Beruflich Dokumente
Kultur Dokumente
CIPHER METHODS
SUBMITTED BY:
1-BN
SUBMITTED TO:
CIPHER
Symmetric cryptography uses the same key to encrypt and decrypt data,
while asymmetric cryptography, also known as public key cryptography,
uses public and private keys to encrypt and decrypt data.
In asymmetric cryptography, the keys are large numbers that have been
paired together but are not identical (asymmetric). One key in the
pair can be shared with everyone; it is called the public key. The
other key in the pair is kept secret; it is called the private key.
Either of the keys can be used to encrypt a message; the opposite key
from the one used to encrypt the message is used for decryption.
The private or secret key of the pair is used by the owner of the key
pair to decrypt or encrypt data, while the public key is used by anyone
who wants to encrypt a message that can be decrypted only by the holder
of the private key.
DIFFERENCE OF CODE AND CIPHERS
On the other hand, a cipher converts the message using the cipher's
algorithm to transform the data representing the letters and words in
the message. Ciphers are easier to implement and use with computers
because cipher algorithms are automated and easily programmed.
TYPES OF CIPHERS
Example:
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW
So, when you write your message, the letter A gets replaced with
X, B gets replaced with Y and so on.
Plain: HELLO
Cipher: EBIIL
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ZYXWVUTSRQPONMLKJIHGFEDCBA
Example:
Plaintext: Hello
Cipher: Svool
Example:
Example:
WEDONTGOTOAFRICATOSTEALNOCOCONUTS
Then we would choose a keyword. Let us say that we chose the word
GOLD.
GOLDGOLDGOLDGOLDGOLDGOLDGOLDGOLDG
WEDONTGOTOAFRICATOSTEALNOCOCONUTS
We first encrypt the letter 'W' with key G. This means that we
find the row ‘W’ on our vigenere square and find the letter in
column G. This letter becomes our ciphertext letter.
This also means that we encrypt the letter 'W' with a caesar
cipher of key 'G'. 'G' corresponds to the number 6 so we are
shifting the letter 'W' by 6. With both methods we get the letter
'C'.
GOLDGOLDGOLDGOLDGOLDGOLDGOLDGOLDG
WEDONTGOTOAFRICATOSTEALNOCOCONUTS
C
We now do the same thing with the plaintext letter 'E' and the
key letter 'O'. Using both methods we should get the letter 'S'.
GOLDGOLDGOLDGOLDGOLDGOLDGOLDGOLDG
WEDONTGOTOAFRICATOSTEALNOCOCONUTS
CS
Example:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D X S F Z E H C V I T P G A Q L K J R U O W M Y B N
9 7 3 5 0 4 6
These historical ciphers are still relevant because they use different
fundamental components of modern ciphers, such as substitution and
transposition.
Name: Section:
Caesar Cipher
Shift - 4
1. Fipmizi mr csyvwipj →
2. Rendezvous →
4. Mathematics →
B. Atbash Cipher
1. GARDANIA →
2. TIMEZONE →
3. SCENT→
4. NVGSLW →
5. RURGVOOBLFBRV →
C. Simple substitutions
PLAIN TEXT
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Z M Y W C D E I F K O P J Q A T V X Y S H D P G J K
CIPHER TEXT
1. GATARODE
2. TCTTZTFE
3. SIVLER
4. FUTURE
5. PCZXCQHXYCY
D. Vigenere Cipher
1. LOVE ADDICT
2. USJBTDYC
3. LSOWSMCWWKI
4. INSPIRATION
5. FEJBAGRO
Homophonic
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D X S F Z E H C V I T P G A Q L K J R U O W M Y B N
4 3 7 5 0 9 6 1
8 2
1. JZ98JUQVJ3 →
2. 9QRV67WV1B →
4. RHYTHM →
5. FLYBY →
Answer Key:
Caesar
1. Believe in yourself
2. Najzavrkqo
3. Drink water everyday
4. Qexliqexmgw
5. The quick brown fox jump over the lazy dog
Atbash
1. TZIWZMRZ
2. GRNVALMY
3. HXVMG
4. METHOD
Simple Substitution
1. EXSAXZWC
2. PEPPA PIG
3 YFPDCX
4. DHSHXC
5. WE ARE NURSES
Vigenere Cipher
1. JSNCEVBMUR
2. WORDPLAY
4. GRKNMJYXAMR
5. HARDWORK
Homophonic
1. REPERTOIRE
2. POSITIVITY
3. READ MORE BOOKS
4. JCBUCG/JCB6C5/JCBUC5/JCB6CG
5. EPBXB
REFERENCES AND OTHER SOURCES
http://www.cryptogram.org/resource-area/cipher-types/
https://searchsecurity.techtarget.com/definition/secret-key-algorithm
https://searchsecurity.techtarget.com/definition/cipher?fbclid=IwAR0k5jH63Ag2sKdSF5fyh3pZVDrDZdi7gkRGY
XZZc_-BsJMRQg7zt0DoZ50
https://en.wikipedia.org/wiki/Cipher
https://searchsecurity.techtarget.com/definition/cipher?fbclid=IwAR0k5jH63Ag2sKdSF5fyh3pZVDrDZdi7gkRGY
XZZc_-BsJMRQg7zt0DoZ50
https://en.wikipedia.org/wiki/History_of_cryptography
https://www.geeksforgeeks.org/traditional-symmetric-ciphers/
https://www.tutorialspoint.com/cryptography/modern_cryptography.htm
https://youtu.be/-yFZGF8FHSg
https://www.youtube.com/watch?v=Lqu1rhq7RPw&feature=share