SlideShare a Scribd company logo
1 of 17
SUBSTITUTION TECHNIQUES
Submitted by
P.VINITHA
M .SURYA
M.SARANYA
P.NITHYA
(NADAR SARESWATHI COLLEGE OF ART AND SCIENCE)THENI.
II MSC(CS&IT)
SUBTITUTION TECHNIQUES
• The two basic building block of all the encryption techniques are substitution and
transposition
. A substitution techniques is one in which the letter of plaintext are replaced by
other letter or by number or symbols
. The subsitution techniques have a four techniques
caeser cipher
monoalphabetic cipher
play fair cipher
hill cipher
polyalphabetic cipher
Caeser cipher
• caeser cipher involves replacing each letter of the alphabet with the letter
standing three place further down the alphabet
plain : meet me after the to go party
cipher: DREFR JUKHI TYRTY ELKJH VFDCB
we can define transposition listing
plain: a b c d e f g h I j k l m
cipher :DE F G H I K L M N O P Q R S T U
. The algorithm can be expressed:
plain text p,subsitution the cipher text c2
c=E(3,p)=(p+3)mod 26
gentral caeser algorithm:
c=E(k,p)=(p+k)mod 26
three important characteristics of this problem
1.encryption and decryption algorithm
2.there are 25 key
3.the language are plaintext
the text file comprressed using algorithm called ZIP
EX:BRUTE FORCE CRYPTANALYSIS OF CAESER CIPHER
PHHW PH WKH
OGGU OG VJG
MONOALPHABETIC CIPHER
• The can 25 key possible key ,caeser cipher is far from secure,
• The are 26 alphabetic characters ,10 order of magnitude greater then key space
DES
• this also called monoalphabetic subsitution cipher
• Ex:
NYUTGHREDSWACXZFGHJKLIOLPMNBGTYREFCVXD
LOIKUJYTRGFDCVBHNUYTREWASEDXZCDSFREDFVBNMKOLP
The realtive frequency on cipher text in (percentage)
P 13.33
Z 11.67
S 8.33
U 8.33
O 7.50
F 3.33
W 3.33
Q 2.50
T 2.50
0
10
20
30
40
50
60
70
80
90
100
a b c d
Series 1
Series 2
Series 3
• Monoalphabet cipher reficect frequency data original alphabet
• Multiple subsitution know as homophones
• EX: different cipher models
16,17,35,21 homophone using rotation randomely
PLAYFAIR CIPHER
the multiple letter encryption is play Fair
The play fair algorithm is based on used construer using keyword
THE KEYWORD “MONOARCHY”
M
C
O
H
N
Y
A R
B D
E F G I/J K
L P Q S T
U V W X Z
• THE FOLLOWING RUIE IN PLAY FAIR:
• 1. repeating plaintext letter are the same pair filltering letter
• 2. two plaintext letter in same row of the matrix are replaced the letter to the
right
• 3.top the element colum circulary from the last
• Play fair text easy to break
• Ex:relative frequency of occurrence of letters:
0
10
20
30
40
50
60
70
80
90
100
2 3 4 5
Series 1
Series 2
Series 3
HILL CIPHER
.The multiletter cipher hill cipher developed by the mathematician Lester hill in 1929.
. The algorithm m plaintext letter substitution cipher text m ,numerical
value(a=0,b=1,….z=25)
c1=(k11p1+k12p2+k13p3)mod 26
c2=(k21p1+k22p2+k23p3)mod 26
c3=(k31p1+k32p2+k33p3)mod 26
the column of vectors:
c1 k11 k12 k13 p1
c2 k21 k22 k23 p2 mod 26
c3 k31 k32 k33 p3
• c=kp mod 26
• c and p colum of vectorsog length 3,plaintext cipher text and k represent
encryption key
• Ex:
17 17 5 15 375 11
k= 21 18 21 % 0 = 819 mod 26 13
2 2 19 24 486 18
The square matrix determinate matrix equals sum of all the product can be one
element each colum from each row on element .
EX: matrix
k11 k12
k21 k22
POLALPHABETIC CIPHER
• The general name approach is polyalphabetic subsitution cipher
• the feature:
1. monoalphabetic rule is used
2. choose given transformation
key:meetmemeetmemeetme
plaintext:ewrdsfhthyujkikllolol
ciphertext:ZCSDEFRGTHBVNJUIKMNK
The ciphertext row determined column and plain text top of the column
vigenere proposed is refereed to auto key system
a b c d e
A B C D E
B C D E F
C D E F G
D E F G H
• This system works on binary data ,the system expressed follows:
ci=pi+ki
Where:
pi=binary digit plaintext
ki=binary digit key
ci=binary digit cipher text
THANK YOU

More Related Content

What's hot

Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
Knowledge representation In Artificial Intelligence
Knowledge representation In Artificial IntelligenceKnowledge representation In Artificial Intelligence
Knowledge representation In Artificial IntelligenceRamla Sheikh
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Peephole optimization techniques in compiler design
Peephole optimization techniques in compiler designPeephole optimization techniques in compiler design
Peephole optimization techniques in compiler designAnul Chaudhary
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 

What's hot (20)

Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Email security
Email securityEmail security
Email security
 
Knowledge representation In Artificial Intelligence
Knowledge representation In Artificial IntelligenceKnowledge representation In Artificial Intelligence
Knowledge representation In Artificial Intelligence
 
Web Security
Web SecurityWeb Security
Web Security
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Peephole optimization techniques in compiler design
Peephole optimization techniques in compiler designPeephole optimization techniques in compiler design
Peephole optimization techniques in compiler design
 
Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Steganography
Steganography Steganography
Steganography
 
Recognition-of-tokens
Recognition-of-tokensRecognition-of-tokens
Recognition-of-tokens
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 

Similar to Substitution techniques

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptxChethanKrishna14
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesramya marichamy
 
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppthusnainali397602
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.pptutsavkakkad1
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdfDevangShukla10
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)SrideviM4
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answersprdpgpt
 
MyCryptography.2023.ppt
MyCryptography.2023.pptMyCryptography.2023.ppt
MyCryptography.2023.ppthalosidiq1
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 

Similar to Substitution techniques (20)

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
CNS UNIT-II.pptx
CNS UNIT-II.pptxCNS UNIT-II.pptx
CNS UNIT-II.pptx
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
Crypto
CryptoCrypto
Crypto
 
MyCryptography.2023.ppt
MyCryptography.2023.pptMyCryptography.2023.ppt
MyCryptography.2023.ppt
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 

Recently uploaded

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Substitution techniques

  • 1. SUBSTITUTION TECHNIQUES Submitted by P.VINITHA M .SURYA M.SARANYA P.NITHYA (NADAR SARESWATHI COLLEGE OF ART AND SCIENCE)THENI. II MSC(CS&IT)
  • 2. SUBTITUTION TECHNIQUES • The two basic building block of all the encryption techniques are substitution and transposition . A substitution techniques is one in which the letter of plaintext are replaced by other letter or by number or symbols . The subsitution techniques have a four techniques caeser cipher monoalphabetic cipher play fair cipher hill cipher polyalphabetic cipher
  • 3. Caeser cipher • caeser cipher involves replacing each letter of the alphabet with the letter standing three place further down the alphabet plain : meet me after the to go party cipher: DREFR JUKHI TYRTY ELKJH VFDCB we can define transposition listing plain: a b c d e f g h I j k l m cipher :DE F G H I K L M N O P Q R S T U . The algorithm can be expressed: plain text p,subsitution the cipher text c2 c=E(3,p)=(p+3)mod 26 gentral caeser algorithm: c=E(k,p)=(p+k)mod 26
  • 4. three important characteristics of this problem 1.encryption and decryption algorithm 2.there are 25 key 3.the language are plaintext the text file comprressed using algorithm called ZIP EX:BRUTE FORCE CRYPTANALYSIS OF CAESER CIPHER PHHW PH WKH OGGU OG VJG
  • 5. MONOALPHABETIC CIPHER • The can 25 key possible key ,caeser cipher is far from secure, • The are 26 alphabetic characters ,10 order of magnitude greater then key space DES • this also called monoalphabetic subsitution cipher • Ex: NYUTGHREDSWACXZFGHJKLIOLPMNBGTYREFCVXD LOIKUJYTRGFDCVBHNUYTREWASEDXZCDSFREDFVBNMKOLP The realtive frequency on cipher text in (percentage) P 13.33 Z 11.67 S 8.33 U 8.33 O 7.50 F 3.33 W 3.33 Q 2.50 T 2.50
  • 6. 0 10 20 30 40 50 60 70 80 90 100 a b c d Series 1 Series 2 Series 3
  • 7. • Monoalphabet cipher reficect frequency data original alphabet • Multiple subsitution know as homophones • EX: different cipher models 16,17,35,21 homophone using rotation randomely
  • 8. PLAYFAIR CIPHER the multiple letter encryption is play Fair The play fair algorithm is based on used construer using keyword THE KEYWORD “MONOARCHY” M C O H N Y A R B D E F G I/J K L P Q S T U V W X Z
  • 9. • THE FOLLOWING RUIE IN PLAY FAIR: • 1. repeating plaintext letter are the same pair filltering letter • 2. two plaintext letter in same row of the matrix are replaced the letter to the right • 3.top the element colum circulary from the last • Play fair text easy to break • Ex:relative frequency of occurrence of letters:
  • 10. 0 10 20 30 40 50 60 70 80 90 100 2 3 4 5 Series 1 Series 2 Series 3
  • 11. HILL CIPHER .The multiletter cipher hill cipher developed by the mathematician Lester hill in 1929. . The algorithm m plaintext letter substitution cipher text m ,numerical value(a=0,b=1,….z=25) c1=(k11p1+k12p2+k13p3)mod 26 c2=(k21p1+k22p2+k23p3)mod 26 c3=(k31p1+k32p2+k33p3)mod 26 the column of vectors: c1 k11 k12 k13 p1 c2 k21 k22 k23 p2 mod 26 c3 k31 k32 k33 p3
  • 12. • c=kp mod 26 • c and p colum of vectorsog length 3,plaintext cipher text and k represent encryption key • Ex: 17 17 5 15 375 11 k= 21 18 21 % 0 = 819 mod 26 13 2 2 19 24 486 18
  • 13. The square matrix determinate matrix equals sum of all the product can be one element each colum from each row on element . EX: matrix k11 k12 k21 k22
  • 14. POLALPHABETIC CIPHER • The general name approach is polyalphabetic subsitution cipher • the feature: 1. monoalphabetic rule is used 2. choose given transformation key:meetmemeetmemeetme plaintext:ewrdsfhthyujkikllolol ciphertext:ZCSDEFRGTHBVNJUIKMNK The ciphertext row determined column and plain text top of the column vigenere proposed is refereed to auto key system
  • 15. a b c d e A B C D E B C D E F C D E F G D E F G H
  • 16. • This system works on binary data ,the system expressed follows: ci=pi+ki Where: pi=binary digit plaintext ki=binary digit key ci=binary digit cipher text