SlideShare a Scribd company logo
6
Most read
9
Most read
10
Most read
SUBSTITUTION AND TRANSPOSITION
TECHNIQUES
Name: Md Fazle Rabbi
ID:16CSE057
CONTENTS
 Cryptography
 Vocabulary
 Encryption & Decryption
 Substitution Technique
 Transmission Technique
1
WHAT IS CRYPTOGRAPHY ?
 Cryptography is the science of using mathematics
to encrypt and decrypt data.
 Cryptography enables you to store sensitive
information or transmit it across insecure networks
so that it cannot be read by anyone except the
intended recipient.
2
VOCABULARY
3
o plaintext - the original message
o Cipher text - the coded message
o cipher - algorithm for transforming plaintext to ciphertext
o key - info used in cipher known only to sender/receiver
o encipher (encrypt) - converting plaintext to ciphertext
o decipher (decrypt) - recovering ciphertext from plaintext
o cryptography - study of encryption principles/methods
o cryptanalysis (codebreaking) - the study of principles/
methods of deciphering ciphertext without knowing key
o cryptology - the field of both cryptography and
cryptanalysis
CRYPTOGRAPHY BASIC
4
TYPES OF CRYPTOGRAPHY
5
CONTINUE…
6
ASYMMETRIC CRYPTOGRAPHY
6
Both Substitution cipher technique and Transposition cipher technique are
the types of Traditional cipher which are used to convert the plain text into
cipher text.
 Substitution Cipher Technique:
In Substitution Cipher Technique plain text characters are replaced with
other characters, numbers and symbols as well as in substitution Cipher
Technique, character’s identity is changed while its position remains
unchanged.
 Transposition Cipher Technique:
Transposition Cipher Technique rearranges the position of the plain text’s
characters. In transposition Cipher Technique, The position of the character
is changed but character’s identity is not changed.
7
TYPES OF SUBSTITUTION CIPHER TECHNIQUE:
8
Caesar Cipher
Monoalphabetic Ciphers
Playfair Cipher
Hill Cipher
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Ciphe
Transposition Techniques
o Rail Fence Cipher.
o Row Transposition Cipher.
9
Row Transposition Cipher.
9
THE END

More Related Content

PPTX
C & d waste management in india
PPTX
Problem Solving: Eliminating Possiblities
PPTX
Azure fundamentals
PPTX
Fundamentals of Internet of Things (IoT) Part-2
PPTX
Substitution techniques
PDF
Network security - OSI Security Architecture
PDF
Presentation On Steganography
PPTX
Product Cipher
C & d waste management in india
Problem Solving: Eliminating Possiblities
Azure fundamentals
Fundamentals of Internet of Things (IoT) Part-2
Substitution techniques
Network security - OSI Security Architecture
Presentation On Steganography
Product Cipher

What's hot (20)

PPTX
Public Key Cryptography
PPTX
Hash Function
PPT
Fundamentals of cryptography
PDF
Asymmetric Cryptography
PPTX
Cryptography and network security
PPT
DES (Data Encryption Standard) pressentation
PPTX
Cryptography in Blockchain
PDF
Introduction to Cryptography
PPTX
Block cipher modes of operation
PPT
Network security cryptographic hash function
PPTX
Cryptography.ppt
PPTX
Cryptography
PPT
Email Security : PGP & SMIME
PDF
Elliptic curve cryptography
PPTX
Cryptography
PPT
Message authentication
 
PPT
Block Cipher and its Design Principles
PPT
Data encryption standard
PPT
Message authentication and hash function
PPT
Key management.ppt
Public Key Cryptography
Hash Function
Fundamentals of cryptography
Asymmetric Cryptography
Cryptography and network security
DES (Data Encryption Standard) pressentation
Cryptography in Blockchain
Introduction to Cryptography
Block cipher modes of operation
Network security cryptographic hash function
Cryptography.ppt
Cryptography
Email Security : PGP & SMIME
Elliptic curve cryptography
Cryptography
Message authentication
 
Block Cipher and its Design Principles
Data encryption standard
Message authentication and hash function
Key management.ppt
Ad

Similar to Topic1 substitution transposition-techniques (20)

PPTX
Cryptography and network security
PPT
Cryptography
PDF
Encryption
PDF
UNIT 3 Information Security Sharad Institute
PDF
crypto-105058445051058480051448005540405
PPTX
Cryptography (raza hassan)
PPTX
Cryptography
PPTX
System Security Principles for Beginners
PPTX
Cryptography 130919084510-phpapp02
PPTX
PPTX
Cryptography
PDF
Computer Security (Cryptography) Ch01
PPTX
cryptography in computer and its module and application
PDF
Evolution of Cryptography and Cryptographic techniques
PDF
A Study On Cryptographic Techniques
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPT
CRYPTOGRAPHY
PPT
Cyber security Unit 3 Cryptography and Network security
PPTX
Cryptography
PDF
Pertemuan 4 information hiding (cryptography)
Cryptography and network security
Cryptography
Encryption
UNIT 3 Information Security Sharad Institute
crypto-105058445051058480051448005540405
Cryptography (raza hassan)
Cryptography
System Security Principles for Beginners
Cryptography 130919084510-phpapp02
Cryptography
Computer Security (Cryptography) Ch01
cryptography in computer and its module and application
Evolution of Cryptography and Cryptographic techniques
A Study On Cryptographic Techniques
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
CRYPTOGRAPHY
Cyber security Unit 3 Cryptography and Network security
Cryptography
Pertemuan 4 information hiding (cryptography)
Ad

More from MdFazleRabbi18 (20)

PPTX
5.programmable interval timer 8253
PPTX
4.programmable dma controller 8257
PPTX
3.programmable interrupt controller 8259
PPTX
1.ppi 8255
PPTX
Topic4 data encryption standard(des)
PPTX
Topic3 playfain
PPTX
Topic2 caser hill_cripto
PPTX
Topic5 advanced encryption standard (aes)
PPTX
11. lzw coding
PPTX
9. hofman coding in DIP
PPTX
7. image enhancement using spatial filtering
PPTX
5. gray level transformation
PPTX
1. steps in image processing
PPTX
5. convolution and correlation of discrete time signals
PPTX
4. operations of signals
PPTX
3. systems
PPTX
2. classification of signals
PPTX
1. elementary signals
PPTX
4. random number and it's generating techniques
PPTX
3. different types of simulations for appropriate systems
5.programmable interval timer 8253
4.programmable dma controller 8257
3.programmable interrupt controller 8259
1.ppi 8255
Topic4 data encryption standard(des)
Topic3 playfain
Topic2 caser hill_cripto
Topic5 advanced encryption standard (aes)
11. lzw coding
9. hofman coding in DIP
7. image enhancement using spatial filtering
5. gray level transformation
1. steps in image processing
5. convolution and correlation of discrete time signals
4. operations of signals
3. systems
2. classification of signals
1. elementary signals
4. random number and it's generating techniques
3. different types of simulations for appropriate systems

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Pre independence Education in Inndia.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Basic Mud Logging Guide for educational purpose
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Business Ethics Teaching Materials for college
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Insiders guide to clinical Medicine.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
TR - Agricultural Crops Production NC III.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pre independence Education in Inndia.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPH.pptx obstetrics and gynecology in nursing
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O7-L3 Supply Chain Operations - ICLT Program
Basic Mud Logging Guide for educational purpose
Microbial disease of the cardiovascular and lymphatic systems
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Business Ethics Teaching Materials for college
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
Insiders guide to clinical Medicine.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Cell Structure & Organelles in detailed.
Microbial diseases, their pathogenesis and prophylaxis
Pharmacology of Heart Failure /Pharmacotherapy of CHF
TR - Agricultural Crops Production NC III.pdf

Topic1 substitution transposition-techniques

  • 2. CONTENTS  Cryptography  Vocabulary  Encryption & Decryption  Substitution Technique  Transmission Technique 1
  • 3. WHAT IS CRYPTOGRAPHY ?  Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. 2
  • 4. VOCABULARY 3 o plaintext - the original message o Cipher text - the coded message o cipher - algorithm for transforming plaintext to ciphertext o key - info used in cipher known only to sender/receiver o encipher (encrypt) - converting plaintext to ciphertext o decipher (decrypt) - recovering ciphertext from plaintext o cryptography - study of encryption principles/methods o cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext without knowing key o cryptology - the field of both cryptography and cryptanalysis
  • 9. Both Substitution cipher technique and Transposition cipher technique are the types of Traditional cipher which are used to convert the plain text into cipher text.  Substitution Cipher Technique: In Substitution Cipher Technique plain text characters are replaced with other characters, numbers and symbols as well as in substitution Cipher Technique, character’s identity is changed while its position remains unchanged.  Transposition Cipher Technique: Transposition Cipher Technique rearranges the position of the plain text’s characters. In transposition Cipher Technique, The position of the character is changed but character’s identity is not changed. 7
  • 10. TYPES OF SUBSTITUTION CIPHER TECHNIQUE: 8 Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Ciphe
  • 11. Transposition Techniques o Rail Fence Cipher. o Row Transposition Cipher. 9