Sie sind auf Seite 1von 7

DepartmentofSoftware

TheUniversityofBabylon

LECTURENOTESONClassicalCryptographic Techniques
By Dr.SamaherHusseinAli
CollegeofInformationTechnology,UniversityofBabylon,Iraq Samaher_hussein@yahoo.com

ClassicalCryptographicTechniques
havetwobasiccomponentsofclassicalciphers : Substitution and Transposition

ClassicalCiphers

Transposition

Substitution

Fig1.ClassicalcipherMethods
InTranspositionCiphersthelettersarearrangedinadifferentorder,suchasthewordmessageinthefollowing:
Rotatetext

EGASSEM MESSAGE

EMSSGAE

Rotate everytwo letters

Rotate everythree letters

SEMGASE

SSEMEGA

Rotate everyfour letters

InSubstitutionCipherslettersarereplacedbyotherletters ,suchasthewordmessageinthefollowing:
PHVVDJH
KEY=3

TLZZHNL MESSAGE

KEY=7

KEY=12

YQEEMSQ

HZNNVBZ

KEY=21

Dr.SamaherHusseinAli

NotesofLecture2

TranspositionCiphers
Transposition orPermutation
ciphershidethemessagecontentsbyrearrangingtheorderofthelettersaccordingtothefollowingprocedures 1.MessageReversal Thisprocedurerequiresthattheplaintexttobewrittenbackwardstoproduceaciphertext. Plaintext: MEETMEMONDAYMORNING Ciphertext: GININGROMYADNOMEMTEEM Thisprocedureisstraightforwardandeasytodecipheramessage,simplyreverseit 2.GeometricPatterns The normal writing of a message follows a pattern from left to right, one line at a time . Message then form a geometrical pattern in the shape of a rectangular ,or any other geometrical pattern would disguise the message from a single horizontal line. It can be transposed into rectangular shapes of: 2.1.TheColumnsofEqualLength This method base on dived the message to number of line have the columns of equal length (i.e., each line have number of letters change dynamic base on key)by writing the plaintext vertically: Example:let,theplaintext:THESIMPLESTOPSSIBLETANSPOSITIONSXX andKey:41532 THESI MPLES TPOSS IBLET RANSP OSITI ONSXX STIEH EMSLP S TSOP EITLB SRPNA TOII S X OXSN

Ciphertext:STIEHEMSLPSTSOPEITLBSRPNATOIIS

Dr.SamaherHusseinAli

NotesofLecture2

TranspositionCiphers
2.2.TheRowsofEqualLength This method base on dived the message to number of line have the rows of equal length (i.e., each line have number of letters change dynamic base on key)by writing the plaintext horizontely: Example:let,theplaintext:THESIMPLESTOPSSIBLETANSPOSITIONSXX andKey:4716235 THESI I BLET MPLESONSXX TPOSS THESI IBLETEOSITI RANSPMPLES OSITITPOSS ONSXX RANSP Ciphertext: IBLETONSXX THESIEOSITIMPLESTPOSS RANSP This procedure produce a very limited degree of message security, however, geometrical patterns are useful an intermediate step for another encryption procedure ,route transposition 3.Routetransposition: Itisprovidingawayoffurtherscramblinggeometricallyshapedmessage. Example: Let,theplaintext:SENDHELPSOON theciphertext: SE ND HE LP SO ON The cipher text message is easily understood. The procedure provides very little security. We can increase the scrambling if we make use of the rectangle (2*6)as intermediate step. Then the cipher text become: theciphertext: SNHLSO EDEPON

Dr.SamaherHusseinAli

NotesofLecture2

TranspositionCiphers
4.Zig Zag Transposition In this method, The plaintext divided into fixed lengths. one length contains every even positioned letter of the message. The transposing process follow this type of pattern(zig zag) Example: Let,the plaintext:SENDHELPSOON,anddepth=2findciphertext: theciphertext:SNHLSO EDEPON *ReversedZig Zag Transposition The enciphering starts with the last letter of the plain text and continues back to the beginning of the message first the odd positioned letters are taken and then even positioned ones Example: Let,the plaintext:SENDHELPSOON theciphertext:NOPEDEOSLHNS 5.Routevariations Routetranspositionscangoinmanydifferentdirections: Horizontal Vertical Diagonal Clockwise Counterclockwise Ifweusethemessagein(3*4)geometricshapes,severaloftheseroutetranspositionscanbeillustrated:

Dr.SamaherHusseinAli

NotesofLecture2

TranspositionCiphers
5.1.HorizontalRoute SEND NOOS HELPPLEH SOON DNES 5.2.VerticalRoutes SDLO NSEN EHPO OPHE NESN OLDS 5.3.Digonal Routes SEDL N OSE NHPOO PHN ESONLDES

5.4.Clockwise SEND OONH SPLE

S O S

E O P
3

N N L

D H E
2

5.5.CounterClockwise SPLE OONH SEND

S O S

P O E
1

L N N

E H D
2

Dr.SamaherHusseinAli

NotesofLecture2

ClassicalCryptographicTechniques
Asaresultclassicalciphers : substitution and transposition

Classical Cipher Methods

Transposition Methods

Substitution Methods

Message Reversal

Geometric Patterns

Route variations

Zig Zag Transposition

Route transposition

Next Lecture

Horizontal

Vertical

Diagonal

Clockwise

Counter Clockwise

Fig2.ExpendingofClassicalcipherMethods

Dr.SamaherHusseinAli

NotesofLecture2

Das könnte Ihnen auch gefallen