SlideShare una empresa de Scribd logo
1 de 42
Descargar para leer sin conexión
Classical Encryption Techniques 2
Classical Encryption Techniques 2
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
 A polyalphabetic cipher is any cipher based on substitution, using
multiple substitution alphabets.
 polyalphabetic cipher techniques have the following features in common:
A set of related monoalphabetic substitution rules is used.
A key determines which particular rule is chosen for a given
transformation.
Classical Encryption Techniques 2
 Assume
 Then We set these Rules:
Classical Encryption Techniques 2
 Then We set Key as Rules:
1) Shift the first letter three position to the right
2) Shift the second letter five position to the right
3) Shift the third letter seven position to the right
 Given Plaintext = security
Classical Encryption Techniques 2
 Given Plaintext = security
1) Divide Plaintext to three words
2) P= sec uri ty
3) C= VJJ XWP WD
Classical Encryption Techniques 2
 Then We set Key as Rules: (reverse)
1) Shift the first letter three position to the left
2) Shift the second letter five position to the left
3) Shift the third letter seven position to the left
 Given Ciphertext = VJJXWPWD
Classical Encryption Techniques 2
 Given C= VJJXWPWD
1) Divide Plaintext to three words as your rules number
2) C= VJJ XWP WD
3) C= SEC URI TY
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
The Vigenère cipher, was invented by a Frenchman, Blaise
de Vigenère in the 16th century.
Vigenère cipher is a simple polyalphabetic cipher
Classical Encryption Techniques 2
 𝐶𝑖 = 𝑃𝑖 + 𝐾 𝑚𝑜𝑑 26
 𝑃𝑖 = 𝐶𝑖 − 𝐾 𝑚𝑜𝑑 26
Repeating key
Classical Encryption Techniques 2
 𝐾=deceptive
 𝑃=we are discovered save yourself
Classical Encryption Techniques 2
Classical Encryption Techniques 2
 Result
Classical Encryption Techniques 2
The strength of Vigenère Cipher is that there are
multiple ciphertext letters for each plaintext letter
Classical Encryption Techniques 2
 decryption simply works in reverse
 𝑃𝑖 = 𝐶𝑖 − 𝐾 𝑚𝑜𝑑 26
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
An autokey cipher (also known as the autoclave
cipher) is a cipher which incorporates the
message (the plaintext) into the key.
 𝑃 = {𝑝1, 𝑝2, 𝑝3, … , 𝑝 𝑛}
 𝐾 = {𝑘1, 𝑝1, 𝑝2, 𝑝3, … , 𝑝 𝑛−1}
 𝐶 = {𝑐1, 𝑐2, 𝑐3, … , 𝑐 𝑛}
Classical Encryption Techniques 2
 𝐶𝑖 = 𝑃𝑖 + 𝐾𝑖 𝑚𝑜𝑑 26
 𝑃𝑖 = 𝐶𝑖 − 𝐾𝑖 𝑚𝑜𝑑 26
Classical Encryption Techniques 2
 𝑲=m
 𝑷=attack is today
Plaintext a t t a c k i s t o d a y
P Value 0 19 19 0 2 10 8 18 19 14 3 0 24
Key 12 0 19 19 0 2 10 8 18 19 14 3 0
C Value 12 19 12 19 2 12 18 0 11 7 17 3 24
Ciphertext m t m t c m s a l h r d y
Classical Encryption Techniques 2
 𝑲=m
 𝑪=mtmtcmsalhrdy
Ciphertext m t m t c m s a l h r d y
C Value 12 19 12 19 2 12 18 0 11 7 17 3 24
Key 12 0 19 19 0 2 10 8 18 19 14 3 0
P Value 0 19 19 0 2 10 8 18 19 14 3 0 24
Plaintext a t t a c k i s t o d a y
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
 Vernam Cipher was introduced by an AT&T engineer named
Gilbert Vernam in 1918.
 The ultimate defense against such a cryptanalysis is to choose a
keyword that is as long as the plaintext and has no statistical
relationship to it.
Classical Encryption Techniques 2
Classical Encryption Techniques 2
 Encryption
𝐶 = 𝑃 𝑋𝑂𝑅 𝐾
 Decryption
𝑃 = 𝐶 𝑋𝑂𝑅 𝐾
Classical Encryption Techniques 2
 P=11100011101010101101
 K=1001010101
 P=11100011101010101101
 K=10010101011001010101
 C=01110110110011111000
Classical Encryption Techniques 2
 C=01110110110011111000
 K=10010101011001010101
 P=11100011101010101101
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
F...K...T...T...A...W.
.L.N.E.S.A.T.A.K.T.A.N
..A...A...T...C...D...
Ciphered Text
3 FKTTAW
LNESATAKTAN
AATCD
The clear text message would be
encoded using a key of 3.
1
FLANK EAST
ATTACK AT DAWN
Use a rail fence cipher and a
key of 3.
2
The clear text message would
appear as follows.
Clear Text
Classical Encryption Techniques 2
Transposition Techniques performing some sort of
permutation on the plaintext letters (reorder the position of
letters in plaintext).
 Types:
 Rail Fence Cipher
 Row Transposition Cipher
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
 P= meet me after the toga party
 K=2
1) 𝑝 =
𝑚 𝑒 𝑚
𝑒 𝑡 𝑒
𝑎 𝑡 𝑟
𝑓 𝑒 𝑡
ℎ 𝑡 𝑔
𝑒 𝑜 𝑎
𝑝 𝑟 𝑦
𝑎 𝑡
2) C=mematrhtgpryetefeteoaat
Classical Encryption Techniques 2
 C=mematrhtgpryetefeteoaat
 K=2
1) 𝐶 =
𝑚 𝑒 𝑚
𝑒 𝑡 𝑒
𝑎 𝑡 𝑟
𝑓 𝑒 𝑡
ℎ 𝑡 𝑔
𝑒 𝑜 𝑎
𝑝 𝑟 𝑦
𝑎 𝑡
2) P= meetmeafterthetogaparty
Classical Encryption Techniques 2
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Classical Encryption Techniques 2
 P= attack postponed until two am
 K= 4312567
 𝐶 =
4 3 1 2 5 6 7
𝑎 𝑡 𝑡 𝑎 𝑐 𝑘 𝑝
𝑜
𝑑
𝑤
𝑠
𝑢
𝑜
𝑡
𝑛
𝑎
𝑝
𝑡
𝑚
𝑜
𝑖
𝑥
𝑛
𝑙
𝑥
𝑒
𝑡
𝑥
= 𝑡𝑡𝑛𝑎𝑎𝑝𝑡𝑚𝑡𝑠𝑢𝑜𝑎𝑜𝑑𝑤𝑐𝑜𝑖𝑥𝑘𝑛𝑙𝑥𝑝𝑒𝑡𝑥
Classical Encryption Techniques 2
 C= 𝑡𝑡𝑛𝑎𝑎𝑝𝑡𝑚𝑡𝑠𝑢𝑜𝑎𝑜𝑑𝑤𝑐𝑜𝑖𝑥𝑘𝑛𝑙𝑥𝑝𝑒𝑡𝑥 = Len(C)=28
 K= 4312567
 Each Column have 28/7= 4 letter
 𝑃 =
4 3 1 2 5 6 7
𝑎 𝑡 𝑡 𝑎 𝑐 𝑘 𝑝
𝑜
𝑑
𝑤
𝑠
𝑢
𝑜
𝑡
𝑛
𝑎
𝑝
𝑡
𝑚
𝑜
𝑖
𝑥
𝑛
𝑙
𝑥
𝑒
𝑡
𝑥
= 𝑎𝑡𝑡𝑎𝑐𝑘𝑝𝑜𝑠𝑡𝑝𝑜𝑛𝑒𝑑𝑢𝑛𝑡𝑖𝑙𝑡𝑤𝑜𝑎𝑚𝑥𝑥𝑥
Classical Encryption Techniques 2
 As shown in Figure below, use Multiplicative Cipher to encrypt
“enemy attack tonight” with key = 4.
𝑪 = 𝑷𝒙𝑲 𝒎𝒐𝒅 𝟐𝟔
𝑲
𝑷𝒍𝒂𝒊𝒏𝒕𝒆𝒙𝒕
Sender
Encryption
𝑪
Classical Encryption Techniques 2
 As shown in Figure below, use Affine Cipher to encrypt “enemy
attack tonight” with key pair (4,3).
𝑻 = 𝑷𝒙𝑲 𝟏 𝒎𝒐𝒅 𝟐𝟔
𝑲 𝟏
𝑷𝒍𝒂𝒊𝒏𝒕𝒆𝒙𝒕
𝑪
Sender
Encryption
𝑪 = 𝑻 + 𝑲 𝟐 𝒎𝒐𝒅 𝟐𝟔
𝑲 𝟐
Classical Encryption Techniques 2
 Use MS Word
 Send me mail to mloey@live.com with email subject “
Classical Encryption Techniques 2 “
 Put your name on Arabic with department and section on word and
email body
 Finally, press Send
 Deadline Next Lecture
Classical Encryption Techniques 2
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
Classical Encryption Techniques 2
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

Más contenido relacionado

La actualidad más candente

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

La actualidad más candente (20)

Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
A Brief History of Cryptography
A Brief History of CryptographyA Brief History of Cryptography
A Brief History of Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Authentication
AuthenticationAuthentication
Authentication
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Destacado

Destacado (18)

Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
 
Tx 3 hill shuman_oliver
Tx 3 hill shuman_oliverTx 3 hill shuman_oliver
Tx 3 hill shuman_oliver
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Hashing
HashingHashing
Hashing
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
 
Lru Algorithm
Lru AlgorithmLru Algorithm
Lru Algorithm
 
Thought For Food
Thought For FoodThought For Food
Thought For Food
 
Classical cipher
Classical cipherClassical cipher
Classical cipher
 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
 
Cryptography
Cryptography Cryptography
Cryptography
 
Electrocardiography
ElectrocardiographyElectrocardiography
Electrocardiography
 
كيف تحمي خصوصيتك علي مواقع التواصل الاجتماعي فيسبوك
كيف تحمي خصوصيتك علي مواقع التواصل الاجتماعي فيسبوككيف تحمي خصوصيتك علي مواقع التواصل الاجتماعي فيسبوك
كيف تحمي خصوصيتك علي مواقع التواصل الاجتماعي فيسبوك
 
Cryptography
Cryptography Cryptography
Cryptography
 

Similar a Computer Security Lecture 3: Classical Encryption Techniques 2

Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
Priyanka Karancy
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
Sarthak Patel
 

Similar a Computer Security Lecture 3: Classical Encryption Techniques 2 (20)

Unit 1
Unit 1Unit 1
Unit 1
 
Cryptography Crash Course
Cryptography Crash CourseCryptography Crash Course
Cryptography Crash Course
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Ch02 classic nemo
Ch02 classic nemoCh02 classic nemo
Ch02 classic nemo
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 

Más de Mohamed Loey

Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
Mohamed Loey
 

Más de Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Último (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Computer Security Lecture 3: Classical Encryption Techniques 2

  • 1. Classical Encryption Techniques 2 Classical Encryption Techniques 2
  • 2. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 3. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 4. Classical Encryption Techniques 2  A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets.  polyalphabetic cipher techniques have the following features in common: A set of related monoalphabetic substitution rules is used. A key determines which particular rule is chosen for a given transformation.
  • 5. Classical Encryption Techniques 2  Assume  Then We set these Rules:
  • 6. Classical Encryption Techniques 2  Then We set Key as Rules: 1) Shift the first letter three position to the right 2) Shift the second letter five position to the right 3) Shift the third letter seven position to the right  Given Plaintext = security
  • 7. Classical Encryption Techniques 2  Given Plaintext = security 1) Divide Plaintext to three words 2) P= sec uri ty 3) C= VJJ XWP WD
  • 8. Classical Encryption Techniques 2  Then We set Key as Rules: (reverse) 1) Shift the first letter three position to the left 2) Shift the second letter five position to the left 3) Shift the third letter seven position to the left  Given Ciphertext = VJJXWPWD
  • 9. Classical Encryption Techniques 2  Given C= VJJXWPWD 1) Divide Plaintext to three words as your rules number 2) C= VJJ XWP WD 3) C= SEC URI TY
  • 10. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 11. Classical Encryption Techniques 2 The Vigenère cipher, was invented by a Frenchman, Blaise de Vigenère in the 16th century. Vigenère cipher is a simple polyalphabetic cipher
  • 12. Classical Encryption Techniques 2  𝐶𝑖 = 𝑃𝑖 + 𝐾 𝑚𝑜𝑑 26  𝑃𝑖 = 𝐶𝑖 − 𝐾 𝑚𝑜𝑑 26 Repeating key
  • 13. Classical Encryption Techniques 2  𝐾=deceptive  𝑃=we are discovered save yourself
  • 16. Classical Encryption Techniques 2 The strength of Vigenère Cipher is that there are multiple ciphertext letters for each plaintext letter
  • 17. Classical Encryption Techniques 2  decryption simply works in reverse  𝑃𝑖 = 𝐶𝑖 − 𝐾 𝑚𝑜𝑑 26
  • 18. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 19. Classical Encryption Techniques 2 An autokey cipher (also known as the autoclave cipher) is a cipher which incorporates the message (the plaintext) into the key.  𝑃 = {𝑝1, 𝑝2, 𝑝3, … , 𝑝 𝑛}  𝐾 = {𝑘1, 𝑝1, 𝑝2, 𝑝3, … , 𝑝 𝑛−1}  𝐶 = {𝑐1, 𝑐2, 𝑐3, … , 𝑐 𝑛}
  • 20. Classical Encryption Techniques 2  𝐶𝑖 = 𝑃𝑖 + 𝐾𝑖 𝑚𝑜𝑑 26  𝑃𝑖 = 𝐶𝑖 − 𝐾𝑖 𝑚𝑜𝑑 26
  • 21. Classical Encryption Techniques 2  𝑲=m  𝑷=attack is today Plaintext a t t a c k i s t o d a y P Value 0 19 19 0 2 10 8 18 19 14 3 0 24 Key 12 0 19 19 0 2 10 8 18 19 14 3 0 C Value 12 19 12 19 2 12 18 0 11 7 17 3 24 Ciphertext m t m t c m s a l h r d y
  • 22. Classical Encryption Techniques 2  𝑲=m  𝑪=mtmtcmsalhrdy Ciphertext m t m t c m s a l h r d y C Value 12 19 12 19 2 12 18 0 11 7 17 3 24 Key 12 0 19 19 0 2 10 8 18 19 14 3 0 P Value 0 19 19 0 2 10 8 18 19 14 3 0 24 Plaintext a t t a c k i s t o d a y
  • 23. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 24. Classical Encryption Techniques 2  Vernam Cipher was introduced by an AT&T engineer named Gilbert Vernam in 1918.  The ultimate defense against such a cryptanalysis is to choose a keyword that is as long as the plaintext and has no statistical relationship to it.
  • 26. Classical Encryption Techniques 2  Encryption 𝐶 = 𝑃 𝑋𝑂𝑅 𝐾  Decryption 𝑃 = 𝐶 𝑋𝑂𝑅 𝐾
  • 27. Classical Encryption Techniques 2  P=11100011101010101101  K=1001010101  P=11100011101010101101  K=10010101011001010101  C=01110110110011111000
  • 28. Classical Encryption Techniques 2  C=01110110110011111000  K=10010101011001010101  P=11100011101010101101
  • 29. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 30. Classical Encryption Techniques 2 F...K...T...T...A...W. .L.N.E.S.A.T.A.K.T.A.N ..A...A...T...C...D... Ciphered Text 3 FKTTAW LNESATAKTAN AATCD The clear text message would be encoded using a key of 3. 1 FLANK EAST ATTACK AT DAWN Use a rail fence cipher and a key of 3. 2 The clear text message would appear as follows. Clear Text
  • 31. Classical Encryption Techniques 2 Transposition Techniques performing some sort of permutation on the plaintext letters (reorder the position of letters in plaintext).  Types:  Rail Fence Cipher  Row Transposition Cipher
  • 32. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 33. Classical Encryption Techniques 2  P= meet me after the toga party  K=2 1) 𝑝 = 𝑚 𝑒 𝑚 𝑒 𝑡 𝑒 𝑎 𝑡 𝑟 𝑓 𝑒 𝑡 ℎ 𝑡 𝑔 𝑒 𝑜 𝑎 𝑝 𝑟 𝑦 𝑎 𝑡 2) C=mematrhtgpryetefeteoaat
  • 34. Classical Encryption Techniques 2  C=mematrhtgpryetefeteoaat  K=2 1) 𝐶 = 𝑚 𝑒 𝑚 𝑒 𝑡 𝑒 𝑎 𝑡 𝑟 𝑓 𝑒 𝑡 ℎ 𝑡 𝑔 𝑒 𝑜 𝑎 𝑝 𝑟 𝑦 𝑎 𝑡 2) P= meetmeafterthetogaparty
  • 35. Classical Encryption Techniques 2 Polyalphabetic Ciphers Vigenère Cipher Autokey Cipher Vernam Cipher Transposition Techniques Rail Fence Cipher Row Transposition Cipher
  • 36. Classical Encryption Techniques 2  P= attack postponed until two am  K= 4312567  𝐶 = 4 3 1 2 5 6 7 𝑎 𝑡 𝑡 𝑎 𝑐 𝑘 𝑝 𝑜 𝑑 𝑤 𝑠 𝑢 𝑜 𝑡 𝑛 𝑎 𝑝 𝑡 𝑚 𝑜 𝑖 𝑥 𝑛 𝑙 𝑥 𝑒 𝑡 𝑥 = 𝑡𝑡𝑛𝑎𝑎𝑝𝑡𝑚𝑡𝑠𝑢𝑜𝑎𝑜𝑑𝑤𝑐𝑜𝑖𝑥𝑘𝑛𝑙𝑥𝑝𝑒𝑡𝑥
  • 37. Classical Encryption Techniques 2  C= 𝑡𝑡𝑛𝑎𝑎𝑝𝑡𝑚𝑡𝑠𝑢𝑜𝑎𝑜𝑑𝑤𝑐𝑜𝑖𝑥𝑘𝑛𝑙𝑥𝑝𝑒𝑡𝑥 = Len(C)=28  K= 4312567  Each Column have 28/7= 4 letter  𝑃 = 4 3 1 2 5 6 7 𝑎 𝑡 𝑡 𝑎 𝑐 𝑘 𝑝 𝑜 𝑑 𝑤 𝑠 𝑢 𝑜 𝑡 𝑛 𝑎 𝑝 𝑡 𝑚 𝑜 𝑖 𝑥 𝑛 𝑙 𝑥 𝑒 𝑡 𝑥 = 𝑎𝑡𝑡𝑎𝑐𝑘𝑝𝑜𝑠𝑡𝑝𝑜𝑛𝑒𝑑𝑢𝑛𝑡𝑖𝑙𝑡𝑤𝑜𝑎𝑚𝑥𝑥𝑥
  • 38. Classical Encryption Techniques 2  As shown in Figure below, use Multiplicative Cipher to encrypt “enemy attack tonight” with key = 4. 𝑪 = 𝑷𝒙𝑲 𝒎𝒐𝒅 𝟐𝟔 𝑲 𝑷𝒍𝒂𝒊𝒏𝒕𝒆𝒙𝒕 Sender Encryption 𝑪
  • 39. Classical Encryption Techniques 2  As shown in Figure below, use Affine Cipher to encrypt “enemy attack tonight” with key pair (4,3). 𝑻 = 𝑷𝒙𝑲 𝟏 𝒎𝒐𝒅 𝟐𝟔 𝑲 𝟏 𝑷𝒍𝒂𝒊𝒏𝒕𝒆𝒙𝒕 𝑪 Sender Encryption 𝑪 = 𝑻 + 𝑲 𝟐 𝒎𝒐𝒅 𝟐𝟔 𝑲 𝟐
  • 40. Classical Encryption Techniques 2  Use MS Word  Send me mail to mloey@live.com with email subject “ Classical Encryption Techniques 2 “  Put your name on Arabic with department and section on word and email body  Finally, press Send  Deadline Next Lecture
  • 41. Classical Encryption Techniques 2 facebook.com/mloey mohamedloey@gmail.com twitter.com/mloey linkedin.com/in/mloey mloey@fci.bu.edu.eg mloey.github.io
  • 42. Classical Encryption Techniques 2 www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME