SlideShare a Scribd company logo
CRYTOPOGRAPHY
INTRODUCTION
CRYTOPOGRAPHY
1. Mod Operation
2. Matrix
Adjoint of a Matrix
Determinant Matrix
Inverse Matrix
CRYTOPOGRAPHY
1. Plain text: An Original Message Is Known As The Plaintext
2. Encryption: Process Of Converting From Plaintext To Ciphertext
3. Decryption:restoring The Plaintext From The Ciphertext
4. Key
5. Ciphertext: Coded Message
CRYTOPOGRAPHY
1. Symmetric Encryption Or Single-key Encryption
2. Asymmetric Encryption Or Two-key, Or Public-key Encryption
3. Stream Ciphers: Process Messages a Bit Or Byte At A Time
4. Block Ciphers: Process Messages In Blocks
CRYTOPOGRAPHY
CLASSICAL ENCRYPTIONTECHNIQUES: MODULE – 1
1.SYMMETRIC CIPHER MODEL
• Fig: Simplified Model of Symmetric Encryption
A SYMMETRIC ENCRYPTION SCHEME HAS FIVE
INGREDIENTS
1. Plaintext
2. Encryption or Enciphering
3. Secret key
4. Ciphertext
5. Decryption or Diciphering
➢ CRYPTOGRAPHY…securing information
➢ CRYPTOANALYSIS…study of dicipher
➢ CRYPTOLOGY….. The area of cryptography and cryptanalysis
TWO REQUIREMENTS FOR SECURE USE OF
CONVENTIONAL ENCRYPTION
• strong encryption algorithm
• Sender and receiver must have obtained copies of the secret key
MODEL OF SYMMETRIC CRYPTOSYSTEM
Fig:Model of Symmetric Cryptosystem
MODEL OF SYMMETRIC CRYPTOSYSTEM
• A source produces a message in plaintext, X = [X1, X2, ….. XM].
• For encryption, a key of the form K = [K1, K2, ….., KJ] is generated
• The encryption algorithm forms the ciphertextY = [Y1,Y2, …..YN].
• Y = E(K, X)
• X = D(K,Y)
CRYPTOGRAPHIC SYSTEMS ARE CHARACTERIZED
ALONG THREE INDEPENDENT DIMENSIONS:
• The type of operations used for transforming plaintext to ciphertext
• The number of keys used
• The way in which the plaintext is processed
A. block cipher
B. stream cipher
CRYPTANALYSIS AND BRUTE-FORCE ATTACK
• Cryptanalysis
• Brute-force attack
2.SUBSTITUTION CIPHERS`
1. Substitution
NOTE:
Plain text in lowercase
Cipher text in uppercase
CAESAR CIPHER
• Julius Caesar
• Replaces each letter of the alphabet with the letter standing 3 places further
down the alphabet.
NOTE: letter following z is A
example:
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
CAESAR CIPHER
Key : 3
CAESAR CIPHER
• A shift may be of any amount, so that the general Caesar algorithm is
C= E(k, p) = (p + k) mod 26
where k takes on a value in the range 1 to 25
The decryption algorithm is :
p = D(k, C) = (C - k) mod 26
D---decryption
K----key
CAESAR CIPHER
• brute-force cryptanalysis is easily performed
Three important characteristics of this problem enabled us to use a bruteforce
cryptanalysis:
• 1.The encryption and decryption algorithms are known.
• 2.There are only 25 keys to try.
• 3.The language of the plaintext is known and easily recognizable.
CAESAR CIPHER
BRUTEFORCE CRYPTANALYSIS:
CAESAR CIPHER
• Problems
MONOALPHABETIC CIPHER
• Permutation
• For example, if S = {a, b, c}, there are six permutations of S:
abc, acb, bac, bca, cab, cba
• In general, there are n! permutations of a set of n elements
MONOALPHABETIC CIPHER
Encryption:
Plain text: CAD
Cipher text: UGX
Decryption:
Cipher text: UGX
Plain text: CAD
A B C D E F G . . Z
G T U X Q P W . . N
MONOALPHABETIC CIPHER
• In English alphabet letter E is most frequently used—12.7%
• Second most common letter is T -------9.056%
• Two letter combinations we called DIGRAMS
• Most common together letter is TH –(plain text)
• Cipher text most common together letter is ZW
• Three letter combination is called TRIGRAM
• Most trigram used in the English text is THE
MONOALPHABETIC CIPHER
Standard most common using letter is E P----16/120*100=13.33%
Here most common using letter is P Z----14/120*100=11.67%
Standard Second most common letter is T
Here Second most common letter is Z
Now Replace
UTQSOVUOHXMOEVGPOTEEVSGTWSTOEFEESXUDBMETSXAIT
PLAYFAIR CIPHER
• The best-known multiple-letter encryption cipher is the Playfair
• invented by CharlesWheatstone in 1854, but named after his friend Baron Playfair
• The Playfair algorithm is based on the use of a 5 * 5 matrix of letters constructed using a
keyword.
PLAYFAIR KEY MATRIX
• Key : MONARCHY
• First we enter a given key
• start with alphabet A letter
• But here A is present in the key
• There fore start with alphabet B
• Combine I/J
• Note: if any one box empty after entering alphabets means wrong
PLAYFAIR CIPHER
Problems
Step1: construct matrix
Step2: broke the plain text in group of 2 alphabets
Step3: if both the alphabets are same or only letter is left
then add X after first first alphabet
Plain text: 1) JAZZ 2) OFF 3)WORLD
JA ZX ZX OF FX WO RL DX
HILL CIPHER
• Hill Algorithm
problems
POLYALPHABETIC CIPHERS
• polyalphabetic substitution ciphers
• improve security using multiple cipher alphabets
• make cryptanalysis harder with more alphabets to guess and flatter frequency
distribution
VIGENÈRE CIPHER
• We can express theVigenère cipher in the following manner
• Assume a sequence of plaintext letters P = p0, p1, p2, …., pn-1
• key consisting of the sequence of letters K = k0, k1, k2, …., km-1,
• ciphertext letters C = C0, C1, C2, ……, Cn-1
• C=E(K,P)
• C = C0, C1, C2, … Cn-1 = E(K, P) = E[(k0, k1, k2, …, km-1), (p0, p1, p2, …., pn-1)]
• (p0 + k0)mod 26, (p1 + k1)mod 26, ....., (pm-1 + km-1)mod 26,
• the first letter of the key is added to the first letter of the plaintext, mod 26,
• the second letters are added, and so on
• This process continues until all of the plaintext sequence is encrypted
VIGENÈRE CIPHER
• A general equation of the encryption process is
• Ci = (pi + ki mod m)mod 26
• decryption : pi = (Ci – ki mod m)mod 26
• For example, if the keyword is deceptive
• the message “we are discovered save yourself” ---------------problem
VIGENÈRE CIPHER
• Vigenère proposed what is referred to as an autokey system,
• For example, if the keyword is deceptive
• the message “we are discovered save yourself”------------problem
VERNAM CIPHER
• Introduced by an AT&T engineer named GilbertVernam in 1918
Introduced by an AT&T engineer named GilbertVernam in 1918
The system can be expressed: encryption
ci = pi ⊕ ki
pi = ith binary digit of plaintext
ki = ith binary digit of key
ci = ith binary digit of ciphertext
⊕ = exclusive-or (XOR) operation
decryption simply involves the same bitwise operation: pi = ci ⊕ ki
PROBLEMS
ONE-TIME PAD
• Joseph, proposed an improvement to theVernam cipher that yields the ultimate in security
• using a random key that is as long as the message
• key need not be repeated
• the key is to be used to encrypt and decrypt a single message, and then is discarded.
• Unbreakable
• (P+K)mod 27
• Space---26
problem
ONE-TIME PAD
• Consider the ciphertext
two fundamental difficulties:
1. large quantities of random keys
2. mammoth key distribution problem exists
TRANSPOSITION TECHNIQUES
Rail fence technique
• write message letters out diagonally over a number of rows
• then read off cipher row by row
• eg. write message out as:
m e m a t r h t g p r y
e t e f e t e o a a t
• giving ciphertext (The encrypted message is)
MEMATRHTGPRYETEFETEOAAT
ROW TRANSPOSITION CIPHERS
• a more complex transposition
• write letters of message out in rows over a specified number of columns
• then reorder the columns according to some key before reading off the rows
• The transposition cipher can be made significantly more secure by performing more than
one stage of transposition
(problem)
STEGANOGRAPHY
1. Character marking
2. Invisible ink
3. Pin punctures
4. Typewriter correction ribbon

More Related Content

PPTX
cryptography symmentric.pptx
PPT
EncryptionTechChap2.ppt
PPTX
cryptographyandnetworksecu-module-1.pptx
PDF
IS_Classical-Encryption-Techniques_5.pdf
PDF
Classical encryption techniques
PPTX
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PPTX
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
cryptography symmentric.pptx
EncryptionTechChap2.ppt
cryptographyandnetworksecu-module-1.pptx
IS_Classical-Encryption-Techniques_5.pdf
Classical encryption techniques
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf

Similar to module 1 (part A).pdf (20)

PPTX
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
PPTX
Mod1 basics cryptography first module vtu
PDF
Network security CS2
PPTX
Classical$ nn Encryption Techniques.pptx
PPT
Classical Encryption Techniques in Network Security
PPT
Cns 13f-lec03- Classical Encryption Techniques
PPTX
forth lecture of the information retrieval and management partB_2025.pptx
PPTX
Introduction to cryptography part2-final
PPT
encryptcryptographyyyyyyyyyyyyyyyyyy.ppt
PPTX
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
PDF
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
PPTX
Cybersecurity cyberlab3
PDF
Classical Encryption Techniques.pdf
PPT
overview of cryptographic techniques
PPTX
MODULE 1 PART 111111111111111111111.pptx
PPTX
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
PPTX
Cryptography and its types and Number Theory .pptx
PPTX
Cryptography-101
PPTX
PPT
Cryptography.ppt
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
Mod1 basics cryptography first module vtu
Network security CS2
Classical$ nn Encryption Techniques.pptx
Classical Encryption Techniques in Network Security
Cns 13f-lec03- Classical Encryption Techniques
forth lecture of the information retrieval and management partB_2025.pptx
Introduction to cryptography part2-final
encryptcryptographyyyyyyyyyyyyyyyyyy.ppt
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Cybersecurity cyberlab3
Classical Encryption Techniques.pdf
overview of cryptographic techniques
MODULE 1 PART 111111111111111111111.pptx
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
Cryptography and its types and Number Theory .pptx
Cryptography-101
Cryptography.ppt
Ad

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Business Ethics Teaching Materials for college
PDF
Classroom Observation Tools for Teachers
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Insiders guide to clinical Medicine.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
Anesthesia in Laparoscopic Surgery in India
Business Ethics Teaching Materials for college
Classroom Observation Tools for Teachers
O7-L3 Supply Chain Operations - ICLT Program
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Basic Mud Logging Guide for educational purpose
Week 4 Term 3 Study Techniques revisited.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pre independence Education in Inndia.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Pharma ospi slides which help in ospi learning
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Insiders guide to clinical Medicine.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Ad

module 1 (part A).pdf

  • 2. CRYTOPOGRAPHY 1. Mod Operation 2. Matrix Adjoint of a Matrix Determinant Matrix Inverse Matrix
  • 3. CRYTOPOGRAPHY 1. Plain text: An Original Message Is Known As The Plaintext 2. Encryption: Process Of Converting From Plaintext To Ciphertext 3. Decryption:restoring The Plaintext From The Ciphertext 4. Key 5. Ciphertext: Coded Message
  • 4. CRYTOPOGRAPHY 1. Symmetric Encryption Or Single-key Encryption 2. Asymmetric Encryption Or Two-key, Or Public-key Encryption 3. Stream Ciphers: Process Messages a Bit Or Byte At A Time 4. Block Ciphers: Process Messages In Blocks
  • 6. 1.SYMMETRIC CIPHER MODEL • Fig: Simplified Model of Symmetric Encryption
  • 7. A SYMMETRIC ENCRYPTION SCHEME HAS FIVE INGREDIENTS 1. Plaintext 2. Encryption or Enciphering 3. Secret key 4. Ciphertext 5. Decryption or Diciphering ➢ CRYPTOGRAPHY…securing information ➢ CRYPTOANALYSIS…study of dicipher ➢ CRYPTOLOGY….. The area of cryptography and cryptanalysis
  • 8. TWO REQUIREMENTS FOR SECURE USE OF CONVENTIONAL ENCRYPTION • strong encryption algorithm • Sender and receiver must have obtained copies of the secret key
  • 9. MODEL OF SYMMETRIC CRYPTOSYSTEM Fig:Model of Symmetric Cryptosystem
  • 10. MODEL OF SYMMETRIC CRYPTOSYSTEM • A source produces a message in plaintext, X = [X1, X2, ….. XM]. • For encryption, a key of the form K = [K1, K2, ….., KJ] is generated • The encryption algorithm forms the ciphertextY = [Y1,Y2, …..YN]. • Y = E(K, X) • X = D(K,Y)
  • 11. CRYPTOGRAPHIC SYSTEMS ARE CHARACTERIZED ALONG THREE INDEPENDENT DIMENSIONS: • The type of operations used for transforming plaintext to ciphertext • The number of keys used • The way in which the plaintext is processed A. block cipher B. stream cipher
  • 12. CRYPTANALYSIS AND BRUTE-FORCE ATTACK • Cryptanalysis • Brute-force attack
  • 13. 2.SUBSTITUTION CIPHERS` 1. Substitution NOTE: Plain text in lowercase Cipher text in uppercase
  • 14. CAESAR CIPHER • Julius Caesar • Replaces each letter of the alphabet with the letter standing 3 places further down the alphabet. NOTE: letter following z is A example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB
  • 16. CAESAR CIPHER • A shift may be of any amount, so that the general Caesar algorithm is C= E(k, p) = (p + k) mod 26 where k takes on a value in the range 1 to 25 The decryption algorithm is : p = D(k, C) = (C - k) mod 26 D---decryption K----key
  • 17. CAESAR CIPHER • brute-force cryptanalysis is easily performed Three important characteristics of this problem enabled us to use a bruteforce cryptanalysis: • 1.The encryption and decryption algorithms are known. • 2.There are only 25 keys to try. • 3.The language of the plaintext is known and easily recognizable.
  • 20. MONOALPHABETIC CIPHER • Permutation • For example, if S = {a, b, c}, there are six permutations of S: abc, acb, bac, bca, cab, cba • In general, there are n! permutations of a set of n elements
  • 21. MONOALPHABETIC CIPHER Encryption: Plain text: CAD Cipher text: UGX Decryption: Cipher text: UGX Plain text: CAD A B C D E F G . . Z G T U X Q P W . . N
  • 22. MONOALPHABETIC CIPHER • In English alphabet letter E is most frequently used—12.7% • Second most common letter is T -------9.056% • Two letter combinations we called DIGRAMS • Most common together letter is TH –(plain text) • Cipher text most common together letter is ZW • Three letter combination is called TRIGRAM • Most trigram used in the English text is THE
  • 23. MONOALPHABETIC CIPHER Standard most common using letter is E P----16/120*100=13.33% Here most common using letter is P Z----14/120*100=11.67% Standard Second most common letter is T Here Second most common letter is Z Now Replace UTQSOVUOHXMOEVGPOTEEVSGTWSTOEFEESXUDBMETSXAIT
  • 24. PLAYFAIR CIPHER • The best-known multiple-letter encryption cipher is the Playfair • invented by CharlesWheatstone in 1854, but named after his friend Baron Playfair • The Playfair algorithm is based on the use of a 5 * 5 matrix of letters constructed using a keyword.
  • 25. PLAYFAIR KEY MATRIX • Key : MONARCHY • First we enter a given key • start with alphabet A letter • But here A is present in the key • There fore start with alphabet B • Combine I/J • Note: if any one box empty after entering alphabets means wrong
  • 26. PLAYFAIR CIPHER Problems Step1: construct matrix Step2: broke the plain text in group of 2 alphabets Step3: if both the alphabets are same or only letter is left then add X after first first alphabet Plain text: 1) JAZZ 2) OFF 3)WORLD JA ZX ZX OF FX WO RL DX
  • 27. HILL CIPHER • Hill Algorithm problems
  • 28. POLYALPHABETIC CIPHERS • polyalphabetic substitution ciphers • improve security using multiple cipher alphabets • make cryptanalysis harder with more alphabets to guess and flatter frequency distribution
  • 29. VIGENÈRE CIPHER • We can express theVigenère cipher in the following manner • Assume a sequence of plaintext letters P = p0, p1, p2, …., pn-1 • key consisting of the sequence of letters K = k0, k1, k2, …., km-1, • ciphertext letters C = C0, C1, C2, ……, Cn-1 • C=E(K,P) • C = C0, C1, C2, … Cn-1 = E(K, P) = E[(k0, k1, k2, …, km-1), (p0, p1, p2, …., pn-1)] • (p0 + k0)mod 26, (p1 + k1)mod 26, ....., (pm-1 + km-1)mod 26, • the first letter of the key is added to the first letter of the plaintext, mod 26, • the second letters are added, and so on • This process continues until all of the plaintext sequence is encrypted
  • 30. VIGENÈRE CIPHER • A general equation of the encryption process is • Ci = (pi + ki mod m)mod 26 • decryption : pi = (Ci – ki mod m)mod 26 • For example, if the keyword is deceptive • the message “we are discovered save yourself” ---------------problem
  • 31. VIGENÈRE CIPHER • Vigenère proposed what is referred to as an autokey system, • For example, if the keyword is deceptive • the message “we are discovered save yourself”------------problem
  • 32. VERNAM CIPHER • Introduced by an AT&T engineer named GilbertVernam in 1918 Introduced by an AT&T engineer named GilbertVernam in 1918 The system can be expressed: encryption ci = pi ⊕ ki pi = ith binary digit of plaintext ki = ith binary digit of key ci = ith binary digit of ciphertext ⊕ = exclusive-or (XOR) operation decryption simply involves the same bitwise operation: pi = ci ⊕ ki PROBLEMS
  • 33. ONE-TIME PAD • Joseph, proposed an improvement to theVernam cipher that yields the ultimate in security • using a random key that is as long as the message • key need not be repeated • the key is to be used to encrypt and decrypt a single message, and then is discarded. • Unbreakable • (P+K)mod 27 • Space---26 problem
  • 34. ONE-TIME PAD • Consider the ciphertext two fundamental difficulties: 1. large quantities of random keys 2. mammoth key distribution problem exists
  • 35. TRANSPOSITION TECHNIQUES Rail fence technique • write message letters out diagonally over a number of rows • then read off cipher row by row • eg. write message out as: m e m a t r h t g p r y e t e f e t e o a a t • giving ciphertext (The encrypted message is) MEMATRHTGPRYETEFETEOAAT
  • 36. ROW TRANSPOSITION CIPHERS • a more complex transposition • write letters of message out in rows over a specified number of columns • then reorder the columns according to some key before reading off the rows • The transposition cipher can be made significantly more secure by performing more than one stage of transposition (problem)
  • 37. STEGANOGRAPHY 1. Character marking 2. Invisible ink 3. Pin punctures 4. Typewriter correction ribbon