Homophonic Substitution Cipher

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CSE 651: Introduction to Network Security
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
MAT 1000 Mathematics in Today's World Winter 2015.
CS110: Computers and the Internet Encryption and Certificates.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Conventional Encryption Message Confidentiality
Asad Gondal Ali Haider Mansoor
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
Communication Security
Cryptography and Network Security
Lecture Classical Encryption Techniques Dr. Nermin Hamza
Computer and Data Security 4th Class
Information and Computer Security CPIS 312 Lab 2
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Outline Some Basic Terminology Symmetric Encryption
Computer and Network Security
Topic 3: Data Encryption.
Cryptography Survey.
Conventional Encryption Message Confidentiality
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Encryption on the Internet
Cryptography Survey.
Classical Polyalphabetic Ciphers
Simple Encryption- Lesson 5
Fun with Cryptography The Science of Secrecy.
Digital Communications
Traditional Symmetric-Key Ciphers
Mixed Alphabet Keyword
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
The Caesar cipher Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher key: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 4 Plain:
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Homophonic Substitution Cipher Each letter in the secret message is replaced with a number which represents the position of a word in an assistant text which start with this letter

Beale cipher We assign a set of numbers to each letter in the plain text alphabet by using a specific text, each letter in the plain text will be replaced by number that represent the location of some ward in the text that start with this letter

Beale cipher

Beale cipher Ex Plain text = A L M A M O N C O L L E G E Cipher text = 19 11 17 21 47 44 62 63 58 16 40 20 12 20 Decryption Cipher text = 19 11 17 21 47 44 62 63 58 16 40 12 20 Plain text = A L M A M O N C O L L G E

Beale cipher If the assistant text = zainab muhammed and P= zahzuh The assistant text will be as follows after dispose the repeated letters from it. Assistant text = zainbmuhed

Beale cipher

Beale cipher

Polyalphabetic Substitution Cipher use a key to select which alphabet is used for each letter of the message use each alphabet in turn repeat from start after end of key is reached

Vigenère Cipher simplest polyalphabetic substitution cipher effectively multiple caesar ciphers key is multiple letters long K = k1 k2 ... kd ith letter specifies ith alphabet to use use each alphabet in turn repeat from start after d letters in message decryption simply works in reverse

Vigenère Cipher Encryption C= E(p) = (p+ki) mod (26) Decryption p= E(C) = (C - ki) mod (26)

Vigenère Cipher Example :We can encrypt the message “She is listening” using the 6-character keyword “PASCAL”.

Vigenère Cipher

Vigenère Cipher A Vigenere Table

Vigenère Cipher Plaintext = the forth class Key = car

Vigenère Cipher C(f) = (5+2) mod 26 = 7 → h C=(P+K) mod 26 C(f) = (5+2) mod 26 = 7 → h C(o) = (14+0) mod 26 = 14 → o C(r) = (17+17) mod 26 = 8 → i C(t) = (19+2) mod 26 = 21 → v C(h) = (7+0) mod 26 = 7 → h C(c) = (2+17) mod 26 =19 → t C(l) = (11+2) mod 26 =13 → n C(a) = (0+0) mod 26 = 0 → a C(s) = (18+17) mod 26 = 9 → j C(s) = (18+2) mod 26 = 20 → u ∴ C = vhvhoivhtnaju

Vigenère Cipher P=(C-K) mod 26 P(v) =(21-2) mod 26 = 19 → t P(h) =(7-0) mod 26 = 7 → h P(v) =(21-17) mod 26 = 4 → e P(h) =(7-2) mod 26 = 5 → f P(o) = (14-0) mod 26 = 14 → o P(i) = (8-17) mod 26 = (26-9) mod 26 = 17 → r

Vigenère Cipher P(v) = (21-2) mod 26 = 19 → t P(h) = (7-0) mod 26 = 7 →h P(t) = (19-17) mod 26 =2 → c P(n) = (13-2) mod 26 = 11 →l P(a) =(0-0) mod 26 =0 → a P(j) = (9-17) mod 26 =(26-8) mod 26 =18 →s P(u) = (20-2) mod 26 =18 →s ∴ P= theforthclass

Vigenère Cipher Plaintext = she is listening Key = pascal