Professional Documents
Culture Documents
Plain
Text n o p q r s t u v w x y z
Cipher
Text q r s t u v w x y z a b c
Marathwada Mitra Mandal's
Polytechnic,Pune
Modified Version of Cipher text
• Let’s assume that the cipher text alphabets corresponding
to original text is alphabets may not necessary be three
place down but instead can be any place down in order.
• Thus we say that A would not necessary to be replaced by
D only but any alphabet from B-Z. Once replacement
scheme is decided it will be consistent and used for all
other alphabets and convert all other text.
• Each alphabets has 25 possibilities to be replace.
• We write down all possibilities and try to make sense.
• Example We decided: A=D B=p C=a D=x E=s F=q G=t h=x i=a
j=e K=b L=T M=r N=w O=c P=z Q=v R=w S=s T=l U=m V=n
W=y X=f
• Then MM Polytechnic=?
Marathwada Mitra Mandal's
Polytechnic,Pune
POLYALPHABITIC
• On of the main problem with simple
substitution cipher is that it is very vulnerable
for frequently analysis.
• Given large cipher text it can easily broken by
mapping of it’s letters.
• So making cipher more secure cryptographers
interested to develop such technique that are
restrict frequently analysis.
• One of common method is to use more then
one letter to encrypt message .
Marathwada Mitra Mandal's
Polytechnic,Pune
Marathwada Mitra Mandal's
Polytechnic,Pune
• Polyalphabetic cipher involves use of two or more
alphabets. instead of one – to – one relationship
between each letter, there is one to many relationship
between each letter.
• The Vigenere cipher, proposed by de Visenere.
• In vigenere cipher plane text is added with the key
repeated till the end of plane text message to from the
cipher text.
• Vigenere cipher is block substitution with the length of
block equal to length of key. Key length characters are
added to the block repeatedly up to the end of the plane
text.
• There fore symmetric cipher is used in industries.
W E N M T S U T
E A C P E E R Y
• Key
L might
R O specify
U R ‘Spiral
C I inwards,
x clockwise, starting from top
right”
• Cipher text will be ‘tyxicruorlewenmtsureepca’
• Router cipher have many more keys then a rail fence.
• However not all keys are equally good
• Badly chosen route will leave excessive chunks of planetext.
Categories
Key used for encryption and Same One Key for Encryption and
Decryption Anther for decryption
Key Process Ke=Kd Ke =! Kd
Size of resulting Text Usually Same or less then More then original Size
original
Key Exchange A big Problem No Problem At all