SlideShare a Scribd company logo
1 of 15
Prof. Neeraj Bhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System
Sciences
MDS University Ajmer, Rajasthan
 There are two basic building blocks of all
Encryption Techniques:
1. SUBSTITUTION
2. TRANSPOSITION.
CLASSICAL
ENCRYPTION
SUBSTITUTION
TRANSPOSTION
PRODUCT CIPHER
A Substitution Technique is one in
which the letters of plaintext are
replaced by other letters or by
numbers or symbols. If the plaintext is
viewed as a sequence of bits, then
substitution involves replacing
plaintext bit patterns with cipher text
bit patterns.
 The earliest known use of a substitution cipher and the
simplest was by Julius Caesar. The Caesar cipher involves
replacing each letter of the alphabet with the letter standing 3
places further down the alphabet.
 For each plaintext letter p, substitute the cipher text letter c
such that:
C = E(P) = (P+3) mod 26
 A shift may be any amount, so that general Caesar algorithm is
:
C = E (P) = (P+K) mod 26
 Where k takes on a value in the range 1 to 25.
 The decryption algorithm is simply
P = D(C) = (C-K) mod 26
 PLAIN TEXT :
PAY MORE MONEY
 CIPHER TEXT:
SDB PRUH PRQHB
 Note that the alphabet is wrapped
around, so that letter following „Z‟ is „A‟.
 The best known multiple letter encryption cipher is
the playfair, which treats digrams in the plaintext as
single units and translates these units into cipher
text digrams. The playfair algorithm is based on the
use of 5x5 matrix of letters constructed using a
keyword.
 Let the keyword be” MONARCHY “
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
 The matrix is constructed by filling in the
letters of the keyword (minus duplicates)
from left to right and from top to bottom,
and then filling in the remainder of the
matrix with the remaining letters in
alphabetical order.
 The letter “i‟ and “j‟ count as one letter.
Plaintext is encrypted two letters at a
time
 Repeating plaintext letters that would fall in the
same pair are separated with a Filler letter such as
„x‟.
 Plaintext letters that fall in the same row of the
matrix are each replaced by the letter to the right,
with the first element of the row following the last.
 Plaintext letters that fall in the same column are
replaced by the letter beneath, with the top element
of the column following the last.
 Otherwise, each plaintext letter is replaced by the
letter that lies in its own row And the column
occupied by the other plaintext letter.
It is another way to improve on the simple
monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds
through the plaintext message and this
approach is polyalphabetic cipher.
All the techniques
have the following features in common.
 A set of related monoalphabetic substitution
rules are used
 A key determines which particular rule is
chosen for a given transformation.
 In this scheme, the set of related monoalphabetic
substitution rules consisting of 26 Caesar Ciphers
with shifts of 0 through 25.
 Each cipher is denoted by a key letter.
 Each of the 26 ciphers is laid out horizontally, with
the key letter for each cipher to its left.
 A normal alphabet for the plaintext runs across the
top.
PLAIN TEXT
K a b c d e f g h i j k … x y z
E a A B C D E F G H I J K … X Y Z
Y b B C D E F G H I J K L … Y Z A
c C D E F G H I J K L M … Z A B
L d D E F G H I J K L M N … A B C
E e E F G H I J K L M N O … B C D
T f F G H I J K L M N O P … C D E
T g G H I J K L M N O P Q … D E F
E : : : : : : : : : : : : … : : :
R : : : : : : : : : : : : : : :
S x X Y Z A B C D E F G H … W
y Y Z A B C D E F G H I … X
z Z A B C D E F G H I J … Y
Encryption
 Given a key letter X and a plaintext letter y, the cipher text is at the
intersection of the row labelled x and the column labelled y; in this
case, the cipher text is V.
 To encrypt a message, a key is needed that is as long as the
message. Usually, the key is a repeating keyword.
Example:
 KEY= “d e c e p t i v e d e c e p t i v e d e c e p t i v e”
 PLAINTEXT = “w e a r e d i s c o v e r e d s a v e y o u r s e l f”
 CIPHER TEXT = “ZICVTWQNGRZGVTWAVZHCQYGLMGJ”
Decryption
 Decryption is equally simple. The key letter again identifies the row.
The position of the cipher text letter in that row determines the
column, and the plaintext letter is at the top of that column.
Q1.Create a cipher text using VIGENERE
cipher :
 KEY= “India”
 PLAINTEXT = “Rajasthan”

More Related Content

What's hot

What's hot (20)

symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Cryptography
CryptographyCryptography
Cryptography
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Unit 1
Unit 1Unit 1
Unit 1
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
DES
DESDES
DES
 
Data Structures and Algorithm Analysis
Data Structures  and  Algorithm AnalysisData Structures  and  Algorithm Analysis
Data Structures and Algorithm Analysis
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Key management
Key managementKey management
Key management
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Similar to Here are the steps to encrypt the plaintext "Rajasthan" using the Vigenere cipher with key "India":1. The key "India" is repeated to be as long as the plaintext: "IndiaIndiaIn"2. The ASCII values of the plaintext and key letters are obtained: Plaintext: 82 97 106 97 115 104 97 110 Key: 73 110 100 105 97 733. The ciphertexts are obtained by adding the plaintext and key ASCII values modulo 26: Ciphertext: 23 8 15 0 19 7 13 13So the cipher text is: "WTJALGMN

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesramya marichamy
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques parves kamal
 
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppthusnainali397602
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdfMeera357768
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptxMahmoodTareq3
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptxRavikumarVadana
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...SrideviM4
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)SrideviM4
 
Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Mark Morris
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003keyurbz
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Caesar Cipher.pptx Information Security ppt
Caesar Cipher.pptx Information Security pptCaesar Cipher.pptx Information Security ppt
Caesar Cipher.pptx Information Security pptAliSaddique
 

Similar to Here are the steps to encrypt the plaintext "Rajasthan" using the Vigenere cipher with key "India":1. The key "India" is repeated to be as long as the plaintext: "IndiaIndiaIn"2. The ASCII values of the plaintext and key letters are obtained: Plaintext: 82 97 106 97 115 104 97 110 Key: 73 110 100 105 97 733. The ciphertexts are obtained by adding the plaintext and key ASCII values modulo 26: Ciphertext: 23 8 15 0 19 7 13 13So the cipher text is: "WTJALGMN (20)

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptx
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Crypto
CryptoCrypto
Crypto
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Caesar Cipher.pptx Information Security ppt
Caesar Cipher.pptx Information Security pptCaesar Cipher.pptx Information Security ppt
Caesar Cipher.pptx Information Security ppt
 

More from SHUBHA CHATURVEDI

More from SHUBHA CHATURVEDI (20)

Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
 
Unix and its Components
Unix and its ComponentsUnix and its Components
Unix and its Components
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
 
Linux Features
Linux FeaturesLinux Features
Linux Features
 
Architecture of Linux
 Architecture of Linux Architecture of Linux
Architecture of Linux
 
Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Stream Ciphers
Stream CiphersStream Ciphers
Stream Ciphers
 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
 
Homophonic Substitution Cipher
Homophonic Substitution CipherHomophonic Substitution Cipher
Homophonic Substitution Cipher
 
Classical encryption techniques
Classical encryption  techniquesClassical encryption  techniques
Classical encryption techniques
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
SECURITY SERVICES
SECURITY SERVICESSECURITY SERVICES
SECURITY SERVICES
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Here are the steps to encrypt the plaintext "Rajasthan" using the Vigenere cipher with key "India":1. The key "India" is repeated to be as long as the plaintext: "IndiaIndiaIn"2. The ASCII values of the plaintext and key letters are obtained: Plaintext: 82 97 106 97 115 104 97 110 Key: 73 110 100 105 97 733. The ciphertexts are obtained by adding the plaintext and key ASCII values modulo 26: Ciphertext: 23 8 15 0 19 7 13 13So the cipher text is: "WTJALGMN

  • 1. Prof. Neeraj Bhargava Mrs. Shubha Chaturvedi Department of Computer Science, School of Engineering & System Sciences MDS University Ajmer, Rajasthan
  • 2.  There are two basic building blocks of all Encryption Techniques: 1. SUBSTITUTION 2. TRANSPOSITION.
  • 4.
  • 5. A Substitution Technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols. If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with cipher text bit patterns.
  • 6.  The earliest known use of a substitution cipher and the simplest was by Julius Caesar. The Caesar cipher involves replacing each letter of the alphabet with the letter standing 3 places further down the alphabet.  For each plaintext letter p, substitute the cipher text letter c such that: C = E(P) = (P+3) mod 26  A shift may be any amount, so that general Caesar algorithm is : C = E (P) = (P+K) mod 26  Where k takes on a value in the range 1 to 25.  The decryption algorithm is simply P = D(C) = (C-K) mod 26
  • 7.  PLAIN TEXT : PAY MORE MONEY  CIPHER TEXT: SDB PRUH PRQHB  Note that the alphabet is wrapped around, so that letter following „Z‟ is „A‟.
  • 8.  The best known multiple letter encryption cipher is the playfair, which treats digrams in the plaintext as single units and translates these units into cipher text digrams. The playfair algorithm is based on the use of 5x5 matrix of letters constructed using a keyword.  Let the keyword be” MONARCHY “ M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z
  • 9.  The matrix is constructed by filling in the letters of the keyword (minus duplicates) from left to right and from top to bottom, and then filling in the remainder of the matrix with the remaining letters in alphabetical order.  The letter “i‟ and “j‟ count as one letter. Plaintext is encrypted two letters at a time
  • 10.  Repeating plaintext letters that would fall in the same pair are separated with a Filler letter such as „x‟.  Plaintext letters that fall in the same row of the matrix are each replaced by the letter to the right, with the first element of the row following the last.  Plaintext letters that fall in the same column are replaced by the letter beneath, with the top element of the column following the last.  Otherwise, each plaintext letter is replaced by the letter that lies in its own row And the column occupied by the other plaintext letter.
  • 11. It is another way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message and this approach is polyalphabetic cipher. All the techniques have the following features in common.  A set of related monoalphabetic substitution rules are used  A key determines which particular rule is chosen for a given transformation.
  • 12.  In this scheme, the set of related monoalphabetic substitution rules consisting of 26 Caesar Ciphers with shifts of 0 through 25.  Each cipher is denoted by a key letter.  Each of the 26 ciphers is laid out horizontally, with the key letter for each cipher to its left.  A normal alphabet for the plaintext runs across the top.
  • 13. PLAIN TEXT K a b c d e f g h i j k … x y z E a A B C D E F G H I J K … X Y Z Y b B C D E F G H I J K L … Y Z A c C D E F G H I J K L M … Z A B L d D E F G H I J K L M N … A B C E e E F G H I J K L M N O … B C D T f F G H I J K L M N O P … C D E T g G H I J K L M N O P Q … D E F E : : : : : : : : : : : : … : : : R : : : : : : : : : : : : : : : S x X Y Z A B C D E F G H … W y Y Z A B C D E F G H I … X z Z A B C D E F G H I J … Y
  • 14. Encryption  Given a key letter X and a plaintext letter y, the cipher text is at the intersection of the row labelled x and the column labelled y; in this case, the cipher text is V.  To encrypt a message, a key is needed that is as long as the message. Usually, the key is a repeating keyword. Example:  KEY= “d e c e p t i v e d e c e p t i v e d e c e p t i v e”  PLAINTEXT = “w e a r e d i s c o v e r e d s a v e y o u r s e l f”  CIPHER TEXT = “ZICVTWQNGRZGVTWAVZHCQYGLMGJ” Decryption  Decryption is equally simple. The key letter again identifies the row. The position of the cipher text letter in that row determines the column, and the plaintext letter is at the top of that column.
  • 15. Q1.Create a cipher text using VIGENERE cipher :  KEY= “India”  PLAINTEXT = “Rajasthan”