Mixed Alphabet Keyword

Slides:



Advertisements
Similar presentations
Lecture 3 Classical Cipher System SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
3-D Vigenere Cipher using a “Vigenere Cube”
Introduction to Cryptography
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
CSE 504 Discrete Mathematics & Foundations of Computer Science
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Introduction to Cryptography
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Mixed Alphabets with Words And Mixed Alphabets with Columnar Transposition Team Members: Mike, Peter, Lakhbir, Joe Fijalkowski.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.3: Substitution Ciphers
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Keyword Mixed Alphabet Form ciphertext alphabet by: – pick a keyword – spell it without duplicates – then, fill in the rest of the alphabet in order Example,
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Substitution Ciphers.
Introduction CS 303 Algorithmic Number Theory and Cryptography
Affine Cipher.
Asad Gondal Ali Haider Mansoor
RSA Public-Key Secrecy and Signature
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Taehyung Kim HPC Lab. POSTECH
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Outline Some Basic Terminology Symmetric Encryption
M3: Encryption r By Andrew Stringer.
Cryptography Survey.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Rivest, Shamir and Adleman
Encryption on the Internet
Analysis of the RSA Encryption Algorithm
Cryptography Survey.
National Cipher Challenge
Classical Ciphers – 2 CSCI284 Spring 2004 GWU
Fun with Cryptography The Science of Secrecy.
Put the dots on the shift keys.
Shannon Secrecy CSCI284/162 Spring 2009 GWU.
Cryptology Design Fundamentals
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
EKRJGTU CTG CYGUQOG! Can you break the code?.
Cryptology Design Fundamentals
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
. Columnar Transposition
Homophonic Substitution Cipher
The Caesar cipher Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher key: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 4 Plain:
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Mixed Alphabet Keyword In this method we must have a keyword with plaintext, the steps of this method are explained below:- 1. Write the alphabet letters from a to z. 2. Take the keyword with no repeated letters (no repeated letters must be found). 3. Put the new keyword under the corresponding alphabet and the alphabet letters that is not found in the keyword must be added to the end of the keyword.

Mixed Alphabet Keyword(encryption) Plaintext = “ALMAMONUNIVERSITY” KEY =”MATHMATIC” Remove duplicate Cipher text =BRUBUWVTVOHJZMO KEY =MATHIC” A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mixed Alphabet decryption))Keyword Cipher text =BRUBUWVTVOHJZMO KEY =”MATHMATIC” KEY =MATHIC” B D F G J K L N O P Q R S U V W X Y Z M A T H E I C Plaintext = “ALMAMONUNIVERSITY”

Mixed Alphabet Keyword keyword = REGINA A B C D E F G H I J K L M N O P Q R S T U V W X Y Z plaintext = ALMAMONCOLLEGE cipher text= RDMRMIUKIDDYCY

Multiplicative

Multiplicative Using the following forms for ciphering and deciphering respectively:- C= (P*K) mod 26 where GCD (K, 26) =1 and GCD is the Greatest Common Devisor P=(C*K-1) mod 26

Multiplicative Ex: Encryption K=9 Plain text = ALM EK(m) =(m*k) mod 26 E9(A) =(0*9) mod 26 = 0 = A E9(L) =(11*9) mod 26 =99 mod 26 = 21 = V E9(M) =(12*9) mod 26 =108 MOD 26 = 4 = E Cipher text = “AVE

Ex: Encryption K-1 = 3 Cipher text = AVE DK(p) =(p Ex: Encryption K-1 = 3 Cipher text = AVE DK(p) =(p*k-1) mod 26 D3(A) =(0*3) mod 26 = 0 = A D3(V) =(21*3) mod 26 =63 mod 26 = 11 = L D3(E) =(4*3) mod 26 =12 MOD 26 = 12 = M

Shift + Multiplicative (Affine Cipher

Shift + Multiplicative (Affine Cipher For ciphering:- C= (P*K1 + k2) mod 26 with K1 is a prime number T= (P*K1) mod 26 C= (T+K2) mod 26 For deciphering:- P=((C-K2)*K1-1) mod 26 T= (C-K2) mod 26 P=(T*K1-1) mod 26

Shift + Multiplicative (Affine Cipher Example:Use an affine cipher to encrypt the message “hello” with the key pair (7, 2).

Shift + Multiplicative (Affine Cipher) Encryption Plaintext= omar and K1 =3 and K2 =2 C(o) = (14*3+2) mod 26 = 44 mod 26 = 18 → S C(m) = (12*3+2) mod 26 = 38 mod 26 = 12 → m C(a) = (0*3+2) mod 26 = 2 → c C(r) = (17*3+2) mod 26 = 53 mod 26 = 1→ b ∴ C= smcb

Shift + Multiplicative (Affine Cipher) Now for deciphering "zebbw" with key pair (7, 2):- k-1 (7)=15 P(z) = ((25-2)* 15) mod 26 =(23*25) mod 26 = 345 mod 26 =7 → h P(e) = ((4-2)* 15) mod 26 =2*15 mod 26 =30 mod 26 = 4 → E P(b) = ((1-2)* 15) mod 26 =-1*15 =-15mod 26 =(26-15)=11 → L P(b) = L P(w) = ((22-2)*15) mod 26 =14 → o ∴ P= hello