SlideShare a Scribd company logo
11
Most read
13
Most read
16
Most read
11/6/2017 Ciesar Cipher 111/6/2017 Ciesar Cipher 1
Topic
Caesar Cipher Encryption Technique
MSC (Cs)-I (1ST SEM)
Year 2017-18
Submitted to Submitted by
Dr. H.S. HOTA (HOD) Dushhyant Kumar
(Department of CSA) Roll No. 06
11/6/2017 Ciesar Cipher 2
Content
11/6/2017 Ciesar Cipher 3
Introduction
The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’
meaning hidden and ‘graphene’ meaning writing.
Hieroglyph − The Oldest Cryptographic Technique
The first known evidence of cryptography can be traced to the use of ‘hieroglyph’.
Some 4000 years ago, the Egyptians used to communicate by messages written in
hieroglyph. This code was the secret known only to the scribes who used to transmit
messages on behalf of the kings.
Why need Cryptography?
Goal :- Secure communication(Protect data from Hackers & Crackers)
1. Confidentiality:- protection of data from unauthorized disclosure
2. Authentication:- The authentication service is concerned with assuring that a
communication is authentic persion.
3. Integrity:- assurance that data received is as sent by an authorized entity
11/6/2017 Ciesar Cipher 4
Introduction
11/6/2017 Ciesar Cipher 5
Introduction
Passive Attack: Traffic Analysis
11/6/2017 Ciesar Cipher 6
Introduction
Active Attack: Interruption
Block delivery of message
11/6/2017 Ciesar Cipher 7
Introduction
Fabricate message
Active Attack: Fabrication
11/6/2017 Caesar Cipher 8
Introduction
Modify messageModify message
Active Attack: Modification
11/6/2017 Ciesar Cipher 9
Introduction
Human being from ages had two inherent needs −
(a) to communicate and share information and
(b) to communicate selectively.
These two needs gave rise to the art of coding the messages in such a way
that only the intended people could have access to the information.
Unauthorized people could not extract any information, even if the
scrambled messages fell in their hand.
11/6/2017 Ciesar Cipher 10
What is cryptography?
Cryptography:-
The art or science encompassing the principles and methods
of transforming an intelligible message into one that is unintelligible, and
then retransforming that message back to its original form.
Cryptography can characterize by:
– type of encryption operations used
• substitution / transposition
– number of keys used
• single-key or private / two-key or public
– way in which plaintext is processed
• block / stream
11/6/2017 Ciesar Cipher 11
Basic Terminology
11/6/2017 Ciesar Cipher 12
Symmetric Encryption
11/6/2017 Ciesar Cipher 13
Symmetric Cipher Model
11/6/2017 Ciesar Cipher 14
Requirements
Two requirements for secure use of symmetric encryption:
– a strong encryption algorithm.
– a secret key known only to sender / receiver.
Y = EK(X)
X = DK(Y)
¨assume encryption algorithm is known
¨implies a secure channel to distribute key
Cipher text (y)
Plain text (x)
Key (K)
Encryption(E)
Decryption(D)
11/6/2017 Ciesar Cipher 15
Classical Encryption Technique
1. Substitution Ciphers:-
where letters of plaintext are replaced by
other letters or by numbers or symbols.
OR
if plaintext is viewed as a sequence of bits, then substitution involves replacing
plaintext bit patterns with cipher text t bit patterns.
Types of Substitution technique are :-
A. Caesar Cipher
B. Hill Cipher
C. Polyalphabetic Ciphers
D. One-Time Pad
E. Playfair Cipher
F. Monoalphabetic Ciphers
2. Transposition technique
11/6/2017 Ciesar Cipher 16
Caesar Cipher
Caesar Cipher earliest known substitution cipher “by Julius Caesar” first
attested use in military affairs replaces each letter by 3rd letter.
example:
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
Caesar Cipher
¨can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
replaces each letter by 3rd letter
11/6/2017 Ciesar Cipher 17
Caesar Cipher
Caesar Cipher can define Mathematical transformation as:
1. Now we apply the same method to calculation for encryption using the
Caesar cipher.
2. First we convert the letters of the alphabet to number so that we can
operate on them mathematically.
3. We convert ‘a’ to 0, ‘b’ to 1, ‘c’ to 3.right through to ‘z’ 25 as shown below.
then have Caesar cipher as:
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
11/6/2017 Caesar Cipher 18
Caesar Cipher
Caesar Cipher transformation Example:
1. Steps- Encryption and decryption process using Caesar cipher
2. Choose Plain text (original message).
3. Applying Caesar cipher replaces each letter by 3rd letter algorithm
4. Use key for Encryption
Key= Number of shift alphabet called key
Hello friend Plain text
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
11/6/2017 Ciesar Cipher 19
Caesar Cipher
Caesar Cipher transformation Example:
1. Encryption Process
= Plain text
K H O O R I U L H Q G
h e l l o f r i e n d
= E
= C
11/6/2017 Ciesar Cipher 20
Caesar Cipher
K H O O R I U L H Q G
Plain text
Cipher text =
Encryption process
h e l l o f r i e n d
Decryption process
h e l l o f r i e n dPlain text =
Key=Shift 3rd place alphabet
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
Cryptography with caesar Cipher
Cryptography with caesar Cipher

More Related Content

PPTX
Caesar cipher
PDF
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
PPT
Caesar cipher
PPTX
Activity playfair cipher.pptx
PPT
History of cryptography
PPTX
Transposition Cipher
PPT
Cryptography
PPTX
Cryptology
Caesar cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar cipher
Activity playfair cipher.pptx
History of cryptography
Transposition Cipher
Cryptography
Cryptology

What's hot (20)

PPT
Cryptography
PPT
Cryptography ppt
PPTX
Cryptography
PPTX
cryptography
PPT
Cryptography
PPT
Cryptography Fundamentals
PPT
Network Security and Cryptography
PDF
Introduction to Cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography and Network Security
PPT
Cryptography
PDF
symmetric key encryption algorithms
PPTX
Network security and cryptography
PDF
A Brief History of Cryptography
PPT
block ciphers
PPTX
Symmetric and asymmetric key
PPTX
Encryption algorithms
PPTX
Cryptography and applications
PPTX
Intro to modern cryptography
Cryptography
Cryptography ppt
Cryptography
cryptography
Cryptography
Cryptography Fundamentals
Network Security and Cryptography
Introduction to Cryptography
Cryptography.ppt
Cryptography and Network Security
Cryptography
symmetric key encryption algorithms
Network security and cryptography
A Brief History of Cryptography
block ciphers
Symmetric and asymmetric key
Encryption algorithms
Cryptography and applications
Intro to modern cryptography
Ad

Similar to Cryptography with caesar Cipher (20)

PDF
Data Security on Computer Network and Telecommunication System Using Caesar C...
PPTX
Block ciphers as used in symetric c.pptx
PPTX
Caesar Cipher.pptx Information Security ppt
DOCX
Cryptography 387 © David Lippman Creative Commons BY-.docx
PPTX
Presentation on Ceaser cipher encrypting messages
PPSX
Introductory Lecture on Cryptography and Information Security
PPT
cryptography.ppt
DOCX
SubstitutionAndCaesar
PPTX
cryptographyyy .pptx
PPT
7-cryptography in mobile security in network
PPT
Computer security communication networking cryptography .ppt
PPT
introduction to cryptography and its basic techniques
PPT
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
PPT
Chaos based cryprography - encryption & hash function
PPT
computer literacy works papers and pencil ew 9-crypt.ppt
PPT
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
PPT
the art of the fking dum crypto_basic.ppt
PPT
This is the presentation ofcryptography.ppt
PPT
7-cryptography.ppt
Data Security on Computer Network and Telecommunication System Using Caesar C...
Block ciphers as used in symetric c.pptx
Caesar Cipher.pptx Information Security ppt
Cryptography 387 © David Lippman Creative Commons BY-.docx
Presentation on Ceaser cipher encrypting messages
Introductory Lecture on Cryptography and Information Security
cryptography.ppt
SubstitutionAndCaesar
cryptographyyy .pptx
7-cryptography in mobile security in network
Computer security communication networking cryptography .ppt
introduction to cryptography and its basic techniques
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
Chaos based cryprography - encryption & hash function
computer literacy works papers and pencil ew 9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
the art of the fking dum crypto_basic.ppt
This is the presentation ofcryptography.ppt
7-cryptography.ppt
Ad

Recently uploaded (20)

PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
RMMM.pdf make it easy to upload and study
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Lesson notes of climatology university.
PDF
Insiders guide to clinical Medicine.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
01-Introduction-to-Information-Management.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPH.pptx obstetrics and gynecology in nursing
RMMM.pdf make it easy to upload and study
Module 4: Burden of Disease Tutorial Slides S2 2025
Final Presentation General Medicine 03-08-2024.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Sports Quiz easy sports quiz sports quiz
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Pre independence Education in Inndia.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
TR - Agricultural Crops Production NC III.pdf
Lesson notes of climatology university.
Insiders guide to clinical Medicine.pdf
Classroom Observation Tools for Teachers
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial disease of the cardiovascular and lymphatic systems
01-Introduction-to-Information-Management.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Cryptography with caesar Cipher

  • 1. 11/6/2017 Ciesar Cipher 111/6/2017 Ciesar Cipher 1 Topic Caesar Cipher Encryption Technique MSC (Cs)-I (1ST SEM) Year 2017-18 Submitted to Submitted by Dr. H.S. HOTA (HOD) Dushhyant Kumar (Department of CSA) Roll No. 06
  • 3. 11/6/2017 Ciesar Cipher 3 Introduction The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing. Hieroglyph − The Oldest Cryptographic Technique The first known evidence of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph. This code was the secret known only to the scribes who used to transmit messages on behalf of the kings. Why need Cryptography? Goal :- Secure communication(Protect data from Hackers & Crackers) 1. Confidentiality:- protection of data from unauthorized disclosure 2. Authentication:- The authentication service is concerned with assuring that a communication is authentic persion. 3. Integrity:- assurance that data received is as sent by an authorized entity
  • 4. 11/6/2017 Ciesar Cipher 4 Introduction
  • 5. 11/6/2017 Ciesar Cipher 5 Introduction Passive Attack: Traffic Analysis
  • 6. 11/6/2017 Ciesar Cipher 6 Introduction Active Attack: Interruption Block delivery of message
  • 7. 11/6/2017 Ciesar Cipher 7 Introduction Fabricate message Active Attack: Fabrication
  • 8. 11/6/2017 Caesar Cipher 8 Introduction Modify messageModify message Active Attack: Modification
  • 9. 11/6/2017 Ciesar Cipher 9 Introduction Human being from ages had two inherent needs − (a) to communicate and share information and (b) to communicate selectively. These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even if the scrambled messages fell in their hand.
  • 10. 11/6/2017 Ciesar Cipher 10 What is cryptography? Cryptography:- The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form. Cryptography can characterize by: – type of encryption operations used • substitution / transposition – number of keys used • single-key or private / two-key or public – way in which plaintext is processed • block / stream
  • 11. 11/6/2017 Ciesar Cipher 11 Basic Terminology
  • 12. 11/6/2017 Ciesar Cipher 12 Symmetric Encryption
  • 13. 11/6/2017 Ciesar Cipher 13 Symmetric Cipher Model
  • 14. 11/6/2017 Ciesar Cipher 14 Requirements Two requirements for secure use of symmetric encryption: – a strong encryption algorithm. – a secret key known only to sender / receiver. Y = EK(X) X = DK(Y) ¨assume encryption algorithm is known ¨implies a secure channel to distribute key Cipher text (y) Plain text (x) Key (K) Encryption(E) Decryption(D)
  • 15. 11/6/2017 Ciesar Cipher 15 Classical Encryption Technique 1. Substitution Ciphers:- where letters of plaintext are replaced by other letters or by numbers or symbols. OR if plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with cipher text t bit patterns. Types of Substitution technique are :- A. Caesar Cipher B. Hill Cipher C. Polyalphabetic Ciphers D. One-Time Pad E. Playfair Cipher F. Monoalphabetic Ciphers 2. Transposition technique
  • 16. 11/6/2017 Ciesar Cipher 16 Caesar Cipher Caesar Cipher earliest known substitution cipher “by Julius Caesar” first attested use in military affairs replaces each letter by 3rd letter. example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB Caesar Cipher ¨can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C replaces each letter by 3rd letter
  • 17. 11/6/2017 Ciesar Cipher 17 Caesar Cipher Caesar Cipher can define Mathematical transformation as: 1. Now we apply the same method to calculation for encryption using the Caesar cipher. 2. First we convert the letters of the alphabet to number so that we can operate on them mathematically. 3. We convert ‘a’ to 0, ‘b’ to 1, ‘c’ to 3.right through to ‘z’ 25 as shown below. then have Caesar cipher as: C = E(p) = (p + k) mod (26) p = D(C) = (C – k) mod (26)
  • 18. 11/6/2017 Caesar Cipher 18 Caesar Cipher Caesar Cipher transformation Example: 1. Steps- Encryption and decryption process using Caesar cipher 2. Choose Plain text (original message). 3. Applying Caesar cipher replaces each letter by 3rd letter algorithm 4. Use key for Encryption Key= Number of shift alphabet called key Hello friend Plain text a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
  • 19. a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C 11/6/2017 Ciesar Cipher 19 Caesar Cipher Caesar Cipher transformation Example: 1. Encryption Process = Plain text K H O O R I U L H Q G h e l l o f r i e n d = E = C
  • 20. 11/6/2017 Ciesar Cipher 20 Caesar Cipher K H O O R I U L H Q G Plain text Cipher text = Encryption process h e l l o f r i e n d Decryption process h e l l o f r i e n dPlain text = Key=Shift 3rd place alphabet C = E(p) = (p + k) mod (26) p = D(C) = (C – k) mod (26)