Professional Documents
Culture Documents
Part - 2
• In network security world
• B, A want to communicate securely
• T may intercept, delete, add messages
B
A data, control
channel
messages
T
The language of cryptography
A’s B’s
encryption decryption
key key
m plaintext message
3
ROT 1 cipher
• This is a cipher familiar to many children. Its key is simple: each
letter of the alphabet is replaced with the following letter, so A is
replaced with B, B is replaced with C, and so on. “ROT1” literally
means “rotate 1 letter forward through the alphabet.” The
message “I know what you did last summer” would become “J
lopx xibu zpv eje mbtu tvnnfs” and so on. This cipher is fun
because it is easy to understand and use, but it is equally easy to
decipher if they key is used in reverse. This cipher is not suitable
for serious use but can be of great amusement for children.
TRANSPOSITION CIPHER
• In transposition ciphers, the letters are rearranged according
to some predetermined rule or key. For example, words might
be written backwards, so that “all the better to see you with”
becomes “lla eht retteb to ees joy htiw.” Another transposition
key is to swap every pair of letters, so the previous message
becomes “la tl eh eb tt re to es ye uo iw ht.” Such ciphers were
used during the First World War and the American Civil War to
send sensitive messages. Complex rules of rearrangement can
make these ciphers seem very difficult at first, but many
transposed messages can be deciphered using anagrams or
modern computer algorithms which test thousands of possible
transposition keys.
SYMMETRIC KEY (private key)
KS KS
6
MODERN SECURITY
PROTECTION