Beruflich Dokumente
Kultur Dokumente
CLASSICAL CRYPTOGRAPHY
Introduction
National Institute of Science & Technology
Basic Concepts
Types of Ciphers
National Institute of Science & Technology
Substitution Transposition
Mono-alphabetic Scytale
Poly-alphabetic Reverse
Poly-graphic Rail Fence
Geometric
Row/Column
Jyotishman Baishya EC200119320 [3]
CLASSICAL CRYPTOGRAPHY
Mono-alphabetic Substitution
National Institute of Science & Technology
Caesar Cipher
2000 years ago Julius Caesar used a simple substitution
cipher, now known as the Caesar cipher
first attested use in military affairs (Gallic Wars)
replace each letter by 3rd letter on, eg.
L FDPH L VDZ L FRQTXHUHG is
I CAME I SAW I CONQUERED
can describe this mapping (or translation alphabet)
as:
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: EFGHIJKLMNOPQRSTUVWXYZABC
Jyotishman Baishya EC200119320 [4]
CLASSICAL CRYPTOGRAPHY
Vigenère Cipher
Blaise de Vigenère is generally credited as the inventor of the
“polyalphabetic substitution cipher”
To improve security use many monoalphabetic substitution
alphabets
Hence each letter can be replaced by many others
Use a key to select which alphabet is used for each letter of the
message
ith letter of key specifies ith alphabet to use
Use each alphabet in turn
Repeat from start after end of key is reached
Jyotishman Baishya EC200119320 [6]
CLASSICAL CRYPTOGRAPHY
Vigenère Example
National Institute of Science & Technology
Write the plaintext out and under it write the keyword repeated
Then using each key letter in turn as a Caesar cipher key
Encrypt the corresponding plaintext letter Plaintext
THISPROCESSCANALSOBEEXPRESSED
Keyword CIPHERCIPHERCIPHERCIPHERCIPHE
Ciphertext VPXZTIQKTZWTCVPSWFDMTETIGAHLH
In this example the keyword is "CIPHER". Hence the following
translation alphabets are mapped to the plaintext letters:
C: - CDEFGHIJKLMNOPQRSTUVWXYZAB
I: - IJKLMNOPQRSTUVWXYZABCDEFGH… …
for ABCDEFGHIJKLMNOPQRSTUVWXYZ
Jyotishman Baishya EC200119320 [7]
CLASSICAL CRYPTOGRAPHY
Hill Cipher
National Institute of Science & Technology
Transposition Ciphers
National Institute of Science & Technology
Scytale cipher
a strip of paper was wound round a staff
message written along staff in rows, then paper removed leaving a
strip of seemingly random letters
not very secure as key was width of paper & staff
Reverse cipher
write the message backwards
Rail Fence cipher
write message with letters on alternate rows
Geometric Cipher
Write message following one pattern and read out with another.
Jyotishman Baishya EC200119320 [9]
CLASSICAL CRYPTOGRAPHY
Jefferson Wheel
Conclusion
National Institute of Science & Technology