Columnar Transposition

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Lecture 23 Symmetric Encryption
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Introduction to Cryptography
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Classical Encryption techniques
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Computing Cryptography (Traditional Ciphers)
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 23 Symmetric Encryption
Section 2.3: Substitution Ciphers
Shahram Khazaei Siavash Ahmadi Fall 2015
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Computer Security (CS4800)
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Transposition Cipher Edilasio Pereira Steven Pascal Louis Szgalsky Kimberly Chiffens.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Substitution Ciphers.
Combination of MonoAlphabetic &Transposition Cipher
TRANSPOSITION CYPHER.
Chapter 2 Basic Encryption and Decryption
Row Transposition Ciphers
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
Cryptography and Network Security
Introduction Of System Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
NET 311 Information Security
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Transposition Ciphers
NET 311D Information Security
Confusion and Diffusion
. Columnar Transposition
Computer Security Chapter Two
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Columnar Transposition Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003

Transposition Techniques The rail fence technique is simple--the plaintext is simply written down as diagonals and the ciphertext is produced by reading the rows. A more complex scheme would be to write the message in rectangular form, row by row, and then to read the characters column by column.

Using a Key for the Columns Now suppose the matrix is read out as a permutation of the columns. A key could be used to indicate the order of the columns to be read.

Cryptanalysis of Columnar Transpositions The transposition cipher can be recognized using frequency analysis of the characters. The frequency analysis indicates that the cipher text frequencies match the plaintext frequencies. The code can be broken by laying out the ciphertext in a matrix and playing around with the column positions.

Making the Columnar Transposition More Secure Besides using a key, multiple transpositions could be performed. This would be an example of “multiple stage” encryption. The result is a more complex permutation that is not easy to determine.