SlideShare a Scribd company logo
SUBSTITUTION TECHNIQUES
Submitted by
P.VINITHA
M .SURYA
M.SARANYA
P.NITHYA
(NADAR SARESWATHI COLLEGE OF ART AND SCIENCE)THENI.
II MSC(CS&IT)
SUBTITUTION TECHNIQUES
• The two basic building block of all the encryption techniques are substitution and
transposition
. A substitution techniques is one in which the letter of plaintext are replaced by
other letter or by number or symbols
. The subsitution techniques have a four techniques
caeser cipher
monoalphabetic cipher
play fair cipher
hill cipher
polyalphabetic cipher
Caeser cipher
• caeser cipher involves replacing each letter of the alphabet with the letter
standing three place further down the alphabet
plain : meet me after the to go party
cipher: DREFR JUKHI TYRTY ELKJH VFDCB
we can define transposition listing
plain: a b c d e f g h I j k l m
cipher :DE F G H I K L M N O P Q R S T U
. The algorithm can be expressed:
plain text p,subsitution the cipher text c2
c=E(3,p)=(p+3)mod 26
gentral caeser algorithm:
c=E(k,p)=(p+k)mod 26
three important characteristics of this problem
1.encryption and decryption algorithm
2.there are 25 key
3.the language are plaintext
the text file comprressed using algorithm called ZIP
EX:BRUTE FORCE CRYPTANALYSIS OF CAESER CIPHER
PHHW PH WKH
OGGU OG VJG
MONOALPHABETIC CIPHER
• The can 25 key possible key ,caeser cipher is far from secure,
• The are 26 alphabetic characters ,10 order of magnitude greater then key space
DES
• this also called monoalphabetic subsitution cipher
• Ex:
NYUTGHREDSWACXZFGHJKLIOLPMNBGTYREFCVXD
LOIKUJYTRGFDCVBHNUYTREWASEDXZCDSFREDFVBNMKOLP
The realtive frequency on cipher text in (percentage)
P 13.33
Z 11.67
S 8.33
U 8.33
O 7.50
F 3.33
W 3.33
Q 2.50
T 2.50
0
10
20
30
40
50
60
70
80
90
100
a b c d
Series 1
Series 2
Series 3
• Monoalphabet cipher reficect frequency data original alphabet
• Multiple subsitution know as homophones
• EX: different cipher models
16,17,35,21 homophone using rotation randomely
PLAYFAIR CIPHER
the multiple letter encryption is play Fair
The play fair algorithm is based on used construer using keyword
THE KEYWORD “MONOARCHY”
M
C
O
H
N
Y
A R
B D
E F G I/J K
L P Q S T
U V W X Z
• THE FOLLOWING RUIE IN PLAY FAIR:
• 1. repeating plaintext letter are the same pair filltering letter
• 2. two plaintext letter in same row of the matrix are replaced the letter to the
right
• 3.top the element colum circulary from the last
• Play fair text easy to break
• Ex:relative frequency of occurrence of letters:
0
10
20
30
40
50
60
70
80
90
100
2 3 4 5
Series 1
Series 2
Series 3
HILL CIPHER
.The multiletter cipher hill cipher developed by the mathematician Lester hill in 1929.
. The algorithm m plaintext letter substitution cipher text m ,numerical
value(a=0,b=1,….z=25)
c1=(k11p1+k12p2+k13p3)mod 26
c2=(k21p1+k22p2+k23p3)mod 26
c3=(k31p1+k32p2+k33p3)mod 26
the column of vectors:
c1 k11 k12 k13 p1
c2 k21 k22 k23 p2 mod 26
c3 k31 k32 k33 p3
• c=kp mod 26
• c and p colum of vectorsog length 3,plaintext cipher text and k represent
encryption key
• Ex:
17 17 5 15 375 11
k= 21 18 21 % 0 = 819 mod 26 13
2 2 19 24 486 18
The square matrix determinate matrix equals sum of all the product can be one
element each colum from each row on element .
EX: matrix
k11 k12
k21 k22
POLALPHABETIC CIPHER
• The general name approach is polyalphabetic subsitution cipher
• the feature:
1. monoalphabetic rule is used
2. choose given transformation
key:meetmemeetmemeetme
plaintext:ewrdsfhthyujkikllolol
ciphertext:ZCSDEFRGTHBVNJUIKMNK
The ciphertext row determined column and plain text top of the column
vigenere proposed is refereed to auto key system
a b c d e
A B C D E
B C D E F
C D E F G
D E F G H
• This system works on binary data ,the system expressed follows:
ci=pi+ki
Where:
pi=binary digit plaintext
ki=binary digit key
ci=binary digit cipher text
THANK YOU

More Related Content

What's hot

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
SAurabh PRajapati
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
SHUBHA CHATURVEDI
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
Rajapriya82
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
Antony Alex
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 

What's hot (20)

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
block ciphers
block ciphersblock ciphers
block ciphers
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 

Similar to Substitution techniques

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
rajirajesh8
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
ChethanKrishna14
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
ChethanKrishna14
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
ramya marichamy
 
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
husnainali397602
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
dmc5abdulla
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
Infinity Tech Solutions
 
CNS UNIT-II.pptx
CNS UNIT-II.pptxCNS UNIT-II.pptx
CNS UNIT-II.pptx
nandan543979
 
Classical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptxClassical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptx
MohammadRafsunIslam
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
utsavkakkad1
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
DevangShukla10
 
2. Classical Cryptosystems Classical.ppt
2. Classical Cryptosystems Classical.ppt2. Classical Cryptosystems Classical.ppt
2. Classical Cryptosystems Classical.ppt
Rakesh Bachchan
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
bcanawakadalcollege
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
prdpgpt
 

Similar to Substitution techniques (20)

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
CNS UNIT-II.pptx
CNS UNIT-II.pptxCNS UNIT-II.pptx
CNS UNIT-II.pptx
 
Classical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptxClassical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptx
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
2. Classical Cryptosystems Classical.ppt
2. Classical Cryptosystems Classical.ppt2. Classical Cryptosystems Classical.ppt
2. Classical Cryptosystems Classical.ppt
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
Crypto
CryptoCrypto
Crypto
 

Recently uploaded

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Substitution techniques

  • 1. SUBSTITUTION TECHNIQUES Submitted by P.VINITHA M .SURYA M.SARANYA P.NITHYA (NADAR SARESWATHI COLLEGE OF ART AND SCIENCE)THENI. II MSC(CS&IT)
  • 2. SUBTITUTION TECHNIQUES • The two basic building block of all the encryption techniques are substitution and transposition . A substitution techniques is one in which the letter of plaintext are replaced by other letter or by number or symbols . The subsitution techniques have a four techniques caeser cipher monoalphabetic cipher play fair cipher hill cipher polyalphabetic cipher
  • 3. Caeser cipher • caeser cipher involves replacing each letter of the alphabet with the letter standing three place further down the alphabet plain : meet me after the to go party cipher: DREFR JUKHI TYRTY ELKJH VFDCB we can define transposition listing plain: a b c d e f g h I j k l m cipher :DE F G H I K L M N O P Q R S T U . The algorithm can be expressed: plain text p,subsitution the cipher text c2 c=E(3,p)=(p+3)mod 26 gentral caeser algorithm: c=E(k,p)=(p+k)mod 26
  • 4. three important characteristics of this problem 1.encryption and decryption algorithm 2.there are 25 key 3.the language are plaintext the text file comprressed using algorithm called ZIP EX:BRUTE FORCE CRYPTANALYSIS OF CAESER CIPHER PHHW PH WKH OGGU OG VJG
  • 5. MONOALPHABETIC CIPHER • The can 25 key possible key ,caeser cipher is far from secure, • The are 26 alphabetic characters ,10 order of magnitude greater then key space DES • this also called monoalphabetic subsitution cipher • Ex: NYUTGHREDSWACXZFGHJKLIOLPMNBGTYREFCVXD LOIKUJYTRGFDCVBHNUYTREWASEDXZCDSFREDFVBNMKOLP The realtive frequency on cipher text in (percentage) P 13.33 Z 11.67 S 8.33 U 8.33 O 7.50 F 3.33 W 3.33 Q 2.50 T 2.50
  • 6. 0 10 20 30 40 50 60 70 80 90 100 a b c d Series 1 Series 2 Series 3
  • 7. • Monoalphabet cipher reficect frequency data original alphabet • Multiple subsitution know as homophones • EX: different cipher models 16,17,35,21 homophone using rotation randomely
  • 8. PLAYFAIR CIPHER the multiple letter encryption is play Fair The play fair algorithm is based on used construer using keyword THE KEYWORD “MONOARCHY” M C O H N Y A R B D E F G I/J K L P Q S T U V W X Z
  • 9. • THE FOLLOWING RUIE IN PLAY FAIR: • 1. repeating plaintext letter are the same pair filltering letter • 2. two plaintext letter in same row of the matrix are replaced the letter to the right • 3.top the element colum circulary from the last • Play fair text easy to break • Ex:relative frequency of occurrence of letters:
  • 10. 0 10 20 30 40 50 60 70 80 90 100 2 3 4 5 Series 1 Series 2 Series 3
  • 11. HILL CIPHER .The multiletter cipher hill cipher developed by the mathematician Lester hill in 1929. . The algorithm m plaintext letter substitution cipher text m ,numerical value(a=0,b=1,….z=25) c1=(k11p1+k12p2+k13p3)mod 26 c2=(k21p1+k22p2+k23p3)mod 26 c3=(k31p1+k32p2+k33p3)mod 26 the column of vectors: c1 k11 k12 k13 p1 c2 k21 k22 k23 p2 mod 26 c3 k31 k32 k33 p3
  • 12. • c=kp mod 26 • c and p colum of vectorsog length 3,plaintext cipher text and k represent encryption key • Ex: 17 17 5 15 375 11 k= 21 18 21 % 0 = 819 mod 26 13 2 2 19 24 486 18
  • 13. The square matrix determinate matrix equals sum of all the product can be one element each colum from each row on element . EX: matrix k11 k12 k21 k22
  • 14. POLALPHABETIC CIPHER • The general name approach is polyalphabetic subsitution cipher • the feature: 1. monoalphabetic rule is used 2. choose given transformation key:meetmemeetmemeetme plaintext:ewrdsfhthyujkikllolol ciphertext:ZCSDEFRGTHBVNJUIKMNK The ciphertext row determined column and plain text top of the column vigenere proposed is refereed to auto key system
  • 15. a b c d e A B C D E B C D E F C D E F G D E F G H
  • 16. • This system works on binary data ,the system expressed follows: ci=pi+ki Where: pi=binary digit plaintext ki=binary digit key ci=binary digit cipher text