Name: Md Fazle Rabbi
ID:16CSE057
Ceaser and Hill cipher
CONTENTS
 Introduction of Caesar cipher
 Applying technique of Caesar cipher
 Caesar cipher example
 Advantages of Caesar cipher
 Disadvantages of Caesar cipher
 Introduction of Hill cipher
 Disadvantages of Hill cipher
1
INTRODUCTION OF CAESAR CIPHER
 The Caesar cipher is one of the earliest known and
simplest ciphers. It is a type of substitution cipher in
which each letter in the plaintext is 'shifted' a
certain number of places down the alphabet.
 For example, with a shift of 1, A would be replaced
by B, B would become C, and so on. The method is
named after Julius Caesar, who apparently used it
to communicate with his generals.
2
APPLYING TECHNIQUE OF CAESAR CIPHER
 Encryption
 We apply encryption formulas by character, based on
alphabetical order.
 The formula of encryption is:
 Decryption
 We apply decryption formulas by character, based on
alphabetical order.
 The formula of decryption is:
Where,
E denotes the encryption
D denotes the decryption
p denotes the letters value
k denotes the key value (shift value)
3
SHIFTING TECHNIQUE OF CAESAR CIPHER
4
ENCRYPTION CAESAR CIPHER
The encrypted message of this plain text is "WTAAD".
5
The plain text is “HELLO".
DECRYPTION CAESAR CIPHER
The decrypted message is "HELLO".
6
The encrypted message of this plain text is "WTAAD".
ADVANTAGES OF CAESAR CIPHER
 It is very easy to implement.
 This method is the simplest method of
cryptography.
 Only one short key is used in its entire process.
 If a system does not use complex coding
techniques, it is the best method for it.
 It requires only a few computing resources.
7
DISADVANTAGES OF CAESAR CIPHER ARE AS
FOLLOWS: -
 It can be easily hacked. It means the message
encrypted by this method can be easily decrypted.
 It provides very little security.
 By looking at the pattern of letters in it, the entire
message can be decrypted.
8
WHAT IS HILL CIPHER?
 Hill cipher is a polygraphic substitution cipher
based on linear algebra.
 Each letter is represented by a number modulo 26.
 To encrypt a message, each block of n letters
(considered as an n-component vector) is multiplied
by an invertible n × n matrix, against modulus 26
9
HILL CIPHER ENCRYPTION EXAMPLE
9
HELLO WORLD
SLHZY ATGZT
HILL CIPHER DECRYPTION EXAMPLE
9
HELLO WORLD
SLHZY ATGZT
DISADVANTAGE OF HILL CIPHER
 Noninvertible key matrix over is the
main disadvantage of Hill Cipher, because few of
the matrices have inverses over . This means that
the encrypted text can't be decrypted.
10
THE END

Topic2 caser hill_cripto

  • 1.
    Name: Md FazleRabbi ID:16CSE057 Ceaser and Hill cipher
  • 2.
    CONTENTS  Introduction ofCaesar cipher  Applying technique of Caesar cipher  Caesar cipher example  Advantages of Caesar cipher  Disadvantages of Caesar cipher  Introduction of Hill cipher  Disadvantages of Hill cipher 1
  • 3.
    INTRODUCTION OF CAESARCIPHER  The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet.  For example, with a shift of 1, A would be replaced by B, B would become C, and so on. The method is named after Julius Caesar, who apparently used it to communicate with his generals. 2
  • 4.
    APPLYING TECHNIQUE OFCAESAR CIPHER  Encryption  We apply encryption formulas by character, based on alphabetical order.  The formula of encryption is:  Decryption  We apply decryption formulas by character, based on alphabetical order.  The formula of decryption is: Where, E denotes the encryption D denotes the decryption p denotes the letters value k denotes the key value (shift value) 3
  • 5.
    SHIFTING TECHNIQUE OFCAESAR CIPHER 4
  • 6.
    ENCRYPTION CAESAR CIPHER Theencrypted message of this plain text is "WTAAD". 5 The plain text is “HELLO".
  • 7.
    DECRYPTION CAESAR CIPHER Thedecrypted message is "HELLO". 6 The encrypted message of this plain text is "WTAAD".
  • 8.
    ADVANTAGES OF CAESARCIPHER  It is very easy to implement.  This method is the simplest method of cryptography.  Only one short key is used in its entire process.  If a system does not use complex coding techniques, it is the best method for it.  It requires only a few computing resources. 7
  • 9.
    DISADVANTAGES OF CAESARCIPHER ARE AS FOLLOWS: -  It can be easily hacked. It means the message encrypted by this method can be easily decrypted.  It provides very little security.  By looking at the pattern of letters in it, the entire message can be decrypted. 8
  • 10.
    WHAT IS HILLCIPHER?  Hill cipher is a polygraphic substitution cipher based on linear algebra.  Each letter is represented by a number modulo 26.  To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible n × n matrix, against modulus 26 9
  • 11.
    HILL CIPHER ENCRYPTIONEXAMPLE 9 HELLO WORLD SLHZY ATGZT
  • 12.
    HILL CIPHER DECRYPTIONEXAMPLE 9 HELLO WORLD SLHZY ATGZT
  • 13.
    DISADVANTAGE OF HILLCIPHER  Noninvertible key matrix over is the main disadvantage of Hill Cipher, because few of the matrices have inverses over . This means that the encrypted text can't be decrypted. 10
  • 14.