You are on page 1of 14

2

What is Cipher???
Origin:
In cryptography,
The earliest known a cipher
use of (or
cypher) is an algorithm
cryptography is found infor
non-
performing
standard encryption
hieroglyphs or into
carved
decryption
the wall of a tomb from the Old
Kingdom of Egypt circa 1900 BC
Substitution Ciphers

Cypher Transposition Ciphers


Substitution Ciphers Examples:
A substitution cipher is a type of * Ceasar Cipher.
encryption where characters or * Vigerene Cipher
units of text are replaced by others * Alberti Cipher
in order to encrypt a text sequence. * Vernam Cipher
It Offers very little communication
security, and it will be shown that
it can be easily broken even by
hand, especially as the messages
become longer
Ceasar
It Ciphers
is a type of cipher in which each
letter in the plaintext is 'shifted' a
certain number of places down the
alphabet.

Ex: Information Security

Lqirupdwlrq Vhfxulwb
Vigerene Cipher
We Have the plain text : Vigenere Cipher is a method of
Em buon ngu qua. encrypting alphabetic text using a simple
Key Word :SPKT form of polyalphabetic substitution. A
Cipher text : polyalphabetic cipher is any cipher based
wb lngc xzm fet on substitution, using multiple
substitution alphabets .The encryption of
the original text is done using the
Vigenère square or Vigenère table.
Plain-Text: Hello
Key: Thank

26-11-11-24-24
A-l-l-y-y
Plain-Text:
H-e-l-l-o
7-4-11-11-14
Key:
T-h-a-n-k
19-7-0-13-10

Return
Transposition cipher Examples:
a transposition cipher is a method * Rail fence Cipher
of encryption by which the * Route Cipher
positions held by units of plaintext * Columnar transposition
(which are commonly characters or * Double transposition
groups of characters) are shifted
according to a regular system, so
that the ciphertext constitutes a
permutation of the plaintext.
W . . . E . . .C . . . R . . . L . . . T . . . E
The rail fence cipher (sometimes called zigzag cipher) is
. E . aRtransposition
. D . S . cipher
O . Ethat. jumbles
E . F up. the E order
. A of. Othe . C .
. . A letters
.fence
. . cipher
ofIa message
. .works
. Vby. writing
. a. basic
using Dyour. algorithm.
.message
. E .The. .
rail N
on alternate
. .
lines across the page, and then reading off each line in
turn

WECRLTEERDSOEEFEAOCAIVDEN
Route Cipher
: The Route Cipher is a transposition
cipher where the key is which route
to follow when reading the ciphertext
from the block created with the
plaintext. The plaintext is written in a
grid, and then read off following the
route
Columnar transposition
The Route Cipher is a transposition
cipher where the key is which route to
follow when reading the ciphertext from
the block created with the plaintext.
The plaintext is written in TINES
The tomato is a plant in the nightshade
a grid, and
AXEOA HTFXH TLTHE YMAII AIXTA
then read off following the route PNGDL OSTNH MX
family

chosen
Double transposition

Double Transposition consists of two


applications of columnar transposition
to a message. The two applications
may use the same key for each of the
two steps, or they may use different
keys.

Return
BASIS FOR COMPARISON SUBSTITUTION TECHNIQUE TRANSPOSITION TECHNIQUE

Replaces the plaintext characters with Rearranges the position of the characters
Basic other characters, numbers and symbols. of the plaintext.

Mono-alphabetic and polyalphabetic Keyless and keyed transpositional cipher.


Forms substitution cipher.

The identity of the character is changed The position of the character is changed in
Alterations while its position remains unchanged. spite of its identity.

The letter with the low frequency can Keys near to the correct key can disclose
Demerit discern the plaintext. the plaintext.

Caesar Cipher Reil Fence Cipher


Example

You might also like