SlideShare a Scribd company logo
Sanjivani Rural Education Society’s
Sanjivani College of Engineering, Kopargaon
(An Autonomous Institute Affiliated to Savitribai Phule Pune University)
Cyber Security CIA Presentation On
“Web based Application for Encryption using Substitution and Transposition Techniques”
Presented By
Ms. Mahajan Vaishnavi (82)
Ms. Bornare Gauri (83)
Ms. Nagpure Latika (84)
Ms. Bornare Anjali (86) Prof. M. Agrawal Mam
(Subject Teacher)
Department of Computer Engineering
Problem Statement
The problem that the Web-based application for encryption using substitution and transposition techniques
project aims to solve the need for a secure way of transmitting and storing sensitive information over the internet.
With the increasing use of the internet, there is a significant risk of sensitive information being intercepted by
unauthorized parties, which can lead to severe consequences such as identity theft, financial loss, and privacy
breaches. Therefore, there is a need for a secure way of transmitting and storing sensitive information over the
internet.
Objectives
● To develop a user-friendly web-based application that allows users to encrypt sensitive information using
substitution and transposition techniques.
● To make encryption techniques accessible to users who may not have specialized knowledge or skills in
computer science or cryptography.
● To implement substitution and transposition techniques to increase the security of messages and protect them
from interception by unauthorized parties.
Substitution
Substitution involves replacing each letter or character in the plaintext with a corresponding letter or
character from a substitution table. The substitution table contains a set of predefined mappings between letters or
characters in the plaintext and ciphertext. For example, in a simple substitution cipher, every occurrence of the letter
'A' in the plaintext could be replaced with the letter 'X' in the ciphertext, and so on.
Substitution Techniques:
1. Caesar Cipher
2. Playfair Cipher
1. Caesar Cipher
A Caesar cipher is a simple method of encoding messages. Caesar ciphers use a substitution method where letters in
the alphabet are shifted by some fixed number of spaces to yield an encoding alphabet. A Caesar cipher with a shift
of 1. 1 would encode an A as a B, an M as an N, and a Z as an A, and so on.
The formula of encryption is:
En (x) = (x + n) mod 26
Example
Plain Text: Security
Key: 3
Solution:
Key: 3
Cipher Text: VHFXULWB
Plain Text S → 18 En = (18+ 3) mod 26 Cipher Text 21 → V
Plain Text E → 04 En = (04+ 3) mod 26 Cipher Text 07 → H
Plain Text C → 02 En = (02+ 3) mod 26 Cipher Text 05 → F
Plain Text U → 20 En = (20+ 3) mod 26 Cipher Text 23 → X
Plain Text R → 17 En = (17+ 3) mod 26 Cipher Text 20 → U
Plain Text I → 08 En = (08+ 3) mod 26 Cipher Text 11 → L
Plain Text T → 19 En = (19+ 3) mod 26 Cipher Text 22 → W
Plain Text Y → 24 En = (24+ 3) mod 26 Cipher Text 27 → B
2. Playfair Cipher
Playfair cipher is an encryption algorithm to encrypt or encode a message. It is the same as a traditional
cipher. The only difference is that it encrypts a digraph (a pair of two letters) instead of a single letter. The Playfair
cipher is the earliest and best-known digraph substitution cipher to use symmetry encryption.
Example
Plain text: Hide the key
Key: Playfair
Solution
Step 1: 5 X 5 Matrix
Step 2: Pair of two letters:
Hi de th ek ey
Step 3:
Cipher Text: ebimqmgmkp
Transposition
Transposition involves rearranging the order of the characters or letters in the plaintext to form the
ciphertext. In transposition, the position of the letters in the plaintext is changed to create the ciphertext. For
example, a transposition cipher might rearrange the order of the letters in the plaintext message so that the letter in
the first position is moved to the third position, the letter in the second position is moved to the fifth position, and so
on.
Transposition Techniques:
1. Rail Fence Transposition
2. Simple Columnar
1. Rail Fence Transposition
The rail fence cipher (sometimes called zigzag cipher) is a transposition cipher that jumbles up the order of
the letters of a message using a basic algorithm.
The rail fence cipher works by writing your message on alternate lines across the page, and then reading off
each line in turn.
Example
Plain text: Security
Key: 2
Solution:
Cipher text: scrteuiy
2. Simple Columnar Transposition
The columnar transposition cipher is a fairly simple, easy to implement cipher. It is a transposition cipher that
follows a simple rule for mixing up the characters in the plaintext to form the ciphertext.Although weak on its own,
it can be combined with other ciphers, such as a substitution cipher, the combination of which can be more difficult
to break than either cipher on it's own.
Example
Plain text: Security
Key: key
Solution:
Cipher Text: erysutci_
Output
Fig. Caesar Fig. Playfair
Fig. Simple Columnar
Fig. Rail Fence
Applications
● Military communication
● Online transactions
● Email encryption
● Password protection
● Digital signature
● Secure messaging apps
Conclusion
In conclusion, the system that uses the concepts of transposition and substitution for encrypting the messages
using Rail fence, Playfair cipher, Caesar cipher, and Simple Columnar Transposition is a secure and effective
method of ensuring the confidentiality and privacy of sensitive information. Overall, the use of a combination of
these above ciphers in a system ensures that the message is encrypted in a way that is difficult to crack without the
key.
References
● https://www.tutorialspoint.com
● https://geeksforgeeks.com
● https://www.javatpoint.com
Thank You..!!

More Related Content

What's hot

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
هيثم فرج
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
Prabhat Goel
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Unit 1
Unit 1Unit 1
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit 1
Unit 1Unit 1
Unit 1
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 

Similar to substitution and transposition techniques_ppt.pptx

A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
IJERD Editor
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
eSAT Journals
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
desalewminale
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
eSAT Publishing House
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ShilpaShettyA1
 
Cns 1
Cns 1Cns 1
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
SarwatDilawaiz
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
bcanawakadalcollege
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
Priyanka Karancy
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
Somaditya Basak
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
ParshantYadav13
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
Vasuki Ramasamy
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
SrideviM4
 

Similar to substitution and transposition techniques_ppt.pptx (20)

A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cns 1
Cns 1Cns 1
Cns 1
 
IS LEC 6.pdf
IS LEC 6.pdfIS LEC 6.pdf
IS LEC 6.pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

substitution and transposition techniques_ppt.pptx

  • 1. Sanjivani Rural Education Society’s Sanjivani College of Engineering, Kopargaon (An Autonomous Institute Affiliated to Savitribai Phule Pune University) Cyber Security CIA Presentation On “Web based Application for Encryption using Substitution and Transposition Techniques” Presented By Ms. Mahajan Vaishnavi (82) Ms. Bornare Gauri (83) Ms. Nagpure Latika (84) Ms. Bornare Anjali (86) Prof. M. Agrawal Mam (Subject Teacher) Department of Computer Engineering
  • 2. Problem Statement The problem that the Web-based application for encryption using substitution and transposition techniques project aims to solve the need for a secure way of transmitting and storing sensitive information over the internet. With the increasing use of the internet, there is a significant risk of sensitive information being intercepted by unauthorized parties, which can lead to severe consequences such as identity theft, financial loss, and privacy breaches. Therefore, there is a need for a secure way of transmitting and storing sensitive information over the internet.
  • 3. Objectives ● To develop a user-friendly web-based application that allows users to encrypt sensitive information using substitution and transposition techniques. ● To make encryption techniques accessible to users who may not have specialized knowledge or skills in computer science or cryptography. ● To implement substitution and transposition techniques to increase the security of messages and protect them from interception by unauthorized parties.
  • 4. Substitution Substitution involves replacing each letter or character in the plaintext with a corresponding letter or character from a substitution table. The substitution table contains a set of predefined mappings between letters or characters in the plaintext and ciphertext. For example, in a simple substitution cipher, every occurrence of the letter 'A' in the plaintext could be replaced with the letter 'X' in the ciphertext, and so on. Substitution Techniques: 1. Caesar Cipher 2. Playfair Cipher
  • 5. 1. Caesar Cipher A Caesar cipher is a simple method of encoding messages. Caesar ciphers use a substitution method where letters in the alphabet are shifted by some fixed number of spaces to yield an encoding alphabet. A Caesar cipher with a shift of 1. 1 would encode an A as a B, an M as an N, and a Z as an A, and so on. The formula of encryption is: En (x) = (x + n) mod 26 Example Plain Text: Security Key: 3
  • 6. Solution: Key: 3 Cipher Text: VHFXULWB Plain Text S → 18 En = (18+ 3) mod 26 Cipher Text 21 → V Plain Text E → 04 En = (04+ 3) mod 26 Cipher Text 07 → H Plain Text C → 02 En = (02+ 3) mod 26 Cipher Text 05 → F Plain Text U → 20 En = (20+ 3) mod 26 Cipher Text 23 → X Plain Text R → 17 En = (17+ 3) mod 26 Cipher Text 20 → U Plain Text I → 08 En = (08+ 3) mod 26 Cipher Text 11 → L Plain Text T → 19 En = (19+ 3) mod 26 Cipher Text 22 → W Plain Text Y → 24 En = (24+ 3) mod 26 Cipher Text 27 → B
  • 7. 2. Playfair Cipher Playfair cipher is an encryption algorithm to encrypt or encode a message. It is the same as a traditional cipher. The only difference is that it encrypts a digraph (a pair of two letters) instead of a single letter. The Playfair cipher is the earliest and best-known digraph substitution cipher to use symmetry encryption. Example Plain text: Hide the key Key: Playfair
  • 8. Solution Step 1: 5 X 5 Matrix Step 2: Pair of two letters: Hi de th ek ey
  • 9. Step 3: Cipher Text: ebimqmgmkp
  • 10. Transposition Transposition involves rearranging the order of the characters or letters in the plaintext to form the ciphertext. In transposition, the position of the letters in the plaintext is changed to create the ciphertext. For example, a transposition cipher might rearrange the order of the letters in the plaintext message so that the letter in the first position is moved to the third position, the letter in the second position is moved to the fifth position, and so on. Transposition Techniques: 1. Rail Fence Transposition 2. Simple Columnar
  • 11. 1. Rail Fence Transposition The rail fence cipher (sometimes called zigzag cipher) is a transposition cipher that jumbles up the order of the letters of a message using a basic algorithm. The rail fence cipher works by writing your message on alternate lines across the page, and then reading off each line in turn. Example Plain text: Security Key: 2
  • 13. 2. Simple Columnar Transposition The columnar transposition cipher is a fairly simple, easy to implement cipher. It is a transposition cipher that follows a simple rule for mixing up the characters in the plaintext to form the ciphertext.Although weak on its own, it can be combined with other ciphers, such as a substitution cipher, the combination of which can be more difficult to break than either cipher on it's own. Example Plain text: Security Key: key
  • 15. Output Fig. Caesar Fig. Playfair Fig. Simple Columnar Fig. Rail Fence
  • 16. Applications ● Military communication ● Online transactions ● Email encryption ● Password protection ● Digital signature ● Secure messaging apps
  • 17. Conclusion In conclusion, the system that uses the concepts of transposition and substitution for encrypting the messages using Rail fence, Playfair cipher, Caesar cipher, and Simple Columnar Transposition is a secure and effective method of ensuring the confidentiality and privacy of sensitive information. Overall, the use of a combination of these above ciphers in a system ensures that the message is encrypted in a way that is difficult to crack without the key.