Professional Documents
Culture Documents
What is Cipher???
Origin:
In cryptography,
The earliest known a cipher
use of (or
cypher) is an algorithm
cryptography is found infor
non-
performing
standard encryption
hieroglyphs or into
carved
decryption
the wall of a tomb from the Old
Kingdom of Egypt circa 1900 BC
Substitution Ciphers
Lqirupdwlrq Vhfxulwb
Vigerene Cipher
We Have the plain text : Vigenere Cipher is a method of
Em buon ngu qua. encrypting alphabetic text using a simple
Key Word :SPKT form of polyalphabetic substitution. A
Cipher text : polyalphabetic cipher is any cipher based
wb lngc xzm fet on substitution, using multiple
substitution alphabets .The encryption of
the original text is done using the
Vigenère square or Vigenère table.
Plain-Text: Hello
Key: Thank
26-11-11-24-24
A-l-l-y-y
Plain-Text:
H-e-l-l-o
7-4-11-11-14
Key:
T-h-a-n-k
19-7-0-13-10
Return
Transposition cipher Examples:
a transposition cipher is a method * Rail fence Cipher
of encryption by which the * Route Cipher
positions held by units of plaintext * Columnar transposition
(which are commonly characters or * Double transposition
groups of characters) are shifted
according to a regular system, so
that the ciphertext constitutes a
permutation of the plaintext.
W . . . E . . .C . . . R . . . L . . . T . . . E
The rail fence cipher (sometimes called zigzag cipher) is
. E . aRtransposition
. D . S . cipher
O . Ethat. jumbles
E . F up. the E order
. A of. Othe . C .
. . A letters
.fence
. . cipher
ofIa message
. .works
. Vby. writing
. a. basic
using Dyour. algorithm.
.message
. E .The. .
rail N
on alternate
. .
lines across the page, and then reading off each line in
turn
WECRLTEERDSOEEFEAOCAIVDEN
Route Cipher
: The Route Cipher is a transposition
cipher where the key is which route
to follow when reading the ciphertext
from the block created with the
plaintext. The plaintext is written in a
grid, and then read off following the
route
Columnar transposition
The Route Cipher is a transposition
cipher where the key is which route to
follow when reading the ciphertext from
the block created with the plaintext.
The plaintext is written in TINES
The tomato is a plant in the nightshade
a grid, and
AXEOA HTFXH TLTHE YMAII AIXTA
then read off following the route PNGDL OSTNH MX
family
chosen
Double transposition
Return
BASIS FOR COMPARISON SUBSTITUTION TECHNIQUE TRANSPOSITION TECHNIQUE
Replaces the plaintext characters with Rearranges the position of the characters
Basic other characters, numbers and symbols. of the plaintext.
The identity of the character is changed The position of the character is changed in
Alterations while its position remains unchanged. spite of its identity.
The letter with the low frequency can Keys near to the correct key can disclose
Demerit discern the plaintext. the plaintext.