Cesar & Vigenere Encryption

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

(ENCODING AND DECODING TECHNIQUES)
Asymmetric Digital Signatures And Key Exchange Prof. Ravi Sandhu.
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Text Chapters 1, 2. Sorting ä Sorting Problem: ä Input: A sequence of n numbers ä Output: A permutation (reordering) of the input sequence such that:
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Classical Encryption techniques
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Web Tools for Classical Cryptology Tristan Beeble.
 Process of converting readable data into unreadable characters to prevent unauthorized access. › Encrypt – make unreadable › Decrypt – make readable.
A FRACTAL ENCRYPTION ALGORITHM
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Math – What is a Function? 1. 2 input output function.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cellular Encryption CREU Project Team: Alburn Brown Orkun Kaya Isaac Rieksts Eric Thorpe.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Computer Security (CS4800)
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
DEVRY COMP 122 L AB 7 L AB R EPORT AND S OURCE C ODE C HECK THIS A+ TUTORIAL GUIDELINE AT HTTP :// WWW. ASSIGNMENTCLOUD. COM / COMP -122/ COMP LAB.
Provides Confidentiality
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Symmetric Algorithm of Cryptography
Information and Computer Security CPIS 312 Lab 2
Encryption
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
- Stream Cipher and Block Cipher - Confusion & Diffusion
Simplified IDEA Cryptography and Network Security.
Input: A={a1, a2, … an} – public key, S - ciphertext
PART VII Security.
ICS 454: Principles of Cryptography
Analysis of the RSA Encryption Algorithm
NET 311D Information Security
Cryptology/Cryptography
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Fun with Cryptography The Science of Secrecy.
Confusion and Diffusion
International Data Encryption Algorithm
Introduction to Cryptography I
Homework #2 J. H. Wang Oct. 18, 2018.
Computer Security Chapter Two
Types of Cryptanalysis attacks
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
2. Perfect Secret Encryption
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
CMPT 120 Lecture 9 – Unit 2 – Cryptography and Encryption –
Counter Mode, Output Feedback Mode
Stream Cipher Structure
Feistel Cipher Structure
Data Encryption Standard (DES)
Assignment 2 DES implementation.
How to Use Charm Crypto Lib
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

Cesar & Vigenere Encryption Matlab Cesar & Vigenere Encryption guruh.fajar@research.dinus.ac.id

Basic Knowledge Plaintext Algorithm & Key Ciphertext Encryption Process Decryption Process

Implementation Matlab Plaintext Algorithm & Key Ciphertext Encryption Process Decryption Process Input Text / Data KEY ALGORITHM Transformation Output Decryption Process Encryption Process

Inputan plaintext & key txt='apa' key=1; Input Text / Data KEY ALGORITHM Transformation Output Encryption Process

Transform abjad --> angka if ( (txt < 'a') | (txt > 'z') ), error('Text character out of range a-z'); end; y=txt - 'a'; Input Text / Data KEY ALGORITHM Transformation Output Encryption Process

Enkripsi hasil_modulus=mod((y+key),26); Encryption Process Input Text / Data KEY ALGORITHM Transformation Output Encryption Process

Transform angka --> abjad if ( (hasil_modulus < 0) | (hasil_modulus > 25) ), error('Integer out of range 0 - 26'); end; cipher=char(hasil_modulus + 'a') Input Text / Data KEY ALGORITHM Transformation Output Encryption Process