Vigenére Cipher Kimberly Chiffens & Maria Jannelli.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CAP Cryptographic Analysis Program
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
ICS 454: Principles of Cryptography
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
3-D Vigenere Cipher using a “Vigenere Cube”
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Introduction to Cryptography
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
CS110: Computers and the Internet Encryption and Certificates.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Web Tools for Classical Cryptology Tristan Beeble.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.3: Substitution Ciphers
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Asad Gondal Ali Haider Mansoor
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
Symmetric Algorithm of Cryptography
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Cryptography Survey.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
ICS 454: Principles of Cryptography
Cryptography Survey.
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Fun with Cryptography The Science of Secrecy.
Digital Communications
Double Transpositions
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Presentation transcript:

Vigenére Cipher Kimberly Chiffens & Maria Jannelli

What is it? Cryptology is the science of securing information Frenchman Blaise de Vigenere created this cipher based on the polyalphabetic substitution based cipher This particular cipher involves a multiple shift method The table used (in the background) consists of the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers

Why and how it works? It is easy to apply and helps to learn about cryptology A long key without repeating letters is more secure Start with plaintext: WhysoseriousLetsputasmileonthatface (35) Then the person sending the message chooses a keyword and repeats it until it matches the length of the plaintext, for example, the keyword “darkknight” : darkknightdarkknightdarkknightdarkk (35)

Vigenere Table

Demonstration Example of encryption: Plaintext = Why so serious lets put a smile on that face Key= darkknightdarkknightdarkknightdarkk Ciphertext = ZHPCYFMXPHXSCODFXAATVMZVOBVZOT WFRMONDSCQ

Demonstration Example of decryption: Ciphertext = yclhchvalkctqrly Key= impact Plaintext = go ahead make my day

References Principles of Operating Systems: Design and Application, Brian L. Stuart. Course Technology