Sie sind auf Seite 1von 21

University of Makati

College of Allied Health Studies


J.P Rizal Ext. St. West Rembo Makati City

Bachelor of Science in Nursing

CIPHER METHODS

SUBMITTED BY:

Pelayo, Jesus Emmanuel B.

1-BN

SUBMITTED TO:

Prof. Angelyn M. Pangilinan

OCTOBER 16, 2019


ORIGIN OF CRYPTOGRAPHY

The art of cryptography is considered to be born along with the art


of writing. As civilizations evolved, human beings got organized in
tribes, groups, and kingdoms. This led to the emergence of ideas such
as power, battles, supremacy, and politics. These ideas further fueled
the natural need of people to communicate secretly with selective
recipient which in turn ensured the continuous evolution of
cryptography as well.

The roots of cryptography are found in Roman and Egyptian


civilizations.

Hieroglyph − The Oldest Cryptographic Technique

The first known evidence of cryptography can be traced to the


use of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to
communicate by messages written in hieroglyph. This code was the
secret known only to the scribes who used to transmit messages
on behalf of the kings. One such hieroglyph is shown below.
Later, the scholars moved on to using simple mono-alphabetic
substitution ciphers during 500 to 600 BC. This involved replacing
alphabets of message with other alphabets with some secret rule.
This rule became a key to retrieve the message back from the garbled
message.

The earlier Roman method of cryptography, popularly known as the Caesar


Shift Cipher, relies on shifting the letters of a message by an agreed
number (three was a common choice), the recipient of this message would
then shift the letters back by the same number and obtain the original
message.

Steganography is similar but adds another dimension to Cryptography. In


this method, people not only want to protect the secrecy of an
information by concealing it, but they also want to make sure any
unauthorized person gets no evidence that the information even exists.
For example, invisible watermarking.

In steganography, an unintended recipient or an intruder is unaware of


the fact that observed data contains hidden information. In
cryptography, an intruder is normally aware that data is being
communicated, because they can see the coded/scrambled message.
EVOLUTION OF CRYPTOGRAPHY

It is during and after the European Renaissance, various Italian and


Papal states led the rapid proliferation of cryptographic techniques.
Various analysis and attack techniques were researched in this era to
break the secret codes.

 Improved coding techniques such as Vigenere Coding came into


existence in the 15th century, which offered moving letters in
the message with a number of variable places instead of moving
them the same number of places.

 Only after the 19th century, cryptography evolved from the ad


hoc approaches to encryption to the more sophisticated art and
science of information security.

 In the early 20th century, the invention of mechanical and


electromechanical machines, such as the Enigma rotor
machine, provided more advanced and efficient means of coding
the information.

 During the period of World War II,


both cryptography and cryptanalysis became excessively
mathematical.
With the advances taking place in this field, government
organizations, military units, and some corporate houses started
adopting the applications of cryptography. They used cryptography to
guard their secrets from others. Now, the arrival of computers and
the Internet has brought effective cryptography within the reach of
common people.

Modern cryptography is the cornerstone of computer and communications


security. Its foundation is based on various concepts of mathematics
such as number theory, computational-complexity theory, and
probability theory.

The discovery and application of cipher text, early on, of frequency


analysis to the reading of encrypted communications has, on occasion,
altered the course of history. Thus the Zimmermann Telegram triggered
the United States' entry into World War I; and Allied reading of Nazi
Germany's ciphers shortened World War II, in some evaluations by as
much as two years.

Until the 1970s, secure cryptography was largely the preserve of


governments. Two events have since brought it squarely into the public
domain: the creation of a public encryption standard (DES), and the
invention of public-key cryptography.
CIPHER METHODS

CIPHER

In cryptology, the discipline concerned with the study of


cryptographic algorithms, a cipher is an algorithm for encrypting and
decrypting data. Symmetric key encryption, also called secret key
encryption, depends on the use of ciphers, which operate symmetrically.
With symmetric algorithms, the same cipher and encryption key are
applied to data in the same way, whether the objective is to convert
plaintext to cipher text or cipher text to plaintext. A cipher
transforms data by processing the original, plaintext characters (or
other data) into cipher text, which should appear to be random data.

Cryptology - is the process of writing using various


methods (“ciphers”) to keep messages secret.

Traditionally, ciphers used two main types of transformation:


transposition ciphers, which keep all the original bits of data in a
byte but mix their order, and substitution ciphers, which replace
specific data sequences with other specific data sequences. For
example, one type of substitution would be to transform all bits with
a value of 1 to a value of 0, and vice versa. The data output by either
method are called the cipher text.

Modern ciphers enable private communication in many different


networking protocols, including the Transport Layer Security (TLS)
protocol and others that offer encryption of network traffic. Many
communication technologies, including phones, digital television and
ATMs, rely on ciphers to maintain security and privacy.
FUNCTIONS OF CIPHER

A cipher uses a system of fixed rules -- an algorithm -- to transform


plaintext, a legible message, into cipher text, an apparently random
string of characters. Ciphers can be designed to encrypt or decrypt
bits in a stream (stream ciphers), or they can process cipher text in
uniform blocks of a specified number of bits (block ciphers).

Modern cipher implementations depend on the cipher algorithm and a


secret key, which is used by the cipher algorithm to modify data as it
is encrypted. Ciphers that use longer keys, measured in bits, can be
more secure from brute-force attacks, because the longer the key
length, the more brute-force attempts are necessary to expose the
plaintext. While cipher strength is not always dependent on the length
of the key, experts recommend modern ciphers be configured to use keys
of at least 128 bits to 1,024 bits or more, depending on the algorithm
and the use case.

A key is an essential part of a cipher algorithm -- so much so that,


in real world ciphering, the key is kept secret, not the algorithm.
Strong ciphers are designed so that, even if someone knows the
algorithm, it should be virtually impossible to decipher a cipher text
without knowing the appropriate key. Consequently, before a cipher can
work, both the sender and receiver must have a key or set of keys.
PLAIN TEXT ENCRYPTION CIPHER DECRYPTION PLAIN TEXT

READABLE FORMAT NON – READABLE READABLE FORMAT


NON – ENCRYPTED FORMAT NON – ENCRYPTED
DATA. ENCRYPTED DATA. DATA.

Symmetric cryptography uses the same key to encrypt and decrypt data,
while asymmetric cryptography, also known as public key cryptography,
uses public and private keys to encrypt and decrypt data.

In asymmetric cryptography, the keys are large numbers that have been
paired together but are not identical (asymmetric). One key in the
pair can be shared with everyone; it is called the public key. The
other key in the pair is kept secret; it is called the private key.
Either of the keys can be used to encrypt a message; the opposite key
from the one used to encrypt the message is used for decryption.

The private or secret key of the pair is used by the owner of the key
pair to decrypt or encrypt data, while the public key is used by anyone
who wants to encrypt a message that can be decrypted only by the holder
of the private key.
DIFFERENCE OF CODE AND CIPHERS

Codes and ciphers are different ways to encrypt a message. A code is


a method of changing a message by replacing each word with another
word that has a different meaning.

On the other hand, a cipher converts the message using the cipher's
algorithm to transform the data representing the letters and words in
the message. Ciphers are easier to implement and use with computers
because cipher algorithms are automated and easily programmed.

TYPES OF CIPHERS

Ciphers can be characterized in a number of different ways, including:

 Block ciphers encrypt uniformly sized blocks of data, while


stream ciphers can be applied to streams of data such as are
often received and sent over a network.

 Ciphers can depend on traditional keys used directly to key


ciphertext or on elliptical curve cryptography (ECC), which, when
used with a 160-bit key, can provide the security of a traditional
cipher like that used in the Rivest-Shamir-Adleman (RSA)
cryptosystem using a key of 1,024 bits in length.

Modern-day ciphers are designed to be able to withstand attacks


even when the attacker knows what cipher is being used;
historically, ciphers have been less secure against attack
because they needed to be used for ciphering by hand and thus can
be more easily analyzed and broken with computer power.
Some of the best known historical ciphers include:

 Caesar cipher is one of the simplest and earliest known ciphers;


some attribute the use of this cipher to Caesar, who is said to
have used it to communicate securely with his generals. The Caesar
cipher is a simple type of substitution cipher where each letter
in the plaintext is "shifted" a specific number of places down
the alphabet; traditionally, the shift number used by Caesar was
three. Substitution ciphers, like the Caesar cipher, are often
used by writing down the plaintext alphabet, with the ciphertext
alphabet written above the plaintext letters, shifted by the
number agreed upon by those communicating. A shift of three puts
the ciphertext letter D above the plaintext A, E above B and so
on. The number of characters shifted is considered a simple form
of a key.

Example:
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW

So, when you write your message, the letter A gets replaced with
X, B gets replaced with Y and so on.

For example, the word “HELLO” reads:

Plain: HELLO
Cipher: EBIIL

 Atbash cipher is a substitution cipher in which the plaintext


alphabet is mapped onto itself, but in reverse order. In other
words, the plaintext letter A is mapped to ciphertext Z, B is
mapped to Y, C to X and so on. The Atbash cipher is named after
the two first and two last letters in the Hebrew alphabet, and
it is thought to have been in use for hundreds of years.

The substitution key is:

ABCDEFGHIJKLMNOPQRSTUVWXYZ

ZYXWVUTSRQPONMLKJIHGFEDCBA
Example:

Plaintext: Hello

Cipher: Svool

 Simple substitution cipher has also been used for hundreds of


years and substitutes every plaintext character for a different
ciphertext character, resulting in what is effectively a 26-
character key. It differs from the Caesar cipher because the
cipher alphabet is the alphabet completely jumbled, rather than
simply shifted by a uniform number of places.

Keys for the simple substitution cipher usually consist of 26


letters (compared to the caesar cipher's single number). An
example key is:

plain alphabet: abcdefghijklmnopqrstuvwxyz

cipher alphabet: phqgiumeaylnofdxjkrcvstzwb

Example:

Plaintext: defend the east wall of the castle

Cipher: giuifg cei iprc tpnn du cei qprcni

 Vigenère cipher is a form of polyalphabetic substitution,


meaning a cipher based on substitution, using multiple
substitution alphabets. The Vigenère cipher uses a series of
interwoven Caesar ciphers, based on the letters of a keyword. The
original text is encrypted using what is known as the Vigenère
square or Vigenère table.
This is an example of a Vigenere square. The columns are all the
possible keys or alphabets and the row is the letter you are
trying to encrypt/decrypt.

Example:

Plaintext: "WE DONT GO TO AFRICA TO STEAL NO COCONUTS"

We would first remove spaces.

WEDONTGOTOAFRICATOSTEALNOCOCONUTS

Then we would choose a keyword. Let us say that we chose the word
GOLD.

GOLDGOLDGOLDGOLDGOLDGOLDGOLDGOLDG
WEDONTGOTOAFRICATOSTEALNOCOCONUTS

We first encrypt the letter 'W' with key G. This means that we
find the row ‘W’ on our vigenere square and find the letter in
column G. This letter becomes our ciphertext letter.

This also means that we encrypt the letter 'W' with a caesar
cipher of key 'G'. 'G' corresponds to the number 6 so we are
shifting the letter 'W' by 6. With both methods we get the letter
'C'.
GOLDGOLDGOLDGOLDGOLDGOLDGOLDGOLDG
WEDONTGOTOAFRICATOSTEALNOCOCONUTS
C

We now do the same thing with the plaintext letter 'E' and the
key letter 'O'. Using both methods we should get the letter 'S'.

GOLDGOLDGOLDGOLDGOLDGOLDGOLDGOLDG
WEDONTGOTOAFRICATOSTEALNOCOCONUTS
CS

Encrypted in a caesar cipher of shift L is O.


GOLDGOLDGOLDGOLDGOLDGOLDGOLDGOLDG
WEDONTGOTOAFRICATOSTEALNOCOCONUTS
CSO

We do the same thing for the rest of the message to get


CSORTHRRZCLIXWNDZCDWKOWQUQZFUBFWY

 Homophonic substitution cipher is a substitution cipher in which


several different ciphertext letters replace single plaintext
letters. This type of cipher is typically much more difficult to
break than standard substitution ciphers.

Example:

Our cipher alphabet is as follows:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

D X S F Z E H C V I T P G A Q L K J R U O W M Y B N

9 7 3 5 0 4 6

To encipher the message, DEFEND THE EAST WALL OF THE CASTLE, we


find 'D' in the top row, then replace it with the letter below
it, 'F'. The second letter, 'E' provides us with several choices,
we could use any of 'Z', '7', '2' or '1'. We choose one of these
at random, say '7'.
After continuing with this, we get the ciphertext:

plaintext: DEFEND THE EAST WALL OF THE CASTLE

ciphertext: F7EZ5F UC2 1DR6 M9PP 0E 6CZ SD4UP1

These historical ciphers are still relevant because they use different
fundamental components of modern ciphers, such as substitution and
transposition.

To better understand what is Cipher

Scan the QR CODE given or go to this


link: https://youtu.be/-yFZGF8FHSg
Activity

Name: Section:

Caesar Cipher
Shift - 4

1. Fipmizi mr csyvwipj →

2. Rendezvous →

3. Hvmro aexiv izivchec →

4. Mathematics →

5. Xli uymgo fvsar jsb nyqt sziv xli pedc hsk →

B. Atbash Cipher

Encrypt or decrypt the follow:

1. GARDANIA →

2. TIMEZONE →

3. SCENT→

4. NVGSLW →

5. RURGVOOBLFBRV →
C. Simple substitutions

Use the following basis to encrypt or decrypt the cipher.

PLAIN TEXT

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Z M Y W C D E I F K O P J Q A T V X Y S H D P G J K

CIPHER TEXT

1. GATARODE

2. TCTTZTFE

3. SIVLER

4. FUTURE

5. PCZXCQHXYCY
D. Vigenere Cipher

Use the Vigenere table to encrypt or decrypt the ff.

1. LOVE ADDICT

2. USJBTDYC

3. LSOWSMCWWKI

4. INSPIRATION

5. FEJBAGRO
Homophonic

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

D X S F Z E H C V I T P G A Q L K J R U O W M Y B N

4 3 7 5 0 9 6 1

8 2

1. JZ98JUQVJ3 →

2. 9QRV67WV1B →

3. J34F 5QJ8 XQQTR →

4. RHYTHM →

5. FLYBY →
Answer Key:

Caesar

1. Believe in yourself
2. Najzavrkqo
3. Drink water everyday
4. Qexliqexmgw
5. The quick brown fox jump over the lazy dog

Atbash

1. TZIWZMRZ

2. GRNVALMY

3. HXVMG

4. METHOD

5 IF I TELL YOU DIE

Simple Substitution

1. EXSAXZWC

2. PEPPA PIG

3 YFPDCX

4. DHSHXC

5. WE ARE NURSES
Vigenere Cipher

1. JSNCEVBMUR

2. WORDPLAY

3. LSO WSM CWW KI

4. GRKNMJYXAMR

5. HARDWORK

Homophonic

1. REPERTOIRE
2. POSITIVITY
3. READ MORE BOOKS
4. JCBUCG/JCB6C5/JCBUC5/JCB6CG
5. EPBXB
REFERENCES AND OTHER SOURCES

http://www.cryptogram.org/resource-area/cipher-types/

https://searchsecurity.techtarget.com/definition/secret-key-algorithm

https://searchsecurity.techtarget.com/definition/cipher?fbclid=IwAR0k5jH63Ag2sKdSF5fyh3pZVDrDZdi7gkRGY
XZZc_-BsJMRQg7zt0DoZ50

https://en.wikipedia.org/wiki/Cipher

https://searchsecurity.techtarget.com/definition/cipher?fbclid=IwAR0k5jH63Ag2sKdSF5fyh3pZVDrDZdi7gkRGY
XZZc_-BsJMRQg7zt0DoZ50

https://en.wikipedia.org/wiki/History_of_cryptography

https://www.geeksforgeeks.org/traditional-symmetric-ciphers/

https://www.tutorialspoint.com/cryptography/modern_cryptography.htm

https://youtu.be/-yFZGF8FHSg

https://www.youtube.com/watch?v=Lqu1rhq7RPw&feature=share

Das könnte Ihnen auch gefallen