superficial study on the concept of cryptography
DESCRIPTION
Superficial Study on the Concept of Cryptography covering different types of ciphersTRANSCRIPT
![Page 1: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/1.jpg)
www.company.com
•Abhishek Gautam•Ashim Gurung •Bikram Koirala• Monil Adhikari
Cryptography: A Brief
Overview
![Page 2: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/2.jpg)
www.company.com
Agenda Classical Cryptography coverage(esp. Substitution Ciphers):
Mono-alphabetic Substitution Ciphers.Homophonic Substitution Ciphers.Poly-graphic Substitution Ciphers.Poly-alphabetic Substitution Ciphers.
![Page 3: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/3.jpg)
www.company.com
• Introduction
Substitution Ciphers are the ciphers where a alphabet is replaced by another different ciphers. This ciphers mainly uses the alphabets to encrypt messages for confidentiality in communication.
Substitution Ciphers
![Page 4: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/4.jpg)
www.company.com
Mono-alphabetic Ciphers• The Mono-alphabetic Substitution cipher
is where each character in the plaintext is replaced by a corresponding one from a cipher alphabet. There are 3 types of Mono-alphabetic Ciphers.– 1) Caesar Ciphers– 2) Affine Ciphers– 3) Atbash Ciphers
![Page 5: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/5.jpg)
www.company.com
Caesar Ciphers• This is a video
which briefly describes about the working of a Caesar ciphers.
(Youtube,2012)
![Page 6: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/6.jpg)
www.company.com
Homophonic Ciphers• A homophonic substitution cipher maps each
plaintext letter of a message to one or more cipher text symbols. Homophonic ciphers hide letter frequencies of plaintext messages which are mapped to one or more cipher text units called homophones.
• This method is based on the mono alphabetic substitution. The original text is not only encrypted by one but is also replaced with multiple secret symbols.
![Page 7: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/7.jpg)
www.company.com
Homophonic Ciphers(Contd.)• A Homophonic substitution cipher is like a simple substitution crypto-
system, in which a single character of plaintext can map to one of several characters of cipher text. A plaintext message M=m1m2... is enciphered as C=c1c2..., where each ci is picked at random from the set of homophones f(mi).
• Letter Homophones A 17 19 34 41 56 60 67 83 I 08 22 53 65 88 90
L 03 44 76 N 02 09 15 27 32 40 59 O 01 11 23 28 42 54 70 80
P 33 91 T 05 10 20 29 45 58 64 78 99 One possible encipherment of the message is:
M = P L A I N P I L O TC = 91 44 56 65 59 33 08 76 28 78
![Page 8: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/8.jpg)
www.company.com
Poly-graphic Ciphers
• “In a polygraphic substitution cipher plaintext letters are substituted in large groups instead of substituting letters individually”.(wordIQ, n.d)
• The first advantage is that the frequency distribution is much flatter than that of individual letter.
• Second , the large numbers of symbols requires correspondingly more cipher text to productively analyze letter frequencies.
![Page 9: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/9.jpg)
www.company.com
Playfair Ciphers• The playfair cipher encrypts pair of
letters(diagraph), instead of single letters.• It was invented in 1854 by Charles Wheatstone
for telegraph secrecy. • It is the earliest practical Polygraphic
Substitution ciphers.• The cipher used a 5 by five table containing a
key word.
![Page 10: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/10.jpg)
www.company.com
Poly-alphabetic Ciphers
• In poly-alphabetic cipher, each plaintext character may be replaced by more than one character
• Since there are only 26 alphabets this process will require using a different representation than the alphabets
• Alphabets ‘A’ through ‘Z’ are replaced by 00, 01, 02, …, 25
• We need two digits in this representation since we need to know how to reverse the process at the decryption side (Babylon,1997).
![Page 11: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/11.jpg)
www.company.com
Vignere Ciphers
• The most common method used as a type of Poly-Alphabetic Cipher is Vigenère cipher
• Vigenère cipher starts with a 26 x 26 matrix of alphabets in sequence. First row starts with ‘A’, second row starts with ‘B’, etc.
![Page 12: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/12.jpg)
www.company.com
Vigenere(Contd.)
• E.g., Message = SEE ME IN MALL
• Take keyword as INFOSEC• Vigenère cipher works as
follows:
S E E M E I N M A L L
I N F O S E C I N F O
-------------------------------------
A R J A W M P U N Q Z
![Page 13: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/13.jpg)
www.company.com
Conclusion• We have considered mainly the key
aspects of Substitution Ciphers and their workings as well as their algorithms.
![Page 14: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/14.jpg)
www.company.com
References
• Brown, 1996, Introduction to Cryptography, [online], Available at: http://williamstallings.com/Extras/Security-Notes/lectures/classical.html [Accessed at 1st Jan 2012]
• All Science Projects, 2011, [online], Available at: http://www.all-science-fair-projects.com/science_fair_projects_encyclopedia/Caesar_cipher [Accessed at 1 Jan 2012]
• Chargrill, 2006,PlayFair Cipher ,[online] http://www.perlmonks.org/?node_id=554404 accessed on Jan 11
• WordIQ, n.d, Substitution cipher- Definition, [online] http://www.wordiq.com/definition/Substitution_cipher#Polygraphic_substitution accessed on Jan 11
• University of Adelaide,2012,[online],Available at : https://www.eleceng.adelaide.edu.au/personal/dabbott/wiki/index.php/Cipher_Cross-off_List#Homophonic_Substitution_Ciphers,[Accessed on 10 Jan 2012]
• Mrgeorged, 2009. Top Gear The Stig revealed Full. [video online],Available at:<http://www.youtube.com/watch#!v=eTapK5dRaw4>[Accessed 23 June 2009].
![Page 15: Superficial Study on the Concept of Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022082512/5551500eb4c905bd1c8b5672/html5/thumbnails/15.jpg)
www.company.com
???