You are on page 1of 18

The Yenepoya Institute of Arts, Science, Commerce and Management (YIASCM)

Course: BCA(Big Data Analytics and Cloud Computing)-


Vr2

BCS504: Cryptography and Network Security

Unit-2:- Transformations , PART-2 Jamuna K M


Dept.of Computer Science, YIASCM

1
Outcome/Objectives
• Completion of this class the leaner will able to
SUBSTITUTION TECHNIQUES:-Substitution Ciphers
Examples of Substitution Ciphers
Algorithm and procedure
Transposition Cipher
Examples of Transposition Cipher
Summary
Reference
Substitution Ciphers
• Hiding some data is known as encryption.
• When plain text is encrypted it becomes unreadable and is known as
cipher text.
• In a Substitution cipher, any character of plain text from the given
fixed set of characters is substituted by some other character from
the same set depending on a key.
• For example with a shift of 1, A would be replaced by B, B would
become C, and so on. 
Example- Problem
Plain Text: I am studying Data Encryption

Key :- 4

Plain Text:- ABCDEFGHIJKLMNOPQRSTUVWXYZ

Key :- 4
Expected Output
m eq wxyhcmrk hexe irgvctxmsr

efghijklmnopqrstuvwxyzabcd
Algorithm for Substitution Cipher
• Input: 
A String of both lower and upper case letters, called PlainText. 
An Integer denoting the required key.
• Procedure: 
Create a list of all the characters. 
Create a dictionary to store the substitution for all characters. 
For each character, transform the given character as per the rule, depending on
whether we’re encrypting or decrypting the text. 
Print the new string generated. 
 
• Home Work:-
Implement the Substitution Ciphers using C++
Transposition Cipher
• Transposition Cipher is a cryptographic algorithm where the order of
alphabets in the plaintext is rearranged to form a cipher text.
• In this process, the actual plain text alphabets are not included.
Reverse whole text
• One example of a transposition cipher, is to reverse the order of the
letters in a plaintext.
• So "a simple example" becomes "ELPMAXE ELPMIS A".
Reverse word
• Another, similar, way to encrypt a message would be to reverse the
letters of each word, but not the order in which the words are
written. In this case "a simple example" becomes "A ELPMIS
ELPMAXE"
Example
• A simple example for a transposition cipher is columnar transposition
cipher
• where each character in the plain text is written horizontally with
specified alphabet width.
• The cipher is written vertically, which creates an entirely different
cipher text.
• Consider the plain text hello world
Difference between Substitution Cipher
Technique and Transposition Cipher
Technique
Substitution Cipher Technique Transposition Cipher Technique
In substitution Cipher Technique, plain text In transposition Cipher Technique, plain
characters are replaced with other text characters are rearranged with respect
characters, numbers and symbols. to the position.
Substitution Cipher’s forms are: Mono Transposition Cipher’s forms are: Key-less
alphabetic substitution cipher and poly transposition cipher and keyed
alphabetic substitution cipher transposition cipher.
In substitution Cipher Technique, While in transposition Cipher Technique,
character’s identity is changed while its The position of the character is changed
position remains unchanged. but character’s identity is not changed.
In substitution Cipher Technique, The While in transposition Cipher Technique,
letter with low frequency can detect plain The Keys which are nearer to correct key
text. can disclose plain text.
The example of substitution Cipher is The example of transposition Cipher is
Caesar Cipher. Rail Fence Cipher.
Summary
• In this session the leaner understand
SUBSTITUTION TECHNIQUES:-Substitution Ciphers
Examples of Substitution Ciphers
Algorithm and procedure
Transposition Cipher
Examples of Transposition Cipher
Questions/ Assignment
• Difference between substitution techniques and transposition
techniques
• Explain with suitable example substitution techniques
• Explain with suitable example transposition techniques
References

• MichaelE.WhitmanandHerbertJ.Mattord.
(2012).PrinciplesofInformationSecurity,2ndEd.,T homson, CengageDelmarLearning.
• WilliamStalling.
(2012).NetworkSecurityEssentials:ApplicationsandStandards,4thEd.,Pear
sonEducation.
• BehrouzA.Forouzan,DebdeepMukhopadhyay.
(2011).CryptographyandNetworkSecur ity,2ndEd., SpecialIndianEdition,
TataMcGraw-Hill.

You might also like