Mixed Alphabets with Words And Mixed Alphabets with Columnar Transposition Team Members: Mike, Peter, Lakhbir, Joe Fijalkowski.

Slides:



Advertisements
Similar presentations
1 Cryptosystems When defining a cryptosystem, details must be given of: The alphabets M and C the keyspace K and how keys are to be chosen The encryption.
Advertisements

CAP Cryptographic Analysis Program
CAP Cryptographic Analysis Program
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Encryption and Encoding
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
3-D Vigenere Cipher using a “Vigenere Cube”
Classical Encryption Techniques
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
Introduction to Cryptography
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Section 3.6: An Introduction to Cryptography
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Cryptography Programming Lab
CSCI 5857: Encoding and Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Introduction to Cryptography
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
TRANSPOSITION CYPHER.
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
Columnar Transposition
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
CAP Cryptographic Analysis Program
Communication Security
Chapter-2 Classical Encryption Techniques.
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Five-minute starter task
Chapter 3:Cryptography (16M)
Fun with Cryptography The Science of Secrecy.
Mixed Alphabet Keyword
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Double Transpositions
. Columnar Transposition
Homophonic Substitution Cipher
Types of Cryptanalysis attacks
The Caesar cipher Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher key: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 4 Plain:
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Mixed Alphabets with Words And Mixed Alphabets with Columnar Transposition Team Members: Mike, Peter, Lakhbir, Joe Fijalkowski

Mixed Alphabets with Words Keyword is given A Keyword provide a way of mixing of the alphabet that is easy for two correspondents to remember. Write keyword without repetitions Then list Alphabet in its usual order.

Example 1  Keyword is given : GOODMORNING  GOODMORNING -  GODMRNI Plain – ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher- GODMRNIABCEFHJKLPQSTUVWXYZ Plain to cipher: YANA KORTSARTS ---> YGJG EKQTSGQTS Cipher to pain: OR AGLLY ----  BE HAPPY

Example 2 Plaintext Key Words = old woman Now rewrite key words with no spaces and no duplicate letters. Plaintext – oldwman Now write regular alphabet after the keyword with no duplicates A B C D E F G H I J K L M N O P Q R S T U V W X Y Z O L D W M A N B C E F G H I J K P Q R S T U V X Y Z ex. CUCUMBER now becomes “DTDTHLMQ” Ex “OKKGM” becomes APPLE

Mixed Alphabets with Columnar Transposition Method known as keyword columnar transposition substitution. Keyword is given Write the keyword in line without repeating words Mixed alphabets obtained by writing the letters of this array column by column, going left to right

Example 1 Plaintext – oldwman Now write keyword on first line, and all other letters in columns under it. O L D W M A N B C E F G H I J K P Q R S T U V X Y Z Now go down column by column and write the letters left to right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z O B J U L C K V D E P X W F Q Y M G R Z A H S N I T ex. CUCUMBER now becomes “JAJAWBLG” Ex “OYYXL” becomes APPLE

Example 2 KEYWORD: PIZZA ENCRYPTION: YANA KORTSARTS P I Z A B C D E F G H J K L M N O Q R S T U V W X Y ABCDEFGHIJKLMNOPQRSTUVWXYZ PBFKOTXICGLQUYZDHMRVAEJNSW DECRYPTION: YANA KORTSARTS ---  SPYP LZMVRPMVR ENCRYPTION: ZMPYXO CR ZMPYXP -  ORANGE IS ORANGE

Questions?  Q1.With keyword CRYPTO, using columnar transposition, decipher the text: EIQDDQXT OPDUN HICJET  Q2.With keywords EAT YOUR PEAS, using mixed alphabets with words, decipher the text: VOGYXL AETHOGEMHK  Q3.For columnar transposition, given the keyword BUBBLE BUBBA, what would you actually use to decipher the text?