SlideShare a Scribd company logo
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 Plaintext:
This is often the initial intelligible message
or information that's fed into the algorithmic
program as input.
 Encryption algorithm:
 The cryptography algorithmic
program performs numerous substitutions
and transformations on the plaintext.
 Secret key:
The key key's conjointly input to
the coding algorithmic program.
The key's a worth freelance of the plaintext
and of the algorithmic program.
The algorithmic program can turn out a
special output betting on the
precise key getting used at the time. the
precise substitutions and transformations
performed by the algorithmic program rely
on the key.
 Cipher text:
It depends on the plaintext and also
the secret key. For a given
message, 2 totally different completely
different} keys can turn out 2 different cipher
texts. The cipher text is Associate in
Nursing apparently random stream of
knowledge and, because it stands, is
unintelligible.
 Decryption algorithm: This
is primarily the cryptography rule run in
reverse. It takes the ciphertext and also
the secret key and produces the
first plaintext.
M.Sridevi II-M.Sc (computer science)
 Thisis primarily the cryptography rule run
in reverse.
 It takes the ciphertext and also the secret
key and produces the first plaintext.
 Cryptographic systems area
unit characterized 3 freelance dimensions.
The type of operation is
employed for remodeling plaintext to cipher
text.
 All encoding algorithmic rule area
unit supported 2 general principles:
substitution. within which every
component within the plaintext(bit,
letter, cluster of bits or letter) is mapped into
another component and transposition. within
which components within the plaintext area
unit rearranged. the basic demand is that
no info be lost(i.e., that each
one operations area unit reversible). Most
system, reffered to as product systems, involve
multiple stages of substitution and
transpositions.
 The number of keys used. If each sender
and receiver use identical key, the system
is stated as symmetrical , single-key,
secret-key, or standard encoding. If the
sender and receiver use totally
different keys, the system
is stated as uneven, two-key, public-
key encoding.
 The means within which the plaintext is
processed. A block cipher processes the input
one block of parts at a
time, manufacturing Associate in
Nursing output block for every input block. A
stream cipher processes the
input parts ceaselessly. manufacturing outp
ut one part at a time, because it goes on.
 Cryptanalysis:
cryptology attacks have faith in the
character of the algorithmic
program and maybe some information of the
overall characteristics of the plaintext or
maybe some sample plaintext-cipher text
pairs.
 This sort of attacks exploits the characteristics
of the algorithmic programto aim to deduce a
particular plaintext or to deduce the
key getting used.
 Brute-Force attack:
The attacker tries every possible key on a
piece of cipher-text until an intelligible
translation into plaintext is obtained. On
average, half of all possible keys must be
tried to achieve success.
M.Sridevi II-M.Sc (computer science)
 Is one during which the letters of
plaintext are replaced by alternative letters
or by numbers or symbols.
 If the plaintext is viewed as a sequence of
bits, then substitution
involves exchange plaintext bit patterns with
ciphertext bit patterns
 Simplest and earliest best-known use of a
substitution cipher used by general.
 Involves replacement every letter of the
alphabet with the letter
standing 3 places additional down the alphabet
 Alphabet is wrapped around in order that the
letter following Z may be a
 plain: meet me after the toga
party
 cipher: PHHW PH DIWHU WKH WRJD
SDUWB
 Can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
 Mathematically give each letter a number
a b c d e f g h i j k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
 Algorithm can be expressed as: c = E(3, p) = (p + 3) mod (26)
› A shift may be of any amount, so that the general Caesar algorithm
is:
C = E(k , p ) = (p + k ) mod 26
 Where k takes on a value in the range 1 to 25;
 the decryption algorithm is simply:
 p = D(k , C ) = (C - k ) mod 26
M.Sridevi II-M.Sc (computer science)
 With only 25 possible keys, the caeser cipher is
so far from secure. A dramatic increase in the
key space can achieved by allowing arbitrary
substitution. Before proceeding, we define the
term permutation. A Permutation of finite set of
elements S is an ordered sequence of all the
elements of S, with each element appearing
exactly once. For example, if S={a, b, c}, there
are six permutations of S.
abc, acb, bac, bca, cab, cba,
 If the “cipher” line may be any permutation of
the twenty six alphabetic characters, then
there square measure 26!
or larger than 4x1026 potential keys. this is
often ten orders of magnitude larger than
the key house for DES
 Approach is named as a monoalphabetic
substitution cipher as a result of one cipher
alphabet is employed per message
 The known multiple
letter cryptography cipher is that
the playfair, that treats diagrams within
the plaintext as single units
and interprets these units into ciphertext
diagrams
 The playfair algorithm is based on the use of
5x5 matrix of letters constructed using a
keyword.
 Hill cipher is developed by the man of
science Lester Hill in 1929. Strength is that
it fully hides single-letter frequencies.
 The use of a bigger matrix hides a lot
of frequency info
 A 3x3 Hill cipher hides not solely single-
letter however additionally two-letter
frequency info try other relevant Tools
 This example will rely on some linear
algebra and some number theory.
The key for a hill cipher is a matrix e.g.
 In the higher than case, we've got taken the
dimensions to be 3×3, but it will be any size
(as long because it is square).
 Assume we wish to inscribe the message
ATTACK AT DAWN. To inscribe this, we'd
like to interrupt the message into chunks of
three. we tend to currently take the
primary three characters from our plaintext, ATT
and produce a vector that corresponds to the
letters (replace A with 0, B with 1 ... Z with 25
etc.) to get: [0 nineteen 19] (this is ['A' 'T' 'T']).
 To get our ciphertext we perform a matrix
multiplication (you may need to
revise matrix multiplication if this doesn't
make sense):
 This method is performed for
all three letter blocks within the plaintext.
The plaintext might have to be
compelled tobe soft with
some further letters to
create positive that there's a
full range of blocks.
 Now for the tricky part, the decryption.
We need to find an inverse matrix modulo
26 to use as our 'decryption key'. i.e.
we want something that will take 'PFO'
back to 'ATT'. If our 3 by 3 key matrix is
called K, our decryption key will be the 3
by 3 matrix K-1, which is the inverse of K.
To find K-1 we have to use a bit of maths.
It turns out that K-1 above can be calculated
from our key
M.Sridevi II-M.Sc (computer science)

More Related Content

PDF
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
PPTX
Classical encryption techniques
PPTX
Cryptography (Revised Edition)
PPTX
Substitution techniques
PPTX
Cryptography
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Classical encryption techniques
Cryptography (Revised Edition)
Substitution techniques
Cryptography

What's hot (20)

PPT
Secure Encyrption Systems Chapter 2
PDF
Classical encryption techniques
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPTX
Introduction to cryptography and types of ciphers
PPT
Basic Encryption Decryption Chapter 2
PPTX
Cypher technique
PPT
Crypto
PPTX
Classical encryption techniques
PPTX
Caesar cipher
PPT
Classical Encryption
PPT
Cipher techniques
PDF
Password Cracking with Rainbow Tables
PDF
Computer Security Lecture 2: Classical Encryption Techniques 1
PPTX
Unit i
PPTX
Secret key cryptography
PDF
Mid term
DOCX
Symmetric ciphers questions and answers
PPTX
Transposition cipher techniques
Secure Encyrption Systems Chapter 2
Classical encryption techniques
Cryptography and Network Security William Stallings Lawrie Brown
Introduction to cryptography and types of ciphers
Basic Encryption Decryption Chapter 2
Cypher technique
Crypto
Classical encryption techniques
Caesar cipher
Classical Encryption
Cipher techniques
Password Cracking with Rainbow Tables
Computer Security Lecture 2: Classical Encryption Techniques 1
Unit i
Secret key cryptography
Mid term
Symmetric ciphers questions and answers
Transposition cipher techniques
Ad

Similar to M.Sridevi II-M.Sc (computer science) (20)

PPTX
Mod1 basics cryptography first module vtu
PPT
EncryptionTechChap2.ppt
PPTX
Information security (Symmetric encryption, cryptography, crypto-analysis)
PPTX
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
PPTX
Module 1.pptx
PPTX
cryptographyandnetworksecu-module-1.pptx
PPT
Cryptography - Overview
PPTX
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
PPTX
Cyber Security Part-2.pptx
PPTX
MODULE 1 PART 111111111111111111111.pptx
PPTX
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
PPT
ch_03 Traditional ciphering (1).ppt.xxxxxxxxx
PDF
module 1 (part A).pdf
PPTX
CS8792 - Cryptography and Network Security
DOCX
Cryptography and Network Security Principles and Practice
PPT
classicalencryptiontechniques.ppt
PPT
Cryptography.ppt
PPTX
cryptography symmentric.pptx
PPTX
Cryptography and Network Security--MOD-2.pptx
PPT
7 cryptography
Mod1 basics cryptography first module vtu
EncryptionTechChap2.ppt
Information security (Symmetric encryption, cryptography, crypto-analysis)
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
Module 1.pptx
cryptographyandnetworksecu-module-1.pptx
Cryptography - Overview
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
Cyber Security Part-2.pptx
MODULE 1 PART 111111111111111111111.pptx
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
ch_03 Traditional ciphering (1).ppt.xxxxxxxxx
module 1 (part A).pdf
CS8792 - Cryptography and Network Security
Cryptography and Network Security Principles and Practice
classicalencryptiontechniques.ppt
Cryptography.ppt
cryptography symmentric.pptx
Cryptography and Network Security--MOD-2.pptx
7 cryptography
Ad

Recently uploaded (20)

PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
Supply Chain Operations Speaking Notes -ICLT Program
01-Introduction-to-Information-Management.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
STATICS OF THE RIGID BODIES Hibbelers.pdf
Computing-Curriculum for Schools in Ghana
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc

M.Sridevi II-M.Sc (computer science)

  • 3.  Plaintext: This is often the initial intelligible message or information that's fed into the algorithmic program as input.  Encryption algorithm:  The cryptography algorithmic program performs numerous substitutions and transformations on the plaintext.
  • 4.  Secret key: The key key's conjointly input to the coding algorithmic program. The key's a worth freelance of the plaintext and of the algorithmic program. The algorithmic program can turn out a special output betting on the precise key getting used at the time. the precise substitutions and transformations performed by the algorithmic program rely on the key.
  • 5.  Cipher text: It depends on the plaintext and also the secret key. For a given message, 2 totally different completely different} keys can turn out 2 different cipher texts. The cipher text is Associate in Nursing apparently random stream of knowledge and, because it stands, is unintelligible.
  • 6.  Decryption algorithm: This is primarily the cryptography rule run in reverse. It takes the ciphertext and also the secret key and produces the first plaintext.
  • 8.  Thisis primarily the cryptography rule run in reverse.  It takes the ciphertext and also the secret key and produces the first plaintext.  Cryptographic systems area unit characterized 3 freelance dimensions. The type of operation is employed for remodeling plaintext to cipher text.
  • 9.  All encoding algorithmic rule area unit supported 2 general principles: substitution. within which every component within the plaintext(bit, letter, cluster of bits or letter) is mapped into another component and transposition. within which components within the plaintext area unit rearranged. the basic demand is that no info be lost(i.e., that each one operations area unit reversible). Most system, reffered to as product systems, involve multiple stages of substitution and transpositions.
  • 10.  The number of keys used. If each sender and receiver use identical key, the system is stated as symmetrical , single-key, secret-key, or standard encoding. If the sender and receiver use totally different keys, the system is stated as uneven, two-key, public- key encoding.
  • 11.  The means within which the plaintext is processed. A block cipher processes the input one block of parts at a time, manufacturing Associate in Nursing output block for every input block. A stream cipher processes the input parts ceaselessly. manufacturing outp ut one part at a time, because it goes on.
  • 12.  Cryptanalysis: cryptology attacks have faith in the character of the algorithmic program and maybe some information of the overall characteristics of the plaintext or maybe some sample plaintext-cipher text pairs.  This sort of attacks exploits the characteristics of the algorithmic programto aim to deduce a particular plaintext or to deduce the key getting used.
  • 13.  Brute-Force attack: The attacker tries every possible key on a piece of cipher-text until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
  • 15.  Is one during which the letters of plaintext are replaced by alternative letters or by numbers or symbols.  If the plaintext is viewed as a sequence of bits, then substitution involves exchange plaintext bit patterns with ciphertext bit patterns
  • 16.  Simplest and earliest best-known use of a substitution cipher used by general.  Involves replacement every letter of the alphabet with the letter standing 3 places additional down the alphabet  Alphabet is wrapped around in order that the letter following Z may be a  plain: meet me after the toga party  cipher: PHHW PH DIWHU WKH WRJD SDUWB
  • 17.  Can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  Mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25  Algorithm can be expressed as: c = E(3, p) = (p + 3) mod (26) › A shift may be of any amount, so that the general Caesar algorithm is: C = E(k , p ) = (p + k ) mod 26  Where k takes on a value in the range 1 to 25;  the decryption algorithm is simply:  p = D(k , C ) = (C - k ) mod 26
  • 19.  With only 25 possible keys, the caeser cipher is so far from secure. A dramatic increase in the key space can achieved by allowing arbitrary substitution. Before proceeding, we define the term permutation. A Permutation of finite set of elements S is an ordered sequence of all the elements of S, with each element appearing exactly once. For example, if S={a, b, c}, there are six permutations of S. abc, acb, bac, bca, cab, cba,
  • 20.  If the “cipher” line may be any permutation of the twenty six alphabetic characters, then there square measure 26! or larger than 4x1026 potential keys. this is often ten orders of magnitude larger than the key house for DES  Approach is named as a monoalphabetic substitution cipher as a result of one cipher alphabet is employed per message
  • 21.  The known multiple letter cryptography cipher is that the playfair, that treats diagrams within the plaintext as single units and interprets these units into ciphertext diagrams
  • 22.  The playfair algorithm is based on the use of 5x5 matrix of letters constructed using a keyword.
  • 23.  Hill cipher is developed by the man of science Lester Hill in 1929. Strength is that it fully hides single-letter frequencies.  The use of a bigger matrix hides a lot of frequency info  A 3x3 Hill cipher hides not solely single- letter however additionally two-letter frequency info try other relevant Tools
  • 24.  This example will rely on some linear algebra and some number theory. The key for a hill cipher is a matrix e.g.
  • 25.  In the higher than case, we've got taken the dimensions to be 3×3, but it will be any size (as long because it is square).  Assume we wish to inscribe the message ATTACK AT DAWN. To inscribe this, we'd like to interrupt the message into chunks of three. we tend to currently take the primary three characters from our plaintext, ATT and produce a vector that corresponds to the letters (replace A with 0, B with 1 ... Z with 25 etc.) to get: [0 nineteen 19] (this is ['A' 'T' 'T']).
  • 26.  To get our ciphertext we perform a matrix multiplication (you may need to revise matrix multiplication if this doesn't make sense):
  • 27.  This method is performed for all three letter blocks within the plaintext. The plaintext might have to be compelled tobe soft with some further letters to create positive that there's a full range of blocks.  Now for the tricky part, the decryption. We need to find an inverse matrix modulo 26 to use as our 'decryption key'. i.e.
  • 28. we want something that will take 'PFO' back to 'ATT'. If our 3 by 3 key matrix is called K, our decryption key will be the 3 by 3 matrix K-1, which is the inverse of K. To find K-1 we have to use a bit of maths. It turns out that K-1 above can be calculated from our key