
Columnar Transposition As A Function
Transposition Cipher
Plaintext
Ciphertext
Columnar Transposition As A Function
• The columnar transposition cipher uses a
bijective (one-to-one and onto) function to
encrypt the text and an inverse function to
decrypt the text.
Columnar Transposition
• Three Columns
C = 3
Rail-Fence Cipher
• Two Columns
• C = 2
Rail-Fence Cipher
• C = 2
Selected Formulas
Rail-Fence Cipher
Rail-Fence Cipher
• 4 permutations
• Conjecture: Length n
implies order (n-1)
Rail-Fence Cipher
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
F A K I C L E E A H N C M U I G R N L N O L G M T A D O P T N !
F K C E A N M I R L O G T D P N A I L E H C U G N N L M A O T !
F C A M R O T P A L H U N L A T K E N I L G D N I E C G N M O !
F A R T A H N A K N L D I C N O C M O P L U L T E I G N E G M !
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
Rail-Fence Cipher
• Length of plaintext = 5
• Cycles of characters
• Can be numerous cycles
in one encryption
0 1 2 3 4
0 1 2 3 4
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length = 16
F R A N K L I N C O L L E G E !
F A K I C L E E R N L N O L G !
Length Cycle
2 1
3 2
4 2
5 4
6 4
7 3
8 3
9 6, 2
10 6, 2
Length Cycle
11 10
12 10
13 12
14 12
15 4, 2
16 4, 2
32 5
49 21
64 6
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
F A K I C L E E A H N C M U I G R N L N O L G M T A D O P T N !
F K C E A N M I R L O G T D P N A I L E H C U G N N L M A O T !
F C A M R O T P A L H U N L A T K E N I L G D N I E C G N M O !
F A R T A H N A K N L D I C N O C M O P L U L T E I G N E G M !
F R A N K L I N C O L L E G E M A T H A N D C O M P U T I N G !
Primes
General Rules
Answered Questions
• What are the fixed points in a RFC?
• What are the fixed points in a general CTC?
• Can we tell when the RFC has a k-cycle?
Unanswered Questions
• Simple way to calculate length of initial cycle?
• Can we tell when the CTC has a k-cycle?
• How much of this works if C > 2?
Questions?

More Related Content

What's hot

12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Scripting languages
Scripting languagesScripting languages
Scripting languagesteach4uin
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipherAntony Alex
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption TechniqueJohn Adams
 
Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)swapnac12
 
Rotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineRotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineSaurabh Kaushik
 
Integrated Development Environments (IDE)
Integrated Development Environments (IDE) Integrated Development Environments (IDE)
Integrated Development Environments (IDE) SeanPereira2
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 

What's hot (20)

Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Scripting languages
Scripting languagesScripting languages
Scripting languages
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Blowfish Cryptosystem
Blowfish Cryptosystem Blowfish Cryptosystem
Blowfish Cryptosystem
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Asymptotic notation
Asymptotic notationAsymptotic notation
Asymptotic notation
 
Cryptology
CryptologyCryptology
Cryptology
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)
 
Rotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineRotor Cipher and Enigma Machine
Rotor Cipher and Enigma Machine
 
Integrated Development Environments (IDE)
Integrated Development Environments (IDE) Integrated Development Environments (IDE)
Integrated Development Environments (IDE)
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 

Similar to Rail-Fence Cipher Presentation

4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz Kowalczewski4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz KowalczewskiPROIDEA
 
Quantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesQuantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesGokul Alex
 
Ccm mechanical design-presentation
Ccm mechanical design-presentationCcm mechanical design-presentation
Ccm mechanical design-presentationRadi Nasr
 
Hacking the kodak funsaver flash
Hacking the kodak funsaver flashHacking the kodak funsaver flash
Hacking the kodak funsaver flashMechEProdigy
 
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitCanary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitAmazon Web Services
 
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerQuantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerGokul Alex
 

Similar to Rail-Fence Cipher Presentation (9)

4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz Kowalczewski4Developers 2015: Measure to fail - Tomasz Kowalczewski
4Developers 2015: Measure to fail - Tomasz Kowalczewski
 
Measure to fail
Measure to failMeasure to fail
Measure to fail
 
SF2500 brochure
SF2500 brochureSF2500 brochure
SF2500 brochure
 
Quantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different PerspectivesQuantum Meets Blockchain - Different Perspectives
Quantum Meets Blockchain - Different Perspectives
 
Ccm mechanical design-presentation
Ccm mechanical design-presentationCcm mechanical design-presentation
Ccm mechanical design-presentation
 
Hacking the kodak funsaver flash
Hacking the kodak funsaver flashHacking the kodak funsaver flash
Hacking the kodak funsaver flash
 
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitCanary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
 
300k w transmitter
300k w transmitter300k w transmitter
300k w transmitter
 
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerQuantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
 

Rail-Fence Cipher Presentation

Editor's Notes

  1. Column 3 or 4 example like a last name etc Transition to c=2 columnar aka rail fence
  2. Column 3 or 4 example like a last name etc Transition to c=2 columnar aka rail fence
  3. Conjecture only on the last slide
  4. Also only takes 5 (ie conjecture is wrong) How can we know how many? Cycles (answer)
  5. WHAT”S GOING ON WITHIN THE FUNCTION???
  6. N=16
  7. LENGTH OF 3^n etc and prime factors
  8. What we accomplished, add patterns Initial length – check Fixed points – moderate check for RFC Factors PRIMES!! :D REARRANGE