SlideShare a Scribd company logo
• Rather than just shifting the alphabet
• Could shuffle (jumble) the letters arbitrarily
• Each plaintext letter maps to a different random
cipher text letter
• hence key is 26 letters long
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Cipher text: WIRFRWAJUHYFTSDVFSFUUFYA
Monoalphabetic Cipher
Monoalphabetic Cipher Security
• Now have a total of 26! keys
• With so many keys, might think the system is secure
• But would be !!!WRONG!!!
• Problem is the regularities of the language
Language Redundancy and
Cryptanalysis
• Human languages are redundant
• Letters are not equally commonly used
• The English letter e is by far the most common
letter
• Then T,R,N,I,O,A,S
• Other letters are fairly rare
• Z,J,K,Q,X
English Letter Frequencies
Use in Cryptanalysis
• Key concept - monoalphabetic substitution
ciphers do not change relative letter
frequencies
• Discovered by Arabian scientists in 9th century
• Calculate letter frequencies for ciphertext
• compare counts against known values
Example Cryptanalysis
• Given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
• Count relative letter frequencies (see text)
• The most common letters are P & Z and are equivalent to e
and t
• The most common Digram are ZW is equivalent to th and
hence ZWP is the
• Proceeding with trial and error finally get:
it was disclosed yesterday that several informal but
direct contacts have been made with political
representatives of the viet cong in moscow
Playfair Cipher
• Not even the large number of keys in a
monoalphabetic cipher provides security
• One approach to improving security was to encrypt
multiple letters
• The Playfair Cipher is an example
• Invented by Charles Wheatstone in 1854, but named
after his friend Baron Playfair
Playfair Key Matrix
• A 5X5 matrix of letters
based on a keyword
• Fill in letters of keyword
• Fill rest of matrix with other
letters
• eg. using the keyword
MONARCHY
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Encrypting and Decrypting
• plaintext encrypted two letters at a time:
– if a pair is a repeated letter, insert a filler like 'X',
eg. "balloon" encrypts as "ba lx lo on"
– if both letters fall in the same row, replace each with letter
to right (wrapping back to start from end),
eg. “ar" encrypts as "RM"
– if both letters fall in the same column, replace each with the
letter below it (again wrapping to top from bottom),
eg. “mu" encrypts to "CM"
– otherwise each letter is replaced by the one in its row in the
column of the other letter of the pair, eg. “hs" encrypts to
"BP", and “ea" to "IM" or "JM"
Security of the Playfair Cipher
• security much improved over monoalphabetic
• since have 26 x 26 = 676 digrams
• would need a 676 entry frequency table to analyse
(verses 26 for a monoalphabetic)
• and correspondingly more ciphertext
• was widely used for many years (eg. US & British
military in WW1)
• it can be broken, given a few hundred letters
• since still has much of plaintext structure
Hill Cipher
• Developed by the mathematician Lester Hill in 1929.
• The encryption algorithm takes m successive plain text
and substitute for them m cipher text letters.
• Each character is assigned a numerical value
(a=0,…z=25).
26
mod
3
2
1
33
32
31
23
22
21
13
12
11
3
2
1































P
P
P
K
K
K
K
K
K
K
K
K
C
C
C
P
P
KK
C
K
P
KP
C





 1
1
26
mod
26
mod

More Related Content

PDF
Classical encryption techniques
PPT
Elementary cryptography
PPTX
Classical_Encryption_techniquescryp.pptx
PPTX
Symmetric Encryption Techniques
PPTX
Classical encryption techniques
PPT
ch02 cryptograpghy in network security.ppt
PPT
PPT
2. Classical Cryptosystems Classical.ppt
Classical encryption techniques
Elementary cryptography
Classical_Encryption_techniquescryp.pptx
Symmetric Encryption Techniques
Classical encryption techniques
ch02 cryptograpghy in network security.ppt
2. Classical Cryptosystems Classical.ppt

Similar to section-3 (1).ppt (20)

PPT
Chguatda.com/cmx.p02...1
PPT
Classical encryption techniques
PPT
Cryptography - Symmetric Encryption Ciphers
PPTX
Information and network security 13 playfair cipher
PPTX
MODULE 1 PART 111111111111111111111.pptx
PPTX
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
PPT
History of Cipher System
DOCX
Cryptography and Network Security Principles and Practice
PPTX
Cryptography and Network Security--MOD-2.pptx
PPTX
4.Cryptography handout 2.pptx
PPT
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
PPT
UNIT 2.ppt
PPT
ch02.ppt
PPTX
Classical encryption techniques
PPTX
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
PPT
CNS Subject ppt - Unit 1 covers about cryptography and network security subject
PPTX
Informationtoinformation///Security.pptx
PPTX
cryptography symmentric.pptx
PPTX
cryptographyandnetworksecu-module-1.pptx
Chguatda.com/cmx.p02...1
Classical encryption techniques
Cryptography - Symmetric Encryption Ciphers
Information and network security 13 playfair cipher
MODULE 1 PART 111111111111111111111.pptx
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
History of Cipher System
Cryptography and Network Security Principles and Practice
Cryptography and Network Security--MOD-2.pptx
4.Cryptography handout 2.pptx
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
UNIT 2.ppt
ch02.ppt
Classical encryption techniques
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
CNS Subject ppt - Unit 1 covers about cryptography and network security subject
Informationtoinformation///Security.pptx
cryptography symmentric.pptx
cryptographyandnetworksecu-module-1.pptx
Ad

Recently uploaded (20)

PDF
Well-logging-methods_new................
PPTX
Geodesy 1.pptx...............................................
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
PPT on Performance Review to get promotions
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
Project quality management in manufacturing
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
OOP with Java - Java Introduction (Basics)
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Well-logging-methods_new................
Geodesy 1.pptx...............................................
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Model Code of Practice - Construction Work - 21102022 .pdf
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT on Performance Review to get promotions
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CYBER-CRIMES AND SECURITY A guide to understanding
Project quality management in manufacturing
UNIT-1 - COAL BASED THERMAL POWER PLANTS
OOP with Java - Java Introduction (Basics)
R24 SURVEYING LAB MANUAL for civil enggi
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CH1 Production IntroductoryConcepts.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Ad

section-3 (1).ppt

  • 1. • Rather than just shifting the alphabet • Could shuffle (jumble) the letters arbitrarily • Each plaintext letter maps to a different random cipher text letter • hence key is 26 letters long Plain: abcdefghijklmnopqrstuvwxyz Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN Plaintext: ifwewishtoreplaceletters Cipher text: WIRFRWAJUHYFTSDVFSFUUFYA Monoalphabetic Cipher
  • 2. Monoalphabetic Cipher Security • Now have a total of 26! keys • With so many keys, might think the system is secure • But would be !!!WRONG!!! • Problem is the regularities of the language
  • 3. Language Redundancy and Cryptanalysis • Human languages are redundant • Letters are not equally commonly used • The English letter e is by far the most common letter • Then T,R,N,I,O,A,S • Other letters are fairly rare • Z,J,K,Q,X
  • 5. Use in Cryptanalysis • Key concept - monoalphabetic substitution ciphers do not change relative letter frequencies • Discovered by Arabian scientists in 9th century • Calculate letter frequencies for ciphertext • compare counts against known values
  • 6. Example Cryptanalysis • Given ciphertext: UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ • Count relative letter frequencies (see text) • The most common letters are P & Z and are equivalent to e and t • The most common Digram are ZW is equivalent to th and hence ZWP is the • Proceeding with trial and error finally get: it was disclosed yesterday that several informal but direct contacts have been made with political representatives of the viet cong in moscow
  • 7. Playfair Cipher • Not even the large number of keys in a monoalphabetic cipher provides security • One approach to improving security was to encrypt multiple letters • The Playfair Cipher is an example • Invented by Charles Wheatstone in 1854, but named after his friend Baron Playfair
  • 8. Playfair Key Matrix • A 5X5 matrix of letters based on a keyword • Fill in letters of keyword • Fill rest of matrix with other letters • eg. using the keyword MONARCHY M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z
  • 9. Encrypting and Decrypting • plaintext encrypted two letters at a time: – if a pair is a repeated letter, insert a filler like 'X', eg. "balloon" encrypts as "ba lx lo on" – if both letters fall in the same row, replace each with letter to right (wrapping back to start from end), eg. “ar" encrypts as "RM" – if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom), eg. “mu" encrypts to "CM" – otherwise each letter is replaced by the one in its row in the column of the other letter of the pair, eg. “hs" encrypts to "BP", and “ea" to "IM" or "JM"
  • 10. Security of the Playfair Cipher • security much improved over monoalphabetic • since have 26 x 26 = 676 digrams • would need a 676 entry frequency table to analyse (verses 26 for a monoalphabetic) • and correspondingly more ciphertext • was widely used for many years (eg. US & British military in WW1) • it can be broken, given a few hundred letters • since still has much of plaintext structure
  • 11. Hill Cipher • Developed by the mathematician Lester Hill in 1929. • The encryption algorithm takes m successive plain text and substitute for them m cipher text letters. • Each character is assigned a numerical value (a=0,…z=25). 26 mod 3 2 1 33 32 31 23 22 21 13 12 11 3 2 1                                P P P K K K K K K K K K C C C P P KK C K P KP C       1 1 26 mod 26 mod