SlideShare a Scribd company logo
1 of 47
Section 2.4
Transposition Ciphers
Practice HW (not to hand in)
From Barr Text
p. 105 # 1 - 6
• Transposition Ciphers are ciphers in which the
plaintext message is rearranged by some
means agree upon by the sender and receiver.
Examples of Transposition Ciphers
1. Scytale Cipher – p. 4 of textbook.
2. ADFGVX – German WWI cipher.
3. Modern Block Ciphers – DES, AES cipher.
Transposition ciphers differ from the
monoalphabetic ciphers (shift, affine, and
substitution) we have studied earlier. In
monoalphabetic ciphers, the letters are changed
by creating a new alphabet (the cipher alphabet)
and assigning new letters. In transposition
ciphers, no new alphabet is created – the letters
of the plaintext are just rearranged is some
fashion.
Simple Types of Transposition Ciphers
1. Rail Fence Cipher – write the plaintext in a zig-
zag pattern in two rows and form the ciphertext
by reading off the letters from the first row
followed by the second.
Example 1: Encipher “CHUCK NORRIS IS A
TOUGH GUY” using a rail fence cipher.
Solution:
Note
To decipher a rail fence cipher, we divide the
ciphertext in half and reverse the order of the
steps of encipherment, that is, write the ciphertext
in two rows and read off the plaintext in a zig-zag
fashion.
Example 2: Decipher the message
“CITAT ODABT UHROE ELNES WOMYE
OGEHW VR” that was enciphered using a rail
fence cipher.
Solution:
2. Simple Columnar Transpositions
Where the message is written horizontally in a
fixed and agreed upon number of columns and
then described letter by letter from the columns
proceeding from left to right. The rail fence cipher
is a special example.
Example 3: Encipher “THE JOKER SAID THAT
IT WAS ALL PART OF THE PLAN” using a
simple 5 column transposition cipher.
Solution:
Example 4: Suppose we want to decipher
“TOTBA AUJAA KMHKO ANTAU FKEEE
LTTYR SRLHJ RDMHO ETEII ”
Solution:
Note
In general, given a simple columnar transposition
with total letters and columns, we use the
division algorithm to divide by to compute . In
tableau form, this looks like:
q
r
qc
n
c

Remainder r
# columns c # letters n
Quotient q
Then, the first r columns contain q+1 letters each
for a total of r (q+1) letters.
The remaining c - r columns have q letters in
each column for a total of (c – r) q total letters.
Example 5: Suppose a simple columnar
transposition is made up of 50 total letter
distributed over 9 columns. Determine the
number of letters in each column that make up
the transposition.
Solution:
Cryptanalysis of Simple Transposition
Ciphers
To try to break a simple transposition cipher, we
try various column numbers for the columnar
transposition until we get a message that makes
sense. Usually, it is better to try column numbers
that evenly divide the number of letters first.
Example 6: Suppose we want to decipher the
message “TSINN RRPTS BOAOI CEKNS
OABE” that we know was enciphered with a
simple transposition cipher with no information
about how many columns that were used.
Solution:
Keyword Columnar Transpositions
To increase security, we would like to “mix” the
columns. The method we use involves choosing a
keyword and using its alphabetical order of its
letters to choose the columns of the ciphertext.
Note
• Sometimes (not always) a sender and recipient
will pad the message to make it a multiple of
the number of letters in the keyword.
NOTE!!
• In a keyword columnar transposition ciphers,
the keyword in NOT is not a part of the
ciphertext. This differs from keyword columnar
substitution ciphers (studied in Section 2.3),
where the keyword is included in the cipher
alphabet.
Example 7: Use the keyword “BARNEY” to
encipher the message “ANDY GRIFFITHS
DEPUTY WAS BARNEY FIFE” for a keyword
columnar transposition.
Solution:
NOTE!!
• In a keyword columnar transposition, if one
letter is repeated in the keyword, we order the
repeated ciphertext columns from left to right.
Example 8: For Exercise 4 on p. 106, the
keyword is ALGEBRA. Determine the order the
ciphertext columns would be accessed for a
message encipherment.
Solution:
Example 9: Suppose we receive the message
“ADDSH BGSAR OLGNN VCAII SFWDI
AOTRN LSAUF RLLWL OENWE HIC”
that was enciphered using a keyword columnar
transposition with keyword “GILLIGAN”. Decipher
this message.
Solution: Since this message has 48 total letters
and the keyword has 8 letters, each column
under each keyword letter in the columnar
transposition process will have total letters.
Using the alphabetical order of the keyword
letters (keeping in mind that under the repeated
letters I and L the columns are ordered from left
to right), we can by placing the numbered
sequence of letters from the ciphertext:
6
8
48

under the corresponding matching keyword letter
column number(the alphabetical ordering) to get the
following array:
(2) (4) (6) (7) (5) (3) (1) (8)
G I L L I G A N
G I L L I G A N
S I S L A N D W
A S A W O N D E
R F U L T V S H
O W F O R C H I
L D R E N A B C








































(8)
NWEHIC
(7)
LLWLOE
)
6
(
LSAUFR
(5)
IAOTRN
(4)
IISFWD
(3)
GNNVCA
(2)
GSAROL
(1)
ADDSHB
Hence the plaintext message is:
“GILLIGANS ISLAND WAS A WONDERFUL
TV SHOW FOR CHILDREN”
(note that the ABC was padded to the message
in the original encipherment to ensure that the
column lengths were equal). █
Cryptanalysis of Keyword Columnar
Transpositions
1. If the number of letters in the ciphertext is a
multiple of the keyword length, one can
rearrange (anagram) the columns until a
legible English message is produced – see
Example 2.4.5, p. 101 in the Barr text.
2. If not, if we know some of the original plaintext
(call a crib) beforehand, we can decipher the
message. Example 10 illustrates this method.
Example 10: Suppose the message
AHLCC MSOAO NMSSS MTSSI AASDI
NRVLF WANTO ETTIA IOERI HLEYL
AECVL W
was enciphered using a keyword columnar
transposition and we know that the word
“THE FAMILY”
is a part of the plaintext. Decipher this
message.
Solution: In the deciphering process, we will
assume that the keyword that was used to
encipher the message in the keyword columnar
transposition is shorter than the known word
(crib) given in the plaintext. Noting that the known
word

 

 

letters
9
THEFAMILY
is 9 letters long, we first assume that the keyword
used is one less than this, that is, we assume that
it is 8 letters long. If his is so, then the keyword
columnar transposition will have 8 columns and
the crib will appear in the columns in the form
similar to
T H E F A M I L
Y
If the crib appeared in this fashion, then the
digraph “TY” would appear in the ciphertext.
Since it does not, we will assume the keyword
used in the columnar transposition has one less
letter, that is, we assume that it is 7 letters long.
Then the keyword columnar transposition will
have 7 columns and the crib appears as
T H E F A M I
L Y
which says that the digraphs TL and HY occur in
the ciphertext. Since this does not occur, we
assume the keyword used was 6 letters long.
Hence, the crib appears as
T H E F A M
I L Y
One can see that the digraphs TI, HL, and EY all
occur in the ciphertext. This says that the
keyword is likely 6 characters long and hence 6
columns were used to create the ciphertext in the
keyword columnar transposition. If we divide the
total number of ciphertext letters (n = 56) by this
number of columns (c = 6), we see by the division
algorithm that
2
6
9
56 


Hence, the quotient is q = 9 and the remainder is
r = 2. Thus, in the columnar transposition, there
are r = 2 columns with q + 1 = 10 characters and
c – r = 6 – 2 = 4 columns with q = 9 characters.
We now align the ciphertext into groups of 9
letters, which are numbered below:
AHLCCMSOA ONMSSSMTS SIAASDINR
(1) (2) (3)
VLFWANTOE TTIAIOERI HLEYLAECV LW
(4) (5) (6) (7)
Next, we attempt to spell out the crib while lining
up the digraphs TI, HL, and EY that occur. Doing
this gives
(5) (1) (6) (4) (3) (2) (7)
H V S O L
T A L L I N W
T H E F A M
I L Y W A S
A C L A S S
I C A N D S
O M E T I M
E S C O N T
R O V E R S
I A
Rearranging the letters and using the remaining letters
given by group (7), we obtain
(5) (1) (6) (4) (3) (2)
A L L I N
T H E F A M
I L Y W A S
A C L A S S
I C A N D S
O M E T I M
E S C O N T
R O V E R S
I A L T V S
H O W
Hence, the message is “ALL IN THE FAMILY
WAS A CLASSIC AND SOMETIMES
CONTROVERSIAL TV SHOW”.

More Related Content

Similar to row.coliumn,transitio,.Polyetchnical.colleage.ppt

crypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdfcrypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdfMajidMumtaz3
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersAswathi Nair
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.pptutsavkakkad1
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Mark Morris
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdfMeera357768
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programmingShaishavShah8
 
N_Asm Assembly strings (sol)
N_Asm Assembly strings (sol)N_Asm Assembly strings (sol)
N_Asm Assembly strings (sol)Selomon birhane
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipherVaibhav Khanna
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid) Shafiqah Emilia
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherSHUBHA CHATURVEDI
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxBhavikaGianey
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answersprdpgpt
 
Understanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding theUnderstanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding thecorbing9ttj
 

Similar to row.coliumn,transitio,.Polyetchnical.colleage.ppt (20)

crypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdfcrypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdf
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
unit -1.ppt
unit -1.pptunit -1.ppt
unit -1.ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Ch02
Ch02Ch02
Ch02
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
N_Asm Assembly strings (sol)
N_Asm Assembly strings (sol)N_Asm Assembly strings (sol)
N_Asm Assembly strings (sol)
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
34900121037.pdf
34900121037.pdf34900121037.pdf
34900121037.pdf
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptx
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
Understanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding theUnderstanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding the
 

More from halosidiq1

my net security and its models which are explained here
my net security and its models which are explained heremy net security and its models which are explained here
my net security and its models which are explained herehalosidiq1
 
new.technique.column transposional CTi college.ppt
new.technique.column transposional CTi college.pptnew.technique.column transposional CTi college.ppt
new.technique.column transposional CTi college.ppthalosidiq1
 
symet.crypto.hill.cipher.2023.ppt
symet.crypto.hill.cipher.2023.pptsymet.crypto.hill.cipher.2023.ppt
symet.crypto.hill.cipher.2023.ppthalosidiq1
 
CTI.Vigenir Cipher.pptx
CTI.Vigenir Cipher.pptxCTI.Vigenir Cipher.pptx
CTI.Vigenir Cipher.pptxhalosidiq1
 
my lecture 21.network security.2023.ppt
my lecture 21.network security.2023.pptmy lecture 21.network security.2023.ppt
my lecture 21.network security.2023.ppthalosidiq1
 
My Project on Cryptograpghy.2023.ppt
My Project on Cryptograpghy.2023.pptMy Project on Cryptograpghy.2023.ppt
My Project on Cryptograpghy.2023.ppthalosidiq1
 
my.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxmy.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxhalosidiq1
 
MyCryptography.2023.ppt
MyCryptography.2023.pptMyCryptography.2023.ppt
MyCryptography.2023.ppthalosidiq1
 
MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppthalosidiq1
 
new.deadlock.ppt
new.deadlock.pptnew.deadlock.ppt
new.deadlock.ppthalosidiq1
 
CNF.Chap.5.pptx
CNF.Chap.5.pptxCNF.Chap.5.pptx
CNF.Chap.5.pptxhalosidiq1
 

More from halosidiq1 (11)

my net security and its models which are explained here
my net security and its models which are explained heremy net security and its models which are explained here
my net security and its models which are explained here
 
new.technique.column transposional CTi college.ppt
new.technique.column transposional CTi college.pptnew.technique.column transposional CTi college.ppt
new.technique.column transposional CTi college.ppt
 
symet.crypto.hill.cipher.2023.ppt
symet.crypto.hill.cipher.2023.pptsymet.crypto.hill.cipher.2023.ppt
symet.crypto.hill.cipher.2023.ppt
 
CTI.Vigenir Cipher.pptx
CTI.Vigenir Cipher.pptxCTI.Vigenir Cipher.pptx
CTI.Vigenir Cipher.pptx
 
my lecture 21.network security.2023.ppt
my lecture 21.network security.2023.pptmy lecture 21.network security.2023.ppt
my lecture 21.network security.2023.ppt
 
My Project on Cryptograpghy.2023.ppt
My Project on Cryptograpghy.2023.pptMy Project on Cryptograpghy.2023.ppt
My Project on Cryptograpghy.2023.ppt
 
my.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptxmy.Light weight cryptography.2023.pptx
my.Light weight cryptography.2023.pptx
 
MyCryptography.2023.ppt
MyCryptography.2023.pptMyCryptography.2023.ppt
MyCryptography.2023.ppt
 
MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppt
 
new.deadlock.ppt
new.deadlock.pptnew.deadlock.ppt
new.deadlock.ppt
 
CNF.Chap.5.pptx
CNF.Chap.5.pptxCNF.Chap.5.pptx
CNF.Chap.5.pptx
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

row.coliumn,transitio,.Polyetchnical.colleage.ppt

  • 1. Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 # 1 - 6
  • 2. • Transposition Ciphers are ciphers in which the plaintext message is rearranged by some means agree upon by the sender and receiver.
  • 3. Examples of Transposition Ciphers 1. Scytale Cipher – p. 4 of textbook. 2. ADFGVX – German WWI cipher. 3. Modern Block Ciphers – DES, AES cipher.
  • 4. Transposition ciphers differ from the monoalphabetic ciphers (shift, affine, and substitution) we have studied earlier. In monoalphabetic ciphers, the letters are changed by creating a new alphabet (the cipher alphabet) and assigning new letters. In transposition ciphers, no new alphabet is created – the letters of the plaintext are just rearranged is some fashion.
  • 5. Simple Types of Transposition Ciphers 1. Rail Fence Cipher – write the plaintext in a zig- zag pattern in two rows and form the ciphertext by reading off the letters from the first row followed by the second.
  • 6. Example 1: Encipher “CHUCK NORRIS IS A TOUGH GUY” using a rail fence cipher. Solution:
  • 7. Note To decipher a rail fence cipher, we divide the ciphertext in half and reverse the order of the steps of encipherment, that is, write the ciphertext in two rows and read off the plaintext in a zig-zag fashion.
  • 8. Example 2: Decipher the message “CITAT ODABT UHROE ELNES WOMYE OGEHW VR” that was enciphered using a rail fence cipher. Solution:
  • 9.
  • 10. 2. Simple Columnar Transpositions Where the message is written horizontally in a fixed and agreed upon number of columns and then described letter by letter from the columns proceeding from left to right. The rail fence cipher is a special example.
  • 11. Example 3: Encipher “THE JOKER SAID THAT IT WAS ALL PART OF THE PLAN” using a simple 5 column transposition cipher. Solution:
  • 12.
  • 13. Example 4: Suppose we want to decipher “TOTBA AUJAA KMHKO ANTAU FKEEE LTTYR SRLHJ RDMHO ETEII ” Solution:
  • 14.
  • 15.
  • 16. Note In general, given a simple columnar transposition with total letters and columns, we use the division algorithm to divide by to compute . In tableau form, this looks like: q r qc n c  Remainder r # columns c # letters n Quotient q
  • 17. Then, the first r columns contain q+1 letters each for a total of r (q+1) letters. The remaining c - r columns have q letters in each column for a total of (c – r) q total letters.
  • 18. Example 5: Suppose a simple columnar transposition is made up of 50 total letter distributed over 9 columns. Determine the number of letters in each column that make up the transposition. Solution:
  • 19.
  • 20. Cryptanalysis of Simple Transposition Ciphers To try to break a simple transposition cipher, we try various column numbers for the columnar transposition until we get a message that makes sense. Usually, it is better to try column numbers that evenly divide the number of letters first.
  • 21. Example 6: Suppose we want to decipher the message “TSINN RRPTS BOAOI CEKNS OABE” that we know was enciphered with a simple transposition cipher with no information about how many columns that were used. Solution:
  • 22.
  • 23.
  • 24.
  • 25. Keyword Columnar Transpositions To increase security, we would like to “mix” the columns. The method we use involves choosing a keyword and using its alphabetical order of its letters to choose the columns of the ciphertext.
  • 26. Note • Sometimes (not always) a sender and recipient will pad the message to make it a multiple of the number of letters in the keyword.
  • 27. NOTE!! • In a keyword columnar transposition ciphers, the keyword in NOT is not a part of the ciphertext. This differs from keyword columnar substitution ciphers (studied in Section 2.3), where the keyword is included in the cipher alphabet.
  • 28. Example 7: Use the keyword “BARNEY” to encipher the message “ANDY GRIFFITHS DEPUTY WAS BARNEY FIFE” for a keyword columnar transposition. Solution:
  • 29.
  • 30. NOTE!! • In a keyword columnar transposition, if one letter is repeated in the keyword, we order the repeated ciphertext columns from left to right.
  • 31. Example 8: For Exercise 4 on p. 106, the keyword is ALGEBRA. Determine the order the ciphertext columns would be accessed for a message encipherment. Solution:
  • 32. Example 9: Suppose we receive the message “ADDSH BGSAR OLGNN VCAII SFWDI AOTRN LSAUF RLLWL OENWE HIC” that was enciphered using a keyword columnar transposition with keyword “GILLIGAN”. Decipher this message.
  • 33. Solution: Since this message has 48 total letters and the keyword has 8 letters, each column under each keyword letter in the columnar transposition process will have total letters. Using the alphabetical order of the keyword letters (keeping in mind that under the repeated letters I and L the columns are ordered from left to right), we can by placing the numbered sequence of letters from the ciphertext: 6 8 48 
  • 34. under the corresponding matching keyword letter column number(the alphabetical ordering) to get the following array: (2) (4) (6) (7) (5) (3) (1) (8) G I L L I G A N G I L L I G A N S I S L A N D W A S A W O N D E R F U L T V S H O W F O R C H I L D R E N A B C                                         (8) NWEHIC (7) LLWLOE ) 6 ( LSAUFR (5) IAOTRN (4) IISFWD (3) GNNVCA (2) GSAROL (1) ADDSHB
  • 35. Hence the plaintext message is: “GILLIGANS ISLAND WAS A WONDERFUL TV SHOW FOR CHILDREN” (note that the ABC was padded to the message in the original encipherment to ensure that the column lengths were equal). █
  • 36. Cryptanalysis of Keyword Columnar Transpositions 1. If the number of letters in the ciphertext is a multiple of the keyword length, one can rearrange (anagram) the columns until a legible English message is produced – see Example 2.4.5, p. 101 in the Barr text. 2. If not, if we know some of the original plaintext (call a crib) beforehand, we can decipher the message. Example 10 illustrates this method.
  • 37. Example 10: Suppose the message AHLCC MSOAO NMSSS MTSSI AASDI NRVLF WANTO ETTIA IOERI HLEYL AECVL W was enciphered using a keyword columnar transposition and we know that the word “THE FAMILY” is a part of the plaintext. Decipher this message.
  • 38. Solution: In the deciphering process, we will assume that the keyword that was used to encipher the message in the keyword columnar transposition is shorter than the known word (crib) given in the plaintext. Noting that the known word        letters 9 THEFAMILY
  • 39. is 9 letters long, we first assume that the keyword used is one less than this, that is, we assume that it is 8 letters long. If his is so, then the keyword columnar transposition will have 8 columns and the crib will appear in the columns in the form similar to T H E F A M I L Y
  • 40. If the crib appeared in this fashion, then the digraph “TY” would appear in the ciphertext. Since it does not, we will assume the keyword used in the columnar transposition has one less letter, that is, we assume that it is 7 letters long. Then the keyword columnar transposition will have 7 columns and the crib appears as T H E F A M I L Y
  • 41. which says that the digraphs TL and HY occur in the ciphertext. Since this does not occur, we assume the keyword used was 6 letters long. Hence, the crib appears as T H E F A M I L Y
  • 42. One can see that the digraphs TI, HL, and EY all occur in the ciphertext. This says that the keyword is likely 6 characters long and hence 6 columns were used to create the ciphertext in the keyword columnar transposition. If we divide the total number of ciphertext letters (n = 56) by this number of columns (c = 6), we see by the division algorithm that 2 6 9 56   
  • 43. Hence, the quotient is q = 9 and the remainder is r = 2. Thus, in the columnar transposition, there are r = 2 columns with q + 1 = 10 characters and c – r = 6 – 2 = 4 columns with q = 9 characters. We now align the ciphertext into groups of 9 letters, which are numbered below:
  • 44. AHLCCMSOA ONMSSSMTS SIAASDINR (1) (2) (3) VLFWANTOE TTIAIOERI HLEYLAECV LW (4) (5) (6) (7)
  • 45. Next, we attempt to spell out the crib while lining up the digraphs TI, HL, and EY that occur. Doing this gives (5) (1) (6) (4) (3) (2) (7) H V S O L T A L L I N W T H E F A M I L Y W A S A C L A S S I C A N D S O M E T I M E S C O N T R O V E R S I A
  • 46. Rearranging the letters and using the remaining letters given by group (7), we obtain (5) (1) (6) (4) (3) (2) A L L I N T H E F A M I L Y W A S A C L A S S I C A N D S O M E T I M E S C O N T R O V E R S I A L T V S H O W
  • 47. Hence, the message is “ALL IN THE FAMILY WAS A CLASSIC AND SOMETIMES CONTROVERSIAL TV SHOW”.