13 views

Uploaded by Cahya Chaqiqi

Shift Chiper

- Cryptography
- Implementation of 128-Bit AES Algorithm in MATLAB
- Modern Ciphers
- Data and Network Security
- P1
- Chapter 1 Intro and Background
- Scan 0001
- International Journal of Computational Engineering Research(IJCER)
- Data Security
- Cipher text policy Attribute Based Encryption for Secure Data Retrieval in DTNs
- 2.ppt
- The Cryptoclub Using Mathematics to Make and Break Secret Codes
- Chaotic Cryptosystem based on Inverse Duffing Circuit
- Oracle Advanced Security Frequently Asked Questions
- A Comparison Between ‘Encryption and Decryption’
- Des Cipher Internals
- APT (Advanced Persistent Threats)_ La Nuova Frontiera Del MalwareabP1A_2017!05!06
- Authshield Lab-2 Factor Authentication Solutions
- Quantum Cryptography Edited
- Installing Certificates

You are on page 1of 18

bases,

Hong-Jian Lai

Department of Mathematics

West Virginia University

Morgantown, WV

p. 1/??

Decoding Shift-cipher

Alphabet: Z26 .

p. 2/??

Decoding Shift-cipher

Alphabet: Z26 .

Problem: Decode a ciphertext wklvverxogehtxlwhhdvb

encoded with a shift cipher

p. 2/??

Decoding Shift-cipher

Alphabet: Z26 .

Problem: Decode a ciphertext wklvverxogehtxlwhhdvb

encoded with a shift cipher

allshift(wklvvkrxogehtxlwhhdvb)

p. 2/??

Decoding Shift-cipher

Alphabet: Z26 .

Problem: Decode a ciphertext wklvverxogehtxlwhhdvb

encoded with a shift cipher

allshift(wklvvkrxogehtxlwhhdvb)

thisshouldbequiteeasy (plain text can be found in the

output)

p. 2/??

Alphabet: Z26 .

p. 3/??

Alphabet: Z26 .

Problem: Encrypt the plain text meetmeinstlouis with

an affine cipher E3,7 (x) 3x + 7

p. 3/??

Alphabet: Z26 .

Problem: Encrypt the plain text meetmeinstlouis with

an affine cipher E3,7 (x) 3x + 7

affinecrypt(meetmeinstlouis, 3, 7)

ans = rttmrtfujmoxpfj (ciphertext in the output).

p. 3/??

Alphabet: Z26 .

p. 4/??

Alphabet: Z26 .

Problem: The cipher text rttmrtfujmoxpfj was

encrypted using the affine function f (x) = 3x + 7 in

Z26 . Decrypt it.

p. 4/??

Alphabet: Z26 .

Problem: The cipher text rttmrtfujmoxpfj was

encrypted using the affine function f (x) = 3x + 7 in

Z26 . Decrypt it.

(Step 1: ) Compute the inverse function

f 1 (y) 9y + 15 (mod 26).

p. 4/??

Alphabet: Z26 .

Problem: The cipher text rttmrtfujmoxpfj was

encrypted using the affine function f (x) = 3x + 7 in

Z26 . Decrypt it.

(Step 1: ) Compute the inverse function

f 1 (y) 9y + 15 (mod 26).

(Step 2: ) Decryption using matlab:

affinecrypt(rttmrtfujmoxpfj, 9, 15)

ans = meetmeinstlouis

p. 4/??

base-10.

p. 5/??

base-10.

Find the numerical values H = 7, P = 15, A = 0 and

C = 2.

p. 5/??

base-10.

Find the numerical values H = 7, P = 15, A = 0 and

C = 2.

Use matlab to compute:

n = 7 263 + 15 262 + 2

n = 133174

p. 5/??

number

base-26.

p. 6/??

number

base-26.

n=1325; m=26; d0 = mod(n, m)

d0 = 25

n1=(n-d0)/m; d1 = mod(n1,m)

d1 = 24

n2=(n-d1)/m; d2 = mod(n2,m)

d2 = 1

n3 = (n2-d2)/m; d3 = mod(n3,m)

d3 = 0

p. 6/??

number

base-26.

n=1325; m=26; d0 = mod(n, m)

d0 = 25

n1=(n-d0)/m; d1 = mod(n1,m)

d1 = 24

n2=(n-d1)/m; d2 = mod(n2,m)

d2 = 1

n3 = (n2-d2)/m; d3 = mod(n3,m)

d3 = 0

The answer is n = (1 24 25)26 = (BY Z)26 .

p. 6/??

- CryptographyUploaded byrebwarpc
- Implementation of 128-Bit AES Algorithm in MATLABUploaded byAlaa Hassan
- Modern CiphersUploaded byVanquy Do
- Data and Network SecurityUploaded byAshish Shah
- P1Uploaded byb meherbaba
- Chapter 1 Intro and BackgroundUploaded by2eaa889c
- Scan 0001Uploaded byvkvijaykumar
- International Journal of Computational Engineering Research(IJCER)Uploaded byInternational Journal of computational Engineering research (IJCER)
- Data SecurityUploaded byMosaad Ragab
- Cipher text policy Attribute Based Encryption for Secure Data Retrieval in DTNsUploaded byIRJET Journal
- 2.pptUploaded byDinesh Rathore
- The Cryptoclub Using Mathematics to Make and Break Secret CodesUploaded bysarma5153
- Chaotic Cryptosystem based on Inverse Duffing CircuitUploaded bycvolos
- Oracle Advanced Security Frequently Asked QuestionsUploaded byKimskius
- A Comparison Between ‘Encryption and Decryption’Uploaded by2010roomi
- Des Cipher InternalsUploaded byRndy Mi
- APT (Advanced Persistent Threats)_ La Nuova Frontiera Del MalwareabP1A_2017!05!06Uploaded bycskijanje
- Authshield Lab-2 Factor Authentication SolutionsUploaded byAuthShield Lab
- Quantum Cryptography EditedUploaded byCody Mosblech
- Installing CertificatesUploaded byHerman Michael
- Cryptology for EngineersUploaded byZow Niak
- V3I506.pdfUploaded byIJCERT PUBLICATIONS
- Final Project on ComputerUploaded byDavid Gbeja
- Cyber SecurityUploaded byGeorgiana Crâmpiță
- Information Security ExecutiveUploaded byapi-79132149

- Hari Nasional Dan InternasionalUploaded byCahya Chaqiqi
- Enable Wifi LinuxUploaded byCahya Chaqiqi
- Elliptic Curves MatlabUploaded byCahya Chaqiqi
- Proposal Program Kreativitas MahasiswaUploaded byCahya Chaqiqi
- PMR lengkapUploaded byCahya Chaqiqi
- DocUploaded byAnto D'siDrap TiMur
- Lt Soal Mtk Un Smk TeknoUploaded byCahya Chaqiqi
- WiperUploaded byCahya Chaqiqi

- 03.SymmetricKey.pptUploaded byRizwanKhatri
- 02_Chapter 2_Conventional Encryption and Message ConfidentialityUploaded byShreesha Rodricks
- Chart Availability ListUploaded bymetalwarrior12
- CNS QBUploaded byAjiTh DanGer
- EncryptionUploaded byamit mahajan
- understand_des.pdfUploaded bysslbs
- Rc4 ExampleElements of Information TheoryUploaded byRohan Ghige
- Military CryptographyUploaded bydikshant desai
- 10806077Uploaded byRajesh Mishra
- Block CiphersUploaded byMHT2
- COMP1511 Week 06 Laboratory ExercisesUploaded byCindy Li
- Coep Comp DocsUploaded byADITYA Sodhiya
- Cryptography Stallings CH02 AnswersUploaded byzaikoryu
- BlowFish (Cipher) 20161124Uploaded byRami Khalil Rouchdi
- CNS_LABMANUAL.docxUploaded byakira
- Cns Classical Encryption TechniqueUploaded byKssanthosh Kumar
- Kriptografiya EeUploaded byaiona
- History of Cryptography.pdfUploaded bysanjeewa
- Student Solution Chap 05Uploaded bypriyapati21
- RC4 ExampleUploaded byViceGod
- l_02cet.pdfUploaded byTroy Williamson
- Final RecordUploaded byßñęhâ Șmìlęÿ
- CryptographyUploaded byrohandeshmukh
- Ch2-3Uploaded byHarish Kola
- 1_BasicEncryptionAndDeceyption_2011 (1).pdfUploaded byfahad
- RC6 CipherUploaded bySara Marouf
- Network Security & Cryptography lecture 5 & 6Uploaded byUdhay Prakash
- 2xv7jfqcqzaltlakqmq8-signature-b2c38b89ad99217ce2b5b121d32e2453e269e42c57fa2e8b47fa78d24479d698-poli-160425164144Uploaded byRami Khalil Rouchdi
- Related-Key AttacksUploaded byedmund2008
- ch_05_modern symmetric clippersUploaded byAneesh Singla