SlideShare una empresa de Scribd logo
1 de 72
Descargar para leer sin conexión
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 Encryption algorithm: The encryption algorithm performs various
substitutions and transformations on the plaintext.
 Secret key: The secret key is also input to the encryption algorithm.
The key is a value independent of the plaintext and of the algorithm.
The algorithm will produce a different output depending on the
specific key being used at the time.
Classical Encryption Techniques 1
 Ciphertext: This is the scrambled message produced as output. It
depends on the plaintext and the secret key.
 Decryption algorithm: This is essentially the encryption algorithm run
in reverse. It takes the ciphertext and the secret key and produces
the original plaintext.
Classical Encryption Techniques 1
 Symmetric-key algorithms are algorithms for cryptography that use
the same cryptographic keys for both encryption of plaintext and
decryption of ciphertext.
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Cipherered text
3
IODQN HDVW
DWWDFN DW GDZQ
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The clear text message would be
encoded using a key of 3.
1
FLANK EAST
ATTACK AT DAWN
Shift the top
scroll over by
three characters
(key of 3), an A
becomes D, B
becomes E, and
so on.
2
The clear text message would
be encrypted as follows using a
key of 3.
Clear text
Classical Encryption Techniques 1
 Caesar Cipher
 Monoalphabetic Ciphers
 Playfair Cipher
 Hill Cipher
 Polyalphabetic Ciphers
 Vigenère Cipher
 Autokey Cipher
 Vernam Cipher
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Caesar Cipher is one of the simplest and most
widely known encryption techniques.
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 PlainText = dcodex
 K=3
1) P=d
2) P=3
3) C=P+K mod 26=3+3 mod 26=6 mod 26 =6
4) C=g
Classical Encryption Techniques 1
 PlainText = dcodex
 K=3
1) P=x
2) P=23
3) C=P+K mod 26=23+3 mod 26=26 mod 26= 0
4) C=a
Classical Encryption Techniques 1
 P= dcodex
 C= gfrgha
 K=3
Classical Encryption Techniques 1
 CipherText = gfrgha
 K=3
1) C=g
2) C=6
3) P=C-K mod 26=6-3 mod 26=3
4) P=d
Classical Encryption Techniques 1
 CipherText = gfrgha
 K=3
1) C=a
2) C=0
3) P=C-K mod 26=0-3 mod 26=-3 mod 26 =23
4) P=x
Classical Encryption Techniques 1
 C= gfrgha
 P= dcodex
 K=3
Classical Encryption Techniques 1
 Three important characteristics of this problem enabled us to use a
bruteforce cryptanalysis:
The encryption and decryption algorithms are known.
There are only 25 keys to try.
The language of the plaintext is known and easily
recognizable.
Classical Encryption Techniques 1
Classical Encryption Techniques 1
How to implement Caesar Cipher
technique on Arabic letters?
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
A monoalphabetic cipher uses fixed substitution over
the entire message
Random Key
Classical Encryption Techniques 1
 Example:
Plaintext alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY
 P= ITEMS
 Encoding
 C= FQAIP
 Decoding
 P= ITEMS
Classical Encryption Techniques 1
 Relative Frequency of
Letters in English Text
Classical Encryption Techniques 1
 C=
Classical Encryption Techniques 1
 cipher letters P and Z are the equivalents of plain letters e and t
Classical Encryption Techniques 1
 Finally, The complete plaintext
Classical Encryption Techniques 1
How to implement Monoalphabetic
Cipher technique on Arabic letters?
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
 The Playfair system was invented by Charles Wheatstone, who first
described it in 1854.
 Used by many countries during wartime
 The Playfair algorithm is based on the use of a 5 x 5 matrix of
letters constructed using a keyword.
Classical Encryption Techniques 1
 In this case, the keyword is monarchy.
Classical Encryption Techniques 1
 4 Rules:
1) If both letters are the same (or only one letter is left),
add an "X" after the first letter.
2) If the letters appear on the same row of your table,
replace them with the letters to their immediate right
respectively
Classical Encryption Techniques 1
 4 Rules:
3) If the letters appear on the same column of your table,
replace them with the letters immediately below
respectively
4) If the letters are not on the same row or column, replace
them with the letters on the same row respectively but at
the other pair of corners of the rectangle defined by the
original pair.
Classical Encryption Techniques 1
 P=Hide the gold in the tree stump (note the null "X" used to separate
the repeated "E"s)
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
 K= playfair example
Classical Encryption Techniques 1
 How to build 5x5 Matrix (assuming that I and J are
interchangeable), the table becomes (omitted letters in red):
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
C= BM OD ZB XD NA BE KU DM UI XM MO UV IF
the message "Hide the gold in the tree stump" becomes
"BMODZ BXDNA BEKUD MUIXM MOUVI F"
Classical Encryption Techniques 1
Using Playfair Cipher how to decrepit the
following cipher text:
C= “BMODZ BXDNA BEKUD MUIXM MOUVI F”
K= playfair example
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
 The Hill Cipher was invented by Lester S. Hill in 1929
 The Hill Cipher based on linear algebra
 Encryption
 2 x 2 Matrix Encryption
 3 x 3 Matrix Encryption
Classical Encryption Techniques 1
 square matrix 𝑀 by the equation 𝑀𝑀−1
= 𝑀−1
𝑀= 𝐼, where 𝐼 is the
identity matrix.
 C = P*K mod 26
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 Example of Key 2 x 2
 𝐾 =
𝐻 𝐼
𝐿 𝐿
=
7 8
11 11
 plaintext message "short example“
 𝑃= short example
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
 𝐶 = 𝐾 ∗ 𝑃 𝑚𝑜𝑑 26

𝑘0 𝑘1
𝑘2 𝑘3
∗
𝑝0
𝑝1
=
𝑘0 ∗ 𝑝0 + 𝑘1 ∗ 𝑝1
𝑘2 ∗ 𝑝0 + 𝑘3 ∗ 𝑝1

7 8
11 11
∗
18
7
=
7 ∗ 18 + 8 ∗ 7
11 ∗ 18 + 11 ∗ 7
=
182
275
 𝐶 =
182
275
𝑚𝑜𝑑 26 =
0
15
=
𝑎
𝑝
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
 This gives us a final ciphertext of "APADJ TFTWLFJ"
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
 This gives us a final ciphertext of "APADJ TFTWLFJ“
 𝐾 =
𝐻 𝐼
𝐿 𝐿
=
7 8
11 11
 We want to find 𝐾−1
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 1 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡
𝐷 𝐾 = 7 ∗ 11 − 8 ∗ 11 = −11 𝑚𝑜𝑑 26 = 15
𝐷𝐷−1
= 1 𝑚𝑜𝑑 26 = 15 ∗ 𝐷−1
15 ∗ 𝐷−1
𝑚𝑜𝑑 26 = 1
Try and Test 1 𝑚𝑜𝑑 26 = 105
105 mod 26 =1
𝐷−1
= 7
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 2 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥 𝑜𝑓 𝐾𝑒𝑦
𝑎𝑑𝑗
𝑎 𝑏
𝑐 𝑑
=
𝑑 −𝑏
−𝑐 𝑎
𝑎𝑑𝑗
7 8
11 11
=
11 −8
−11 7
mod 26 =
11 18
15 7
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 3 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑦 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡
𝑏𝑦 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥
 7 ∗
11 18
15 7
=
77 126
105 49
𝑚𝑜𝑑 26 =
25 22
1 23
= 𝐾−1
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
Using Hill Cipher how to implement 3x3 matrix
encryption ? The key for a hill cipher is a matrix
e.g. 𝒌 =
2 4 5
9 2 1
3 17 7
and message= ATTACK AT DAWN
Classical Encryption Techniques 1
 Use MS Word
 Send me mail to mloey@live.com with email subject “
Classical Encryption Techniques 1 “
 Put your name on Arabic with department and section on word and
email body
 Finally, press Send
 Deadline Next Lecture
Classical Encryption Techniques 1
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
Classical Encryption Techniques 1
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
DES
DESDES
DES
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 

Destacado

Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardMohamed Loey
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialMohamed Loey
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
 
Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Dr Mariann Hardey
 
Tx 3 hill shuman_oliver
Tx 3 hill shuman_oliverTx 3 hill shuman_oliver
Tx 3 hill shuman_oliverOPUNITE
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Sina Manavi
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherAashirwad Kashyap
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersRobert Talbert
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classflessNoctorous Jamal
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspacezapp0
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaClientSide
 

Destacado (20)

Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
 
Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12
 
Tx 3 hill shuman_oliver
Tx 3 hill shuman_oliverTx 3 hill shuman_oliver
Tx 3 hill shuman_oliver
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Crypto tools
Crypto toolsCrypto tools
Crypto tools
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Excel Lecture
Excel LectureExcel Lecture
Excel Lecture
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
 
Decoding QR codes
Decoding QR codesDecoding QR codes
Decoding QR codes
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
 

Similar a Computer Security Lecture 2: Classical Encryption Techniques 1

Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniquesbabak danyal
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdfDevangShukla10
 
IS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfIS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfRameezRaja32147
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptxChethanKrishna14
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Anas Rock
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquessaqib1611
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentationMuneebZahid10
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.nagwaAboElenein
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Zara Nawaz
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques Dr. Kapil Gupta
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 

Similar a Computer Security Lecture 2: Classical Encryption Techniques 1 (20)

Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
IS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfIS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdf
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Unit 1
Unit 1Unit 1
Unit 1
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentation
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Symmetric
SymmetricSymmetric
Symmetric
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 

Más de Mohamed Loey

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsMohamed Loey
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsMohamed Loey
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksMohamed Loey
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksMohamed Loey
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksMohamed Loey
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkMohamed Loey
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionMohamed Loey
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesMohamed Loey
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Mohamed Loey
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsMohamed Loey
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsMohamed Loey
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsMohamed Loey
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIMohamed Loey
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IMohamed Loey
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIMohamed Loey
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IMohamed Loey
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsMohamed Loey
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningMohamed Loey
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work IIMohamed Loey
 

Más de Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
 

Último

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Último (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Computer Security Lecture 2: Classical Encryption Techniques 1

  • 1. Classical Encryption Techniques 1 Classical Encryption Techniques 1
  • 2. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 3. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 5. Classical Encryption Techniques 1  Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext.  Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time.
  • 6. Classical Encryption Techniques 1  Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the secret key.  Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the ciphertext and the secret key and produces the original plaintext.
  • 7. Classical Encryption Techniques 1  Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
  • 8. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 9. Classical Encryption Techniques 1 Cipherered text 3 IODQN HDVW DWWDFN DW GDZQ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The clear text message would be encoded using a key of 3. 1 FLANK EAST ATTACK AT DAWN Shift the top scroll over by three characters (key of 3), an A becomes D, B becomes E, and so on. 2 The clear text message would be encrypted as follows using a key of 3. Clear text
  • 10. Classical Encryption Techniques 1  Caesar Cipher  Monoalphabetic Ciphers  Playfair Cipher  Hill Cipher  Polyalphabetic Ciphers  Vigenère Cipher  Autokey Cipher  Vernam Cipher
  • 11. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 12. Classical Encryption Techniques 1 Caesar Cipher is one of the simplest and most widely known encryption techniques.
  • 16. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=d 2) P=3 3) C=P+K mod 26=3+3 mod 26=6 mod 26 =6 4) C=g
  • 17. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=x 2) P=23 3) C=P+K mod 26=23+3 mod 26=26 mod 26= 0 4) C=a
  • 18. Classical Encryption Techniques 1  P= dcodex  C= gfrgha  K=3
  • 19. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=g 2) C=6 3) P=C-K mod 26=6-3 mod 26=3 4) P=d
  • 20. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=a 2) C=0 3) P=C-K mod 26=0-3 mod 26=-3 mod 26 =23 4) P=x
  • 21. Classical Encryption Techniques 1  C= gfrgha  P= dcodex  K=3
  • 22. Classical Encryption Techniques 1  Three important characteristics of this problem enabled us to use a bruteforce cryptanalysis: The encryption and decryption algorithms are known. There are only 25 keys to try. The language of the plaintext is known and easily recognizable.
  • 24. Classical Encryption Techniques 1 How to implement Caesar Cipher technique on Arabic letters?
  • 25. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 26. Classical Encryption Techniques 1 A monoalphabetic cipher uses fixed substitution over the entire message Random Key
  • 27. Classical Encryption Techniques 1  Example: Plaintext alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY  P= ITEMS  Encoding  C= FQAIP  Decoding  P= ITEMS
  • 28. Classical Encryption Techniques 1  Relative Frequency of Letters in English Text
  • 30. Classical Encryption Techniques 1  cipher letters P and Z are the equivalents of plain letters e and t
  • 31. Classical Encryption Techniques 1  Finally, The complete plaintext
  • 32. Classical Encryption Techniques 1 How to implement Monoalphabetic Cipher technique on Arabic letters?
  • 33. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 34. Classical Encryption Techniques 1  The Playfair system was invented by Charles Wheatstone, who first described it in 1854.  Used by many countries during wartime  The Playfair algorithm is based on the use of a 5 x 5 matrix of letters constructed using a keyword.
  • 35. Classical Encryption Techniques 1  In this case, the keyword is monarchy.
  • 36. Classical Encryption Techniques 1  4 Rules: 1) If both letters are the same (or only one letter is left), add an "X" after the first letter. 2) If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively
  • 37. Classical Encryption Techniques 1  4 Rules: 3) If the letters appear on the same column of your table, replace them with the letters immediately below respectively 4) If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair.
  • 38. Classical Encryption Techniques 1  P=Hide the gold in the tree stump (note the null "X" used to separate the repeated "E"s)  P= HI DE TH EG OL DI NT HE TR EX ES TU MP  K= playfair example
  • 39. Classical Encryption Techniques 1  How to build 5x5 Matrix (assuming that I and J are interchangeable), the table becomes (omitted letters in red):
  • 40. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 41. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 42. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 43. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 44. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 45. Classical Encryption Techniques 1 C= BM OD ZB XD NA BE KU DM UI XM MO UV IF the message "Hide the gold in the tree stump" becomes "BMODZ BXDNA BEKUD MUIXM MOUVI F"
  • 46. Classical Encryption Techniques 1 Using Playfair Cipher how to decrepit the following cipher text: C= “BMODZ BXDNA BEKUD MUIXM MOUVI F” K= playfair example
  • 47. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 48. Classical Encryption Techniques 1  The Hill Cipher was invented by Lester S. Hill in 1929  The Hill Cipher based on linear algebra  Encryption  2 x 2 Matrix Encryption  3 x 3 Matrix Encryption
  • 49. Classical Encryption Techniques 1  square matrix 𝑀 by the equation 𝑀𝑀−1 = 𝑀−1 𝑀= 𝐼, where 𝐼 is the identity matrix.  C = P*K mod 26
  • 51. Classical Encryption Techniques 1  Example of Key 2 x 2  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  plaintext message "short example“  𝑃= short example  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 52. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4  𝐶 = 𝐾 ∗ 𝑃 𝑚𝑜𝑑 26  𝑘0 𝑘1 𝑘2 𝑘3 ∗ 𝑝0 𝑝1 = 𝑘0 ∗ 𝑝0 + 𝑘1 ∗ 𝑝1 𝑘2 ∗ 𝑝0 + 𝑘3 ∗ 𝑝1  7 8 11 11 ∗ 18 7 = 7 ∗ 18 + 8 ∗ 7 11 ∗ 18 + 11 ∗ 7 = 182 275  𝐶 = 182 275 𝑚𝑜𝑑 26 = 0 15 = 𝑎 𝑝
  • 53. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 54. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 55. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 56. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 57. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 58. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ"
  • 59. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ“  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  We want to find 𝐾−1
  • 60. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 1 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝐷 𝐾 = 7 ∗ 11 − 8 ∗ 11 = −11 𝑚𝑜𝑑 26 = 15 𝐷𝐷−1 = 1 𝑚𝑜𝑑 26 = 15 ∗ 𝐷−1 15 ∗ 𝐷−1 𝑚𝑜𝑑 26 = 1 Try and Test 1 𝑚𝑜𝑑 26 = 105 105 mod 26 =1 𝐷−1 = 7
  • 61. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 2 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥 𝑜𝑓 𝐾𝑒𝑦 𝑎𝑑𝑗 𝑎 𝑏 𝑐 𝑑 = 𝑑 −𝑏 −𝑐 𝑎 𝑎𝑑𝑗 7 8 11 11 = 11 −8 −11 7 mod 26 = 11 18 15 7
  • 62. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 3 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑦 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝑏𝑦 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥  7 ∗ 11 18 15 7 = 77 126 105 49 𝑚𝑜𝑑 26 = 25 22 1 23 = 𝐾−1
  • 63. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 64. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 65. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 66. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 67. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 68. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 69. Classical Encryption Techniques 1 Using Hill Cipher how to implement 3x3 matrix encryption ? The key for a hill cipher is a matrix e.g. 𝒌 = 2 4 5 9 2 1 3 17 7 and message= ATTACK AT DAWN
  • 70. Classical Encryption Techniques 1  Use MS Word  Send me mail to mloey@live.com with email subject “ Classical Encryption Techniques 1 “  Put your name on Arabic with department and section on word and email body  Finally, press Send  Deadline Next Lecture
  • 71. Classical Encryption Techniques 1 facebook.com/mloey mohamedloey@gmail.com twitter.com/mloey linkedin.com/in/mloey mloey@fci.bu.edu.eg mloey.github.io
  • 72. Classical Encryption Techniques 1 www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME