SlideShare a Scribd company logo
CS8792 – Cryptography and
Network Security
~ S. Janani, AP/CSE
KCET
Classical Encryption Techniques
Contents
• Basic Terminology
• Symmetric Encryption model
• Classical Encryption Techniques
• Substitution Cipher
• Transposition Cipher
• Steganography
• Rotar Machines
Basic Terminology
• Plaintext – The original message
• Ciphertext – Coded message
• Enciphering/Encryption – Process of converting from PT to
CT
• Deciphering/Decryption – Process of converting from CT to
PT
• Cryptography – Study of encryption
• Cryptanalysis – Techniques used to decrypt a message
without any knowledge of encrypting details
• Cryptology – Cryptography + Cryptanalysis
Symmetric Encryption Model
-Conventional or single
key encryption system
-Was the only type of
encryption in prior to
public key encryption in
1970’s
Model of Symmetric Crypto system
3 Dimensions of Cryptographic System
Types of Attacks
Bruteforce attack
Classical
Encryption
Techniques
Substitution
Techniques
Caesar Cipher Monoalphabetic
Cipher
Polyalphabetic
Cipher
Vigenere
Cipher
Playfair Cipher Hill Cipher Vernam Cipher
Transposition
Techniques
Railfence
Row Column
Transposition
Substitution Techniques
• Letters of plain texts are replaced by the other
letters or by numbers or symbols
1. Caesar Cipher
Classical Encryption Techniques
2. Monoalphabetic cipher
Classical Encryption Techniques
3. Polyalphabetic cipher
• Uses number of substitutions at different
positions of a message
Playfair Cipher
Classical Encryption Techniques
Hill Cipher
• Developed by the Mathematician Lester Hill in1929
• Strength is that it completely hides single-letter
frequencies
• The use of a larger matrix hides mode frequency
information
• A 3X3 Hill cipher hides not only single-letter but
also two-letter frequency information
• Strong against a ciphertext-only attack but easily
broken with a know plaintext attack
Classical Encryption Techniques
Vigenere Cipher
Classical Encryption Techniques
Vernam Cipher
Classical Encryption Techniques
Transposition Cipher
Row Columnar Transposition
Classical Encryption Techniques

More Related Content

PPTX
Substitution techniques
PPTX
Diffie hellman key exchange algorithm
PPTX
Network Security- Secure Socket Layer
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PDF
CNS - Unit - 4 - Public Key Cryptosystem
PPTX
Routing algorithm
PDF
Elliptic curve cryptography
PPT
Network security cryptographic hash function
Substitution techniques
Diffie hellman key exchange algorithm
Network Security- Secure Socket Layer
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
CNS - Unit - 4 - Public Key Cryptosystem
Routing algorithm
Elliptic curve cryptography
Network security cryptographic hash function

What's hot (20)

PPTX
Input-Buffering
PDF
Web Security
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
evaluation of statistical expression, materialised views, evaluation plans
PPTX
Peephole Optimization
PPT
Email Security : PGP & SMIME
PPTX
Pgp pretty good privacy
PPTX
Classical encryption techniques
PPTX
Public Key Cryptography
PPTX
Double DES & Triple DES
PPTX
Security services and mechanisms
PPTX
Types of Parser
PDF
Electronic mail security
PPTX
Text compression
PDF
RSA ALGORITHM
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Chapter 1 Introduction of Cryptography and Network security
PDF
Storage organization and stack allocation of space
PPTX
MD5 ALGORITHM.pptx
PDF
Target language in compiler design
Input-Buffering
Web Security
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
evaluation of statistical expression, materialised views, evaluation plans
Peephole Optimization
Email Security : PGP & SMIME
Pgp pretty good privacy
Classical encryption techniques
Public Key Cryptography
Double DES & Triple DES
Security services and mechanisms
Types of Parser
Electronic mail security
Text compression
RSA ALGORITHM
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Chapter 1 Introduction of Cryptography and Network security
Storage organization and stack allocation of space
MD5 ALGORITHM.pptx
Target language in compiler design
Ad

Similar to Classical Encryption Techniques (20)

PDF
Computer Security Lecture 2: Classical Encryption Techniques 1
PPT
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
PPT
Classic Information encryption techniques
PPTX
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
PPTX
MODULE 1 PART 111111111111111111111.pptx
PPTX
Module 1.pptx
PPT
overview of cryptographic techniques
PDF
Classical Encryption Techniques
PPT
Cyptography and network security
PPT
EncryptionTechChap2.ppt
PDF
Network security CS2
PPTX
Unit -1 cryptography contiues with algorithm.pptx
PDF
Classical encryption techniques
PPTX
Classical encryption techniques
PDF
Computer Security (Cryptography) Ch01
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPT
Cns 13f-lec03- Classical Encryption Techniques
PPT
Classical Encryption Techniques in Network Security
PDF
Cipher techniques
Computer Security Lecture 2: Classical Encryption Techniques 1
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
Classic Information encryption techniques
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
MODULE 1 PART 111111111111111111111.pptx
Module 1.pptx
overview of cryptographic techniques
Classical Encryption Techniques
Cyptography and network security
EncryptionTechChap2.ppt
Network security CS2
Unit -1 cryptography contiues with algorithm.pptx
Classical encryption techniques
Classical encryption techniques
Computer Security (Cryptography) Ch01
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Cns 13f-lec03- Classical Encryption Techniques
Classical Encryption Techniques in Network Security
Cipher techniques
Ad

More from Sou Jana (20)

PPTX
Cyber-Attacks-in-SEVEN OSI -Layers .pptx
PPT
PGP S/MIME
PPTX
UHV Self Management and Peer Pressure.pptx
PPTX
RC4.pptx
PPT
X.509 Certificates
PPT
Digital Signature Standard
PPT
Message Authentication Requirement-MAC
PPT
Kerberos
PPTX
Elliptic Curve Cryptography
PPT
Elgamal Digital Signature
PPT
Key management.ppt
PPTX
Mathematics of Asymmetric cryptography
PPTX
RSA Algm.pptx
PPTX
Diffie Hellman.pptx
PPTX
Security Model
PPTX
Perfect Security
PPTX
Cryptanalysis
PPTX
Information Theory
PPTX
Product Cipher
PPTX
Multicore and shared multi processor
Cyber-Attacks-in-SEVEN OSI -Layers .pptx
PGP S/MIME
UHV Self Management and Peer Pressure.pptx
RC4.pptx
X.509 Certificates
Digital Signature Standard
Message Authentication Requirement-MAC
Kerberos
Elliptic Curve Cryptography
Elgamal Digital Signature
Key management.ppt
Mathematics of Asymmetric cryptography
RSA Algm.pptx
Diffie Hellman.pptx
Security Model
Perfect Security
Cryptanalysis
Information Theory
Product Cipher
Multicore and shared multi processor

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
web development for engineering and engineering
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
DOCX
573137875-Attendance-Management-System-original
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Sustainable Sites - Green Building Construction
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Arduino robotics embedded978-1-4302-3184-4.pdf
Digital Logic Computer Design lecture notes
web development for engineering and engineering
bas. eng. economics group 4 presentation 1.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
573137875-Attendance-Management-System-original
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Internet of Things (IOT) - A guide to understanding
ETO & MEO Certificate of Competency Questions and Answers
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Lesson 3_Tessellation.pptx finite Mathematics
Foundation to blockchain - A guide to Blockchain Tech
OOP with Java - Java Introduction (Basics)
Sustainable Sites - Green Building Construction
CYBER-CRIMES AND SECURITY A guide to understanding

Classical Encryption Techniques