T
R
A
N P S T OT S I N R N P S I O A O I
S I N
O I
Muhammad Daniyal (CS-13-32)
T R A N S P O S I T I O N
C I P H E R
Cryptography
Network Security - Cryptography
Transposition Cipher
Plain Text
MEET ME TOMORROW
Encryption
TEEM EM WORROMOT
Decryption
MEET ME TOMORROW
Transposition Cipher is cryptographic method by
moving letters or elements around rather than replacing
them with some other elements.
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
T B P T E
E T O K A E H E
X O G R
T - - - B - - - P - - - T - - - E
- E - T - O - K - A - E - H - E -
- - X - - - O - - - G - - - R - -
T B P T E E T O K A E H E X O G R
Cryptography
Network Security - Cryptography
Rail Fence Cipher
TEXTBOOK PAGE THREE
Encryption
TBPTEETOKAEHEXOGR
 Rail fence cipher involves writing a message in a
diagonal format in a grid.
Plain Text
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
T - - - B - - - P - - - T - - - E
- E - T - O - K - A - E - H - E -
- - X - - - O - - - G - - - R - -
T E X T B O O K P A G E T H R E E
Cryptography
Network Security - Cryptography
Rail Fence Cipher
Cipher Text
TBPTEETOKAEHEXOGR
Decryption
TEXTBOOK PAGE THREE
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
 Rail fence cipher involves writing a message in a
diagonal format in a grid.
Cryptography
Network Security - Cryptography
Route Cipher
 This is the method where message is written
in the form of a rectangle, choosing a route
around the grid.
 You need to decide on either a number of
columns or number of rows in the grid
before starting.
 Once Plaintext is written out in the grid, you
need to choose ONE of the routes
 Either: Spiraling inwards clockwise direction.
 Or: Zigzagging up & down.
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
M M R M O G
E E E O W H
E H T R N T
T E O R I X
Cryptography
Network Security - Cryptography
Route Cipher
Let’s say, Sender wants to send a
message to receiver.
Plain Text
Encryption
MEET ME HERE TOMORROW NIGHT
M M R M O G
E E E O W H
E H T R N T
T E O R I
 As there is an empty box, “ X “ is used as a buffer
to fill in spaces.
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
M M R M O G
E E E O W H
E H T R N T
T E O R I X
Cryptography
Network Security - Cryptography
Route Cipher
Route selected: Spiraling inward clock-
wise direction
Plain Text
Encryption
MEET ME HERE TOMORROW NIGHT
TEEMMRMOGHTXIROEHEEOWNRT
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
M M R M O G
E E E O W H
E H T R N T
T E O R I X
Cryptography
Network Security - Cryptography
Route Cipher
Route selected: Spiraling inward clock-
wise direction
Cipher Text
Decryption
TEEMMRMOGHTXIROEHEEOWNRT
MEET ME HERE TOMORROW NIGHT
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
1 2 3 4 5 6 7 81 2 3 4 5 6 7 8
W E A R E D I S
C O V E R E D F
L E E A T O N C
E Q J W G C R K
Cryptography
Network Security - Cryptography
Simple Columnar Transposition
Message is encrypted in the table
having custom number of columns
Plain Text
Encryption
WE ARE DISCOVERED. FLEE AT ONCE
WCLEEOEQAVEJREAWERTGDEOCIDNRSFCK
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
1 2 3 4 5 6 7 8
W E A R E D I S
C O V E R E D F
L E E A T O N C
E Q J W G C R K
Cryptography
Network Security - Cryptography
Simple Columnar Transposition
To decipher it, the recipient has to work
out with the column lengths by having a
keyword for decryption
Cipher Text
Decryption
WCLEEOEQAVEJREAWERTGDEOCIDNRSFCK
Monday, August 29, 2016
WEAREDISCOVEREDFLEEATONCEQJWGCRKWE ARE DISCOVERED FLEE AT ONCE
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
1 2 3 4 5 6 7 8
W E A R E D I S
C O V E R E D F
L E E A T O N C
E Q J W G C R K
Cryptography
Network Security - Cryptography
Simple Columnar Transposition
 Simple Columnar Transposition is
quite simple that it may be hacked
easily.
 To prevent this danger, we can
transpose our message in this
method by repeating it again and
again.
 We can use our nth cipher text as a
plain text to re-encrypt our message
to (n+1)th cipher text.
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
Cryptography
Network Security - Cryptography
Double Transposition
 Single columnar transposition can be
hacked by guessing number of
column lengths. When it is decrypted
in an irregular form. It can be cleared
by looking for possible anagrams to
re-order the message.
 Double Columnar Transposition was
often used to make Columnar
Transposition.
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
Cryptography
Network Security - Cryptography
Double Transposition
 Taking previous example
Monday, August 29, 2016
Plain Text
Encryption
WE ARE DISCOVERED. FLEE AT ONCE
1 2 3 4 5 6 7 8
W E A R E D I S
C O V E R E D F
L E E A T O N C
E Q J W G C R K
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
Cryptography
Network Security - Cryptography
Double Transposition
Making transposition strong
Monday, August 29, 2016
Cipher Text 1
Re-encryption
WCLEEOEQAVEJREAWERTGDEOCIDNRSFCK
1 2 3 4 5 6 7 8
W C L E E O E Q
A V E J R E A W
E R T G D E O C
I D N R S F C K
WAEICVRDLETNEJGRERDSOEEFEAOCQWCK
Cipher Text 2
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
Cryptography
Network Security - Cryptography
Detection
 Simple transposition can be cracked
by cryptanalyst by doing a frequency
count.
 If the cipher frequency displays a
frequency similar to plaintext, it is
most likely a transposition.
 This can then often attacked by
method of Anagramming.
 Slicing cipher text and then looking
for parts that matches with English
words. And solving them.
 Once, such anagrams are found they
reveal information about the
transposition pattern and can
consequently be extended.
Monday, August 29, 2016
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis
Cryptography
Transposition Cipher
Network Security - Cryptography
Rail Fence Cipher
Cryptanalysis
Route Cipher
Simple Columnar
Double Transposition
 Simpler transpositions can be
suffered from the property that keys
very close to the correct key will
disclose long pieces to
understandable plaintext combined
in a rough format.
 Consequently, such ciphers may be
weak to most favorable solution
seeking algorithms such as Genetic
algorithms
 GENETIC ALGORITHMS:
 Algorithms that dig out Probabilities
for solution.
Monday, August 29, 2016
Detection & Cryptanalysis
JUMP TO
IF THERE IS SOMETHING
MISSING, PLEASE LET ME
KNOW
IF THERE IS ANY QUESTION,
PLEASE ASK
THANK YOU FOR
CONCENTRATION
Transposition Cipher
Rail Fence Cipher
Route Cipher
Simple Columnar
Double Transposition
Detection & Cryptanalysis

Transposition Cipher

  • 1.
    T R A N P ST OT S I N R N P S I O A O I S I N O I Muhammad Daniyal (CS-13-32) T R A N S P O S I T I O N C I P H E R
  • 2.
    Cryptography Network Security -Cryptography Transposition Cipher Plain Text MEET ME TOMORROW Encryption TEEM EM WORROMOT Decryption MEET ME TOMORROW Transposition Cipher is cryptographic method by moving letters or elements around rather than replacing them with some other elements. Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 3.
    T B PT E E T O K A E H E X O G R T - - - B - - - P - - - T - - - E - E - T - O - K - A - E - H - E - - - X - - - O - - - G - - - R - - T B P T E E T O K A E H E X O G R Cryptography Network Security - Cryptography Rail Fence Cipher TEXTBOOK PAGE THREE Encryption TBPTEETOKAEHEXOGR  Rail fence cipher involves writing a message in a diagonal format in a grid. Plain Text Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 4.
    T - -- B - - - P - - - T - - - E - E - T - O - K - A - E - H - E - - - X - - - O - - - G - - - R - - T E X T B O O K P A G E T H R E E Cryptography Network Security - Cryptography Rail Fence Cipher Cipher Text TBPTEETOKAEHEXOGR Decryption TEXTBOOK PAGE THREE Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis  Rail fence cipher involves writing a message in a diagonal format in a grid.
  • 5.
    Cryptography Network Security -Cryptography Route Cipher  This is the method where message is written in the form of a rectangle, choosing a route around the grid.  You need to decide on either a number of columns or number of rows in the grid before starting.  Once Plaintext is written out in the grid, you need to choose ONE of the routes  Either: Spiraling inwards clockwise direction.  Or: Zigzagging up & down. Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 6.
    M M RM O G E E E O W H E H T R N T T E O R I X Cryptography Network Security - Cryptography Route Cipher Let’s say, Sender wants to send a message to receiver. Plain Text Encryption MEET ME HERE TOMORROW NIGHT M M R M O G E E E O W H E H T R N T T E O R I  As there is an empty box, “ X “ is used as a buffer to fill in spaces. Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 7.
    M M RM O G E E E O W H E H T R N T T E O R I X Cryptography Network Security - Cryptography Route Cipher Route selected: Spiraling inward clock- wise direction Plain Text Encryption MEET ME HERE TOMORROW NIGHT TEEMMRMOGHTXIROEHEEOWNRT Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 8.
    M M RM O G E E E O W H E H T R N T T E O R I X Cryptography Network Security - Cryptography Route Cipher Route selected: Spiraling inward clock- wise direction Cipher Text Decryption TEEMMRMOGHTXIROEHEEOWNRT MEET ME HERE TOMORROW NIGHT Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 9.
    1 2 34 5 6 7 81 2 3 4 5 6 7 8 W E A R E D I S C O V E R E D F L E E A T O N C E Q J W G C R K Cryptography Network Security - Cryptography Simple Columnar Transposition Message is encrypted in the table having custom number of columns Plain Text Encryption WE ARE DISCOVERED. FLEE AT ONCE WCLEEOEQAVEJREAWERTGDEOCIDNRSFCK Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 10.
    1 2 34 5 6 7 8 W E A R E D I S C O V E R E D F L E E A T O N C E Q J W G C R K Cryptography Network Security - Cryptography Simple Columnar Transposition To decipher it, the recipient has to work out with the column lengths by having a keyword for decryption Cipher Text Decryption WCLEEOEQAVEJREAWERTGDEOCIDNRSFCK Monday, August 29, 2016 WEAREDISCOVEREDFLEEATONCEQJWGCRKWE ARE DISCOVERED FLEE AT ONCE Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis 1 2 3 4 5 6 7 8 W E A R E D I S C O V E R E D F L E E A T O N C E Q J W G C R K
  • 11.
    Cryptography Network Security -Cryptography Simple Columnar Transposition  Simple Columnar Transposition is quite simple that it may be hacked easily.  To prevent this danger, we can transpose our message in this method by repeating it again and again.  We can use our nth cipher text as a plain text to re-encrypt our message to (n+1)th cipher text. Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 12.
    Cryptography Network Security -Cryptography Double Transposition  Single columnar transposition can be hacked by guessing number of column lengths. When it is decrypted in an irregular form. It can be cleared by looking for possible anagrams to re-order the message.  Double Columnar Transposition was often used to make Columnar Transposition. Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 13.
    Cryptography Network Security -Cryptography Double Transposition  Taking previous example Monday, August 29, 2016 Plain Text Encryption WE ARE DISCOVERED. FLEE AT ONCE 1 2 3 4 5 6 7 8 W E A R E D I S C O V E R E D F L E E A T O N C E Q J W G C R K Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 14.
    Cryptography Network Security -Cryptography Double Transposition Making transposition strong Monday, August 29, 2016 Cipher Text 1 Re-encryption WCLEEOEQAVEJREAWERTGDEOCIDNRSFCK 1 2 3 4 5 6 7 8 W C L E E O E Q A V E J R E A W E R T G D E O C I D N R S F C K WAEICVRDLETNEJGRERDSOEEFEAOCQWCK Cipher Text 2 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 15.
    Cryptography Network Security -Cryptography Detection  Simple transposition can be cracked by cryptanalyst by doing a frequency count.  If the cipher frequency displays a frequency similar to plaintext, it is most likely a transposition.  This can then often attacked by method of Anagramming.  Slicing cipher text and then looking for parts that matches with English words. And solving them.  Once, such anagrams are found they reveal information about the transposition pattern and can consequently be extended. Monday, August 29, 2016 Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis
  • 16.
    Cryptography Transposition Cipher Network Security- Cryptography Rail Fence Cipher Cryptanalysis Route Cipher Simple Columnar Double Transposition  Simpler transpositions can be suffered from the property that keys very close to the correct key will disclose long pieces to understandable plaintext combined in a rough format.  Consequently, such ciphers may be weak to most favorable solution seeking algorithms such as Genetic algorithms  GENETIC ALGORITHMS:  Algorithms that dig out Probabilities for solution. Monday, August 29, 2016 Detection & Cryptanalysis
  • 17.
    JUMP TO IF THEREIS SOMETHING MISSING, PLEASE LET ME KNOW IF THERE IS ANY QUESTION, PLEASE ASK THANK YOU FOR CONCENTRATION Transposition Cipher Rail Fence Cipher Route Cipher Simple Columnar Double Transposition Detection & Cryptanalysis