Lecture 3 Classical Cipher System SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY 2012-2013.

Slides:



Advertisements
Similar presentations
CAP Cryptographic Analysis Program
Advertisements

390 Codes, Ciphers, and Cryptography
Computer Science 101 Data Encryption And Computer Networks.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
Classical Cryptography 1. Introduction: Some Simple Cryptosystems.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Section 2.9 The Hill Cipher; Matrices
Classical Encryption Techniques
Introduction to Cryptography
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Chris Christensen Northern Kentucky University. Lester S. Hill
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Introduction to Cryptography
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Section 2.5 Polyaphabetic Substitutions
Cryptography. Introduction Cryptography is the art of achieving security by encoding messages to make them non- readable. Some cryptography algorithms.
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Matrix Multiplication The Introduction. Look at the matrix sizes.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
Lecture 3 1. TRANSPOSITION CIPHERS 2 Transposition Ciphers now consider classical transposition or permutation ciphers these hide the message by rearranging.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
Substitution Ciphers.
Network Security Unit-1
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
CAP Cryptographic Analysis Program
History and Background Part 4: Transposition Ciphers
Classical Polygraphic Ciphers
Lecture Classical Encryption Techniques Dr. Nermin Hamza
Computer and Data Security 4th Class
History and Background Part 3: Polyalphabetic Ciphers
Computer and Data Security 4th Class
Chapter-2 Classical Encryption Techniques.
Outline Some Basic Terminology Symmetric Encryption
Campbell R. Harvey Duke University and NBER
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Information Security IT423
Mixed Alphabet Keyword
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
. Columnar Transposition
The Caesar cipher Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher key: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 4 Plain:
Presentation transcript:

Lecture 3 Classical Cipher System SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY

Classical cipher system substitutiontransposition Homophoni c polyalphabeti c polygram simple shifteddecimatio n affin Key word mix Beal High- order Vigene re BeafortVariant beaufort Hill Play Fair

5- POLYGRAM SUBSTITUTION CIPHERS: PolyGram substitution ciphers are ciphers in which group of letters are encrypted together, and includes enciphering large blocks of letters. Play Fair: 1- if m1,m2 in same row, then c1, c2 are the two characters to the right of m1, m2 respectively. 2- If m1, m2 in the same column, then c1, c2 are below the m1,m2. 3- If m1, m2 are in different rows and columns then c1, c2 are the other corners of rectangle. 4- If m1=m2 a null character (e.g. x) is inserted in the plaintext between m1, m2 to eliminate the double. 5- If the plaintext has an odd number of characters a null character is appended to the end of the plaintext.

Example: ∑ =A…Z M = RENAISSANCE 5- POLYGRAM SUBSTITUTION CIPHERS: - Play Fair: HARPS ICODB EFGKL MNQTU VWXYZ K = M = RE NA IS SA NC EX Ek(M)= C= HG WC BH HR WF GV

5- POLYGRAM SUBSTITUTION CIPHERS: Hill Ciphers: Let d=2, M= m1 m2, C= c1, c2 where: C1 =( k 11 m1 +k 12 m 2 ) mod n C2 =(k 21 m1 +k 22 m 2 ) mod n K11k12 K21K22 Where K = C1 C2 K11k12 K21K22 m1 m2 That is : = * mod n Ek(M) = K*M Dk(C) = K -1 *C mod n = K -1 K M mod n = M Where K.K -1 mod n = I (Identical matrix)

5- POLYGRAM SUBSTITUTION CIPHERS: Example: ∑ =A…Z M = EG K K -1 I Mod 26 = M = E G = 4 6 C1 C Y Q = * mod 26 = = To decipher:- m1 m E G = * mod 26 = =