By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan

Slides:



Advertisements
Similar presentations
1 CSCD434/539 Winter 2013 Lecture 11 Cryptography - Basics.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Autokey Ciphers. History The Autokey Cipher is almost identical to the Vigenère Cipher – only it’s more secure It was first invented by Girolamo Cardano.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Categories of Ciphers Substitution ciphers - replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Encryption with Keys and Passwords
•□♎♏• ♋■♎ •♓•♒♏❒• (Codes and Ciphers)
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
CAP Cryptographic Analysis Program
Asad Gondal Ali Haider Mansoor
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Symmetric Algorithm of Cryptography
Section 2.7 The Friedman and Kasiski Tests
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Cryptography and Network Security
Computer and Data Security 4th Class
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Computer and Data Security 4th Class
Chapter-2 Classical Encryption Techniques.
Polyalphabetic Ciphers
Taehyung Kim HPC Lab. POSTECH
Department of Computer and IT Engineering University of Kurdistan
Classical Polyalphabetic Ciphers
CSCD 303 Fall 2018 Lecture 18 Cryptography - Basics.
Cryptanalysis of Vigenere Cipher
Fun with Cryptography The Science of Secrecy.
Digital Communications
Traditional Symmetric-Key Ciphers
CSCD434 Spring 2019 Lecture 12 Cryptography - Basics.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Double Transpositions
. Columnar Transposition
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan Vigenere Cipher By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan

Polyalphabetic Ciphers The relationship between a character in the plaintext to a character in the cipher text is one-to-many.

Vigenere Cipher The Vigenere cipher is the kind of polyalphabetic cipher. It was design by Blaise de Vigenere, a 16th century French mathematician. It was used in the American civil war and was once believed to be unbreakable. A Vigenere cipher uses a different strategy to create the key stream. The key stream is a repetition of an initial secret key stream of length m, where we have 1<=m<=26. The Vigenere cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. The Vigenere cipher uses multiple mixed alphabets, each is a shift cipher.

Vigenere Cipher Plain text: Cipher text: Key stream: Encryption: Decryption:

Example We can encrypt the message “She is listening” using the 6- character keyword “PASCAL“. The initial key stream is (15,0,18,2,0,11). The key stream is the repetition of this initial key stream (as many times as needed) . Use encryption algo:

Note:- The Vigenere key stream dose not depend on the plaintext characters. It depends only on the position of the character in the plain text.

Example cont.… Vigenere cipher can be seen as combinations of m additive ciphers.

Vigenere Table Another way to look at Vigenere ciphers is through what is called a Vigenere Tableau, Vigenere Table or Vigenere Square. The first row of this table has the 26 English letters. Shows the plain text character to be encrypted. Starting with the second row, each row has the letters shifted to the left one position in a cyclic way. For example, when B is shifted to the first position on the second row, the letter A moves to the end. The first column contains the characters to be used by the key.

Example:- To find the cipher text for the plaintext “she is listening ” using the word “PASCAL” as the key .we can find “s” in the first row, “p” in the first column, the cross section is the cross section is the cipher text character “H” we can find “h” in the first row, “A” in the first column, the cross section is the cross section is the cipher text character “H” And so on…..

Encrypt example: “TO BE OR NOT TO BE THAT IS THE QUESTION” Use Vigenere table method to encrypt plain text to cipher text. Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY

Decrypt example: “TO BE OR NOT TO BE THAT IS THE QUESTION” Use Vigenere table method to decrypt cipher text to plain text. Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION

Vigenere Cipher (Crypanalysis) This method was actually discovered earlier, in 1854 by Charles Babbage. Vigenere-like substitution ciphers were regarded by many as practically unbreakable for 300 years. In 1863, a Prussian major named Kasiski proposed a method for breaking a Vigenere cipher that consisted of finding the length of the keyword and then dividing the message into that many simple substitution cryptograms.

Kasiski's technique Kasiski's technique for finding the length of the keyword was based on measuring the distance between repeated bigrams in the ciphertext. Example:- Location: 01234 56789 01234 56789 01234 56789 Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL Plaintext: tobeo rnott obeth atist heque stion Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY  Kasiski method would create something like the following list Repeated Bigram First index Second index difference distance KS 9 SM 1 10 ME 2 11 ….. ……. ……