Presentation is loading. Please wait.

Presentation is loading. Please wait.

NET 311D Information Security

Similar presentations


Presentation on theme: "NET 311D Information Security"— Presentation transcript:

1 NET 311D Information Security
Networks and Communication Systems Department TA. Anfal AlHazzaa TUTORIAL 1 (Traditional Ciphers “Character-oriented”)

2 Recalling Networks and Communication Systems Department

3 Example Networks and Communication Systems Department
Plaintext : original message before being transformed. Ciphertext : The message after transformation (coded). Cipher : algorithm for transforming plaintext to ciphertext Key : information used in cipher known only to sender/receiver Encrypt : converting plaintext to ciphertext Decrypt: recovering ciphertext from plaintext Cryptography : study of encryption principles/methods Cryptanalysis (codebreaking) - study of principles/ methods of decrypting ciphertext without knowing key Networks and Communication Systems Department

4 Cryptography Categories
Networks and Communication Systems Department

5 Symmetric Key Symmetric Key Traditional Ciphers Symmetric Key
Modern Round Ciphers Traditional Ciphers Simple Modern Cipher Networks and Communication Systems Department

6 Traditional Ciphers Shift (Caesar) cipher
Networks and Communication Systems Department

7 Questions Traditional Ciphers
Networks and Communication Systems Department

8 Q1: Substitution cipher (Caesar)
Encrypt the following texts using the shift (Caesar) cipher with the keys in brackets: “Welcome” (Key=10) GOVMYWO “Open the door” (Key=5) TUJS YMJ ITTW GOVMYWO TUJS YMJ ITTW Networks and Communication Systems Department

9 Q1: Substitution cipher (Caesar) cont.
Networks and Communication Systems Department

10 Q2: Substitution cipher (Caesar)
Alice wants to encrypt a message to Bob by using the shift cipher algorithm “Caesar cipher” and the key= 20. The plaintext = “QUIZ”. ( Hint: you may need to use the table) Answer: KOCT A M Y 24 B N Z 25 C O 14 D P 15 E Q 16 F R 17 G S 18 H T 19 I U 20 J V 21 K W 22 L X 23 5-Dec-18 Networks and Communication Systems Department

11 Q3: Substitution cipher (Monoalphbetic)
Use the following table as the key to encrypt the following texts using the substitution cypher: “Announce it tomorrow” EVVRYVZH BF FRDRWWRX - “DO IT” - JR BF A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Networks and Communication Systems Department

12 Q4: Transposition cipher
The following text was encrypted using the transposition cipher with the following mapping as the key, decrypt the message : Decrypt Encrypt HI SARA I HOPE YOU ARE FINE LOOKING FORWARD TO SEE YOU Cipher Text: SAHRIHOAPIOUEAYFIRNEOOEKLGFIONARRDWSETEOUZYZO

13 Q4: Transposition cipher cont.
Answer HI SARA I HOPE YOU ARE FINE LOOKING FORWARD TO SEE YOU Networks and Communication Systems Department

14 Q5: Transposition cipher
Encrypt the following message using transposition cipher based on the key shown below: The message is “SWEET HEART”. Answer: WESTHEAREZZT Networks and Communication Systems Department


Download ppt "NET 311D Information Security"

Similar presentations


Ads by Google