SlideShare a Scribd company logo
Cryptography
L03- Old Encryption algorithms
outline
 Old Encryption algorithms OR Classical Method
● Replacement Algorithms
● Caesar Cipher
● Full vigenere cipher
● Atbash Cipher
● Affine Cipher
● THE JEFFERSON CYLINDER
2
Classical Method Cryptography
 Replacement Algorithms
This algorithm is deployed in the Middle Ages and this algorithm based
on replacing each character of the alphabet with another character
in a particular order.
The number of attempts needed to break this algorithm is 26! ,and it is
equal to almost 10264.
To be breached depending on the frequency of the original language
characters ,Where are calculated by testing a large number of texts.
3
Classical Method Cryptography
 Replacement Algorithms
4
Classical Method Cryptography
 Caesar Cipher
Julius Caesar has to find a way that they named after him in 58 BC.
This method is based on a comparison between each letter of the
alphabet with a letter last, depending on the value of rotation.
We do not need a lot of effort to prove the weakness of this simple
algorithm where they depend on the rotation and therefore the value
of knowing the value of the rotation loosen the entire encrypted
message.
And calculates the number of possibilities for the value of rotation in
the English language, we find that it is a small value of 26 field easily
break through the algorithm and the discovery of the original
message.
5
Classical Method Cryptography
 Caesar Cipher
 Example : Word “SECRET” the encryption of this "VHFUHW“
where the rotation key is 3
6
Classical Method Cryptography
 Full vigenere cipher
The Leon Battista Albert develop this algorithm in 1467 AD.
The code is used to switch between the appropriate disk letters.
The working principle of this algorithm depends on the encryption
table.
7
Classical Method Cryptography
 Table of Full vigenere cipher
Example : the text “helloGreenDay” and key is “ForumForumFor”
The text after encryotion
became “Mscfalvyzlop”
8
Classical Method Cryptography
 Atbash Cipher
This Cipher of the simplest types of Cipher which was originally the
Hebrew language.
But it can be used in other languages.
Mode of operation as follows :
To make the first letter in the language is the last letter and the second
character is the last before etc...
9
Classical Method Cryptography
 Atbash Cipher
AZ
B Y
Etc >>>
10
Classical Method Cryptography
 Affine Cipher
Encryption is a way Affine Cipher confusion between the two types of
encryption ,the first type, a Caesar Cipher and the second is the
product Cipher.
Caesar be in encryption mathematical relation :
C = p + key MOD n
Product Cipher be in encryption relation :
C = p * key MOD n
Affine code brought together the two previous two relationships :
C = m*p + key MOD n
11
Classical Method Cryptography
 THE JEFFERSON CYLINDER
is one of the strongest encryption used in devices where the Cipher
generated strong can be broken easily never except in the case of the
theft of the entire device.
Name Jefferson back to its inventor THOMAS JEFFERSON Name.
This disc consists of some 36 wheel beside a row and 26, meaning that
each row by 36 character.
12
Classical Method Cryptography
 THE JEFFERSON CYLINDER
13
Thanks for watching
14

More Related Content

PPT
Cipher techniques
PPT
overview of cryptographic techniques
PPT
Chguatda.com/cmx.p02...1
PPT
Elementary cryptography
PDF
basic encryption and decryption
PPT
Caesar cipher
PPT
History of Cipher System
PPTX
Cryptography with caesar Cipher
Cipher techniques
overview of cryptographic techniques
Chguatda.com/cmx.p02...1
Elementary cryptography
basic encryption and decryption
Caesar cipher
History of Cipher System
Cryptography with caesar Cipher

What's hot (20)

PDF
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
PPTX
Transposition Chiper (Grid)
PPT
Lecture 11
PPT
Fundamentals of cryptography
PPT
Ch02 classic nemo
PPT
Classical Encryption Techniques
PPT
Classical Encryption
PPSX
Introductory Lecture on Cryptography and Information Security
PPT
Cryptography - An Overview
PPT
Cryptography - A Brief History
PPTX
Cryptography
PPTX
Transposition Cipher
PPT
Cryptography
PPT
Elementry Cryptography
PPTX
Cryptography and applications
PDF
Introduction to Cryptography Part I
PPTX
Classical encryption techniques
PPT
Classical Encryption Techniques in Network Security
PDF
What is Cryptography?
PDF
Information Security Cryptography ( L02- Types Cryptography)
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Transposition Chiper (Grid)
Lecture 11
Fundamentals of cryptography
Ch02 classic nemo
Classical Encryption Techniques
Classical Encryption
Introductory Lecture on Cryptography and Information Security
Cryptography - An Overview
Cryptography - A Brief History
Cryptography
Transposition Cipher
Cryptography
Elementry Cryptography
Cryptography and applications
Introduction to Cryptography Part I
Classical encryption techniques
Classical Encryption Techniques in Network Security
What is Cryptography?
Information Security Cryptography ( L02- Types Cryptography)
Ad

Viewers also liked (6)

PPTX
Caesar Cipher
PDF
The Caesar Cipher
PPTX
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
PPTX
Caesar cipher
PPT
Encryption And Decryption
 
PPTX
Cryptography
Caesar Cipher
The Caesar Cipher
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Caesar cipher
Encryption And Decryption
 
Cryptography
Ad

Similar to Information Security Cryptography ( L03- Old Cryptography Algorithms ) (20)

PPT
MyCryptography.2023.ppt
PPTX
Secret key cryptography
PPT
UNIT 2.ppt
PPTX
Cryptography
PPT
unit 2.ppt
PPTX
Classical cyphers python programming
PPT
ch02 cryptograpghy in network security.ppt
PPT
PPT
2. Classical Cryptosystems Classical.ppt
PDF
Enhancing security of caesar cipher using different
PPTX
4.Cryptography handout 2.pptx
PDF
Enhancing security of caesar cipher using different
PPTX
MODULE 1 PART 111111111111111111111.pptx
PPT
classicalencryptiontechniques.ppt
PPTX
Classical encryption techniques
PPTX
Cryptography (Revised Edition)
PPT
EncryptionTechChap2.ppt
PPT
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
PPT
Computer systems security 7-cryptography.ppt
PPT
Cryptography - Overview
MyCryptography.2023.ppt
Secret key cryptography
UNIT 2.ppt
Cryptography
unit 2.ppt
Classical cyphers python programming
ch02 cryptograpghy in network security.ppt
2. Classical Cryptosystems Classical.ppt
Enhancing security of caesar cipher using different
4.Cryptography handout 2.pptx
Enhancing security of caesar cipher using different
MODULE 1 PART 111111111111111111111.pptx
classicalencryptiontechniques.ppt
Classical encryption techniques
Cryptography (Revised Edition)
EncryptionTechChap2.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
Computer systems security 7-cryptography.ppt
Cryptography - Overview

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf

Information Security Cryptography ( L03- Old Cryptography Algorithms )

  • 2. outline  Old Encryption algorithms OR Classical Method ● Replacement Algorithms ● Caesar Cipher ● Full vigenere cipher ● Atbash Cipher ● Affine Cipher ● THE JEFFERSON CYLINDER 2
  • 3. Classical Method Cryptography  Replacement Algorithms This algorithm is deployed in the Middle Ages and this algorithm based on replacing each character of the alphabet with another character in a particular order. The number of attempts needed to break this algorithm is 26! ,and it is equal to almost 10264. To be breached depending on the frequency of the original language characters ,Where are calculated by testing a large number of texts. 3
  • 4. Classical Method Cryptography  Replacement Algorithms 4
  • 5. Classical Method Cryptography  Caesar Cipher Julius Caesar has to find a way that they named after him in 58 BC. This method is based on a comparison between each letter of the alphabet with a letter last, depending on the value of rotation. We do not need a lot of effort to prove the weakness of this simple algorithm where they depend on the rotation and therefore the value of knowing the value of the rotation loosen the entire encrypted message. And calculates the number of possibilities for the value of rotation in the English language, we find that it is a small value of 26 field easily break through the algorithm and the discovery of the original message. 5
  • 6. Classical Method Cryptography  Caesar Cipher  Example : Word “SECRET” the encryption of this "VHFUHW“ where the rotation key is 3 6
  • 7. Classical Method Cryptography  Full vigenere cipher The Leon Battista Albert develop this algorithm in 1467 AD. The code is used to switch between the appropriate disk letters. The working principle of this algorithm depends on the encryption table. 7
  • 8. Classical Method Cryptography  Table of Full vigenere cipher Example : the text “helloGreenDay” and key is “ForumForumFor” The text after encryotion became “Mscfalvyzlop” 8
  • 9. Classical Method Cryptography  Atbash Cipher This Cipher of the simplest types of Cipher which was originally the Hebrew language. But it can be used in other languages. Mode of operation as follows : To make the first letter in the language is the last letter and the second character is the last before etc... 9
  • 10. Classical Method Cryptography  Atbash Cipher AZ B Y Etc >>> 10
  • 11. Classical Method Cryptography  Affine Cipher Encryption is a way Affine Cipher confusion between the two types of encryption ,the first type, a Caesar Cipher and the second is the product Cipher. Caesar be in encryption mathematical relation : C = p + key MOD n Product Cipher be in encryption relation : C = p * key MOD n Affine code brought together the two previous two relationships : C = m*p + key MOD n 11
  • 12. Classical Method Cryptography  THE JEFFERSON CYLINDER is one of the strongest encryption used in devices where the Cipher generated strong can be broken easily never except in the case of the theft of the entire device. Name Jefferson back to its inventor THOMAS JEFFERSON Name. This disc consists of some 36 wheel beside a row and 26, meaning that each row by 36 character. 12
  • 13. Classical Method Cryptography  THE JEFFERSON CYLINDER 13