SlideShare a Scribd company logo
1 of 29
Security
Lecture 2
Types of cryptography
Symmetric key
cryptography
ASymmetric key
cryptography
Cryptography
Symmetric Key Cryptography
• Same key is used for encryption and decryption is called symmetric key cryptography. It
is also known as secret key cryptography.
•
• Elements of Symmetric Key Cryptography
• Plaintext is the original message or data that is fed into the algorithm as input.
• Encryption algorithm performs various substitutions and transformations on the
plaintext.
• Secret key is a value independent of the plaintext and of the algorithm. The exact
substitutions and transformations performed by the algorithm depend on the key.
• Ciphertext is the unreadable message produced as output. It depends on the plain text
and secret key.
• Decryption algorithm takes the cipher text and the secret key and produces the original
plain text.
Symmetric Key Cryptography
• Same key is used for encryption and decryption process. So, it is
called symmetric cipher.
Figure: Symmetric Key Cryptography
Symmetric Key Cryptography
Mathematically it is represented as
For Encryption, Y = E (K, X)
For Decryption, X = D (K, Y)
where Y = Cipher text, X = Plain Text, E = encryption, D = Decryption, K = Secret shared key.
For example, Data Encryption Standards (DES), Advanced Encryption Standards (AES) and
BLOWFISH.
Types of symmetric cipher
There are basically two types of symmetric cipher: Substitution Cipher,
Transposition Cipher.
Substitution Cipher: A substitution is a technique in which each letter or bit of
the plaintext is substituted or replaced by some other letter, number or
symbol to produce cipher text. For Example, ABC ⟹ XYZ.
Types of Substitution Cipher: Caesar Cipher, Monoalphabetic Cipher, Vigenère
Cipher, Playfair Cipher, One time pad cipher (Vernam cipher), Hill Cipher.
Transposition Cipher: In transposition technique, there is no replacement of
alphabets or numbers occurs instead their positions are changed or reordering
of position of plain text is done to produce cipher text. For Example,
ABCDE ⟹ BADEC.
Types of Transposition Cipher: Rail Fence Cipher, Columnar Transposition Cipher.
Caesar cipher
• Caesar cipher is type of substitution cipher.
• This technique was found by Julius Caesar.
• This technique is very simple and easy to generate cipher of given
plain text.
• This technique is also known as shift cipher.
Caesar cipher
• Step-1: The encryption can also be represented using modular
arithmetic by first transforming the letters into numbers, according to
the scheme, a = 0, b= 1, ..., z = 25. Encryption of a letter (C) by a shift
(E)can be described mathematically.
• Generalise equation of Caesar cipher (Encryption & Decryption):
• C = E (K, P) = (P + K) mod 26
• P = D (K, C) = (C – K) mod 26
• Where, C = Ciphertext, P = Plain Text, E = Encryption, D = Decryption,
K = Key.
Caesar cipher
• Step-2: The transformation can be represented by aligning two
alphabets; the cipher alphabet is the plain alphabet shift left or right
by some number of positions. For instance, here is a Caesar cipher
using a shifted of three places. (Here key is 3).
Caesar cipher
Monoalphabetic and polyalphabetic
• Monoalphabetic and polyalphabetic both are types of substitution
cipher.
• Monoalphabetic cipher: It is a technique in which only one character
convert from plain text to cipher text.
• For example, Caesar cipher.
• Polyalphabetic Cipher: It is a technique in which more than one
(multiple) character convert from plain text to cipher text.
• For example, Playfair cipher, Vigenère cipher, hill cipher, one time pad
cipher.
Playfair Cipher
• Playfair cipher is type of substitution cipher.
• It is also called polyalphabetic substitution cipher.
• In this cipher techniques, more than one character is used during
encryption/decryption. So, this cipher technique is called multiple
substitution cipher technique.
• Input of this technique are keyword and plain text.
• Keyword is one type of string.
Playfair Cipher
• Rules of encryption is as follows:
• Step-1: Construct 5x5 matrix of given keyword(key). The letter “I” and
“J” will be consider as one letter. So, if “I” is already placed then no
need to place “J” in rest of matrix. (Or write I/J).
• For Example, Keyword = MONARCHY
• Step-2: If any characters are to be repeated in given keyword, used it
only once during matrix filling.
• For Example, Keyword = PLAYFAIR
Playfair Cipher
Playfair Cipher
• Step-3: Plain text is broken down into groups of two alphabets. There are two
possibilities.
• Possibility-1: Plain text message that we want to encrypt broken down into groups of two
alphabets. (Make pair of two alphabets of given plain text)
• For Example, MY NAME IS MAHI
• Plain text: MY NA ME IS MA HI
• Possibility-2: If both alphabets are the same (or only one is left) in plain text, add an X
after the first alphabet. Encrypt the new pair and continue.
• For Example, GREEN
• Plain text: GR EX EN
• For Example, NETWORK
• Plain text: NE TW OR KX
• Step-4: When pair of plain text will be encrypt using matrix, there are 3 possibilities.
Playfair Cipher
• Possibility-1: If the alphabets are not in the same row or column,
replace them with the alphabets in the same row respectively, but at
the other pair of corners of the rectangle defined by the original pair.
Playfair Cipher
• Possibility-2: If both the alphabets in the pair appear in the same row
of matrix, replace them with alphabets to their immediate
right respectively.
• If the original pair is on the right side of the row,
then wrapping around to the left side of the row happens.
Playfair Cipher
• Possibility-3: If both alphabets in the pair appear in the same column
of matrix, replace them with alphabets immediate below from
respectively.
• If the original pair is on the bottom side of the column, then wrapping
around to the top side of the column happens.
Vigenère Cipher
• Vigenère Cipher is a method of encrypting alphabetic text.
• It uses a simple form of polyalphabetic substitution.
• A polyalphabetic cipher is any cipher based on substitution, using
multiple substitution alphabets.
• The encryption of the original text is done using the Vigenère square
or Vigenère table.
• The table consists of the alphabets written out 26 times in different
rows, each alphabet shifted cyclically to the left compared to the
previous alphabet.
Vigenère Cipher
Vigenère Cipher
• Rules of encryption is as follows:
• Step-1: Create Vigenère table as per your given keyword. (If Vigenère
table is not given). Given keyword arrange in alphabetical order then
create table as per given below.
Vigenère Cipher
• Step-2: First row represents Plain Text and First
column represents Keyword in Vigenère table.
Vigenère Cipher
• Step-3: In Keyword length is lesser than given plain text then repeat
keyword alphabets until it matches the length of plain text.
Vigenère Cipher
• Step-4: The first letter of the plaintext, “I” is paired with “M”, the first
letter of the key. So, use row “M” and column “I” of the Vigenère
table, it produces cipher text “U” and so on.
One Time Pad Cipher
• One-time pad (OTP), also called Vernam-cipher or the perfect cipher,
is a crypto algorithm where plaintext is combined with a random key.
• The key is at least as long as the message or data that must be
encrypted.
• Each key is used only once, and both sender and receiver must
destroy their key after use.
• There should only be two copies of the key: one for the sender and
one for the receiver.
One Time Pad Cipher
• Rules of encryption is as follows
• Step-1: Assign a number to each character like (a = 0, b = 1, c = 2, … z
= 25). As per given table.
One Time Pad Cipher
• Step-2: Assign a number to each character of plain text and key
according to alphabetical order. (From table of step-1)
One Time Pad Cipher
• Step-3: Add both the number (Corresponding plain-text character
number and Key character number).
One Time Pad Cipher
• Step-4: Subtract the number from 26 if the added number is greater
than 26. otherwise left it. Assign alphabets of numbers, it produces
cipher text.

More Related Content

Similar to security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.

Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques Dr. Kapil Gupta
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentationMuneebZahid10
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programmingShaishavShah8
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Zara Nawaz
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptographyG Prachi
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshopManojit Ballav
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniquesbabak danyal
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.pptGhamdan5
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptjamkhan10
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptvimalguptaofficial
 

Similar to security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher. (20)

Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentation
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
 
Week 5 lec 5 Cryptography.pptx
Week 5 lec 5 Cryptography.pptxWeek 5 lec 5 Cryptography.pptx
Week 5 lec 5 Cryptography.pptx
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
UNIT 2.ppt
UNIT 2.pptUNIT 2.ppt
UNIT 2.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 

More from nagwaAboElenein

Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxnagwaAboElenein
 
Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxnagwaAboElenein
 
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).pptnagwaAboElenein
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxnagwaAboElenein
 
Lec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdfLec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdfnagwaAboElenein
 
Lec_8_Image Compression.pdf
Lec_8_Image Compression.pdfLec_8_Image Compression.pdf
Lec_8_Image Compression.pdfnagwaAboElenein
 
Semantic Segmentation.pdf
Semantic Segmentation.pdfSemantic Segmentation.pdf
Semantic Segmentation.pdfnagwaAboElenein
 
Lec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdfLec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdfnagwaAboElenein
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfnagwaAboElenein
 
Lec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfLec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfnagwaAboElenein
 
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdfImage Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdfnagwaAboElenein
 
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdfFundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdfnagwaAboElenein
 

More from nagwaAboElenein (17)

Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptx
 
Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptx
 
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptx
 
brain tumor.pptx
brain tumor.pptxbrain tumor.pptx
brain tumor.pptx
 
Lec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdfLec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdf
 
Lec_8_Image Compression.pdf
Lec_8_Image Compression.pdfLec_8_Image Compression.pdf
Lec_8_Image Compression.pdf
 
Semantic Segmentation.pdf
Semantic Segmentation.pdfSemantic Segmentation.pdf
Semantic Segmentation.pdf
 
lecture1.pptx
lecture1.pptxlecture1.pptx
lecture1.pptx
 
Lec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdfLec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdf
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdf
 
Lec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfLec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdf
 
Lec_1_Introduction.pdf
Lec_1_Introduction.pdfLec_1_Introduction.pdf
Lec_1_Introduction.pdf
 
Lecture3.pptx
Lecture3.pptxLecture3.pptx
Lecture3.pptx
 
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdfImage Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
 
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdfFundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
 
Lec_1_Introduction.pdf
Lec_1_Introduction.pdfLec_1_Introduction.pdf
Lec_1_Introduction.pdf
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.

  • 2. Types of cryptography Symmetric key cryptography ASymmetric key cryptography Cryptography
  • 3. Symmetric Key Cryptography • Same key is used for encryption and decryption is called symmetric key cryptography. It is also known as secret key cryptography. • • Elements of Symmetric Key Cryptography • Plaintext is the original message or data that is fed into the algorithm as input. • Encryption algorithm performs various substitutions and transformations on the plaintext. • Secret key is a value independent of the plaintext and of the algorithm. The exact substitutions and transformations performed by the algorithm depend on the key. • Ciphertext is the unreadable message produced as output. It depends on the plain text and secret key. • Decryption algorithm takes the cipher text and the secret key and produces the original plain text.
  • 4. Symmetric Key Cryptography • Same key is used for encryption and decryption process. So, it is called symmetric cipher. Figure: Symmetric Key Cryptography
  • 5. Symmetric Key Cryptography Mathematically it is represented as For Encryption, Y = E (K, X) For Decryption, X = D (K, Y) where Y = Cipher text, X = Plain Text, E = encryption, D = Decryption, K = Secret shared key. For example, Data Encryption Standards (DES), Advanced Encryption Standards (AES) and BLOWFISH.
  • 6. Types of symmetric cipher There are basically two types of symmetric cipher: Substitution Cipher, Transposition Cipher. Substitution Cipher: A substitution is a technique in which each letter or bit of the plaintext is substituted or replaced by some other letter, number or symbol to produce cipher text. For Example, ABC ⟹ XYZ. Types of Substitution Cipher: Caesar Cipher, Monoalphabetic Cipher, Vigenère Cipher, Playfair Cipher, One time pad cipher (Vernam cipher), Hill Cipher. Transposition Cipher: In transposition technique, there is no replacement of alphabets or numbers occurs instead their positions are changed or reordering of position of plain text is done to produce cipher text. For Example, ABCDE ⟹ BADEC. Types of Transposition Cipher: Rail Fence Cipher, Columnar Transposition Cipher.
  • 7. Caesar cipher • Caesar cipher is type of substitution cipher. • This technique was found by Julius Caesar. • This technique is very simple and easy to generate cipher of given plain text. • This technique is also known as shift cipher.
  • 8. Caesar cipher • Step-1: The encryption can also be represented using modular arithmetic by first transforming the letters into numbers, according to the scheme, a = 0, b= 1, ..., z = 25. Encryption of a letter (C) by a shift (E)can be described mathematically. • Generalise equation of Caesar cipher (Encryption & Decryption): • C = E (K, P) = (P + K) mod 26 • P = D (K, C) = (C – K) mod 26 • Where, C = Ciphertext, P = Plain Text, E = Encryption, D = Decryption, K = Key.
  • 9. Caesar cipher • Step-2: The transformation can be represented by aligning two alphabets; the cipher alphabet is the plain alphabet shift left or right by some number of positions. For instance, here is a Caesar cipher using a shifted of three places. (Here key is 3).
  • 11. Monoalphabetic and polyalphabetic • Monoalphabetic and polyalphabetic both are types of substitution cipher. • Monoalphabetic cipher: It is a technique in which only one character convert from plain text to cipher text. • For example, Caesar cipher. • Polyalphabetic Cipher: It is a technique in which more than one (multiple) character convert from plain text to cipher text. • For example, Playfair cipher, Vigenère cipher, hill cipher, one time pad cipher.
  • 12. Playfair Cipher • Playfair cipher is type of substitution cipher. • It is also called polyalphabetic substitution cipher. • In this cipher techniques, more than one character is used during encryption/decryption. So, this cipher technique is called multiple substitution cipher technique. • Input of this technique are keyword and plain text. • Keyword is one type of string.
  • 13. Playfair Cipher • Rules of encryption is as follows: • Step-1: Construct 5x5 matrix of given keyword(key). The letter “I” and “J” will be consider as one letter. So, if “I” is already placed then no need to place “J” in rest of matrix. (Or write I/J). • For Example, Keyword = MONARCHY
  • 14. • Step-2: If any characters are to be repeated in given keyword, used it only once during matrix filling. • For Example, Keyword = PLAYFAIR Playfair Cipher
  • 15. Playfair Cipher • Step-3: Plain text is broken down into groups of two alphabets. There are two possibilities. • Possibility-1: Plain text message that we want to encrypt broken down into groups of two alphabets. (Make pair of two alphabets of given plain text) • For Example, MY NAME IS MAHI • Plain text: MY NA ME IS MA HI • Possibility-2: If both alphabets are the same (or only one is left) in plain text, add an X after the first alphabet. Encrypt the new pair and continue. • For Example, GREEN • Plain text: GR EX EN • For Example, NETWORK • Plain text: NE TW OR KX • Step-4: When pair of plain text will be encrypt using matrix, there are 3 possibilities.
  • 16. Playfair Cipher • Possibility-1: If the alphabets are not in the same row or column, replace them with the alphabets in the same row respectively, but at the other pair of corners of the rectangle defined by the original pair.
  • 17. Playfair Cipher • Possibility-2: If both the alphabets in the pair appear in the same row of matrix, replace them with alphabets to their immediate right respectively. • If the original pair is on the right side of the row, then wrapping around to the left side of the row happens.
  • 18. Playfair Cipher • Possibility-3: If both alphabets in the pair appear in the same column of matrix, replace them with alphabets immediate below from respectively. • If the original pair is on the bottom side of the column, then wrapping around to the top side of the column happens.
  • 19. Vigenère Cipher • Vigenère Cipher is a method of encrypting alphabetic text. • It uses a simple form of polyalphabetic substitution. • A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. • The encryption of the original text is done using the Vigenère square or Vigenère table. • The table consists of the alphabets written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet.
  • 21. Vigenère Cipher • Rules of encryption is as follows: • Step-1: Create Vigenère table as per your given keyword. (If Vigenère table is not given). Given keyword arrange in alphabetical order then create table as per given below.
  • 22. Vigenère Cipher • Step-2: First row represents Plain Text and First column represents Keyword in Vigenère table.
  • 23. Vigenère Cipher • Step-3: In Keyword length is lesser than given plain text then repeat keyword alphabets until it matches the length of plain text.
  • 24. Vigenère Cipher • Step-4: The first letter of the plaintext, “I” is paired with “M”, the first letter of the key. So, use row “M” and column “I” of the Vigenère table, it produces cipher text “U” and so on.
  • 25. One Time Pad Cipher • One-time pad (OTP), also called Vernam-cipher or the perfect cipher, is a crypto algorithm where plaintext is combined with a random key. • The key is at least as long as the message or data that must be encrypted. • Each key is used only once, and both sender and receiver must destroy their key after use. • There should only be two copies of the key: one for the sender and one for the receiver.
  • 26. One Time Pad Cipher • Rules of encryption is as follows • Step-1: Assign a number to each character like (a = 0, b = 1, c = 2, … z = 25). As per given table.
  • 27. One Time Pad Cipher • Step-2: Assign a number to each character of plain text and key according to alphabetical order. (From table of step-1)
  • 28. One Time Pad Cipher • Step-3: Add both the number (Corresponding plain-text character number and Key character number).
  • 29. One Time Pad Cipher • Step-4: Subtract the number from 26 if the added number is greater than 26. otherwise left it. Assign alphabets of numbers, it produces cipher text.