LECTURE NOTES ON Classical Cryptographic Techniques: by Dr. Samaher Hussein Ali
LECTURE NOTES ON Classical Cryptographic Techniques: by Dr. Samaher Hussein Ali
TheUniversityofBabylon
LECTURENOTESONClassicalCryptographic Techniques
By Dr.SamaherHusseinAli
CollegeofInformationTechnology,UniversityofBabylon,Iraq [email protected]
ClassicalCryptographicTechniques
havetwobasiccomponentsofclassicalciphers : Substitution and Transposition
ClassicalCiphers
Transposition
Substitution
Fig1.ClassicalcipherMethods
InTranspositionCiphersthelettersarearrangedinadifferentorder,suchasthewordmessageinthefollowing:
Rotatetext
EGASSEM MESSAGE
EMSSGAE
SEMGASE
SSEMEGA
InSubstitutionCipherslettersarereplacedbyotherletters ,suchasthewordmessageinthefollowing:
PHVVDJH
KEY=3
TLZZHNL MESSAGE
KEY=7
KEY=12
YQEEMSQ
HZNNVBZ
KEY=21
Dr.SamaherHusseinAli
NotesofLecture2
TranspositionCiphers
Transposition orPermutation
ciphershidethemessagecontentsbyrearrangingtheorderofthelettersaccordingtothefollowingprocedures 1.MessageReversal Thisprocedurerequiresthattheplaintexttobewrittenbackwardstoproduceaciphertext. Plaintext: MEETMEMONDAYMORNING Ciphertext: GININGROMYADNOMEMTEEM Thisprocedureisstraightforwardandeasytodecipheramessage,simplyreverseit 2.GeometricPatterns The normal writing of a message follows a pattern from left to right, one line at a time . Message then form a geometrical pattern in the shape of a rectangular ,or any other geometrical pattern would disguise the message from a single horizontal line. It can be transposed into rectangular shapes of: 2.1.TheColumnsofEqualLength This method base on dived the message to number of line have the columns of equal length (i.e., each line have number of letters change dynamic base on key)by writing the plaintext vertically: Example:let,theplaintext:THESIMPLESTOPSSIBLETANSPOSITIONSXX andKey:41532 THESI MPLES TPOSS IBLET RANSP OSITI ONSXX STIEH EMSLP S TSOP EITLB SRPNA TOII S X OXSN
Ciphertext:STIEHEMSLPSTSOPEITLBSRPNATOIIS
Dr.SamaherHusseinAli
NotesofLecture2
TranspositionCiphers
2.2.TheRowsofEqualLength This method base on dived the message to number of line have the rows of equal length (i.e., each line have number of letters change dynamic base on key)by writing the plaintext horizontely: Example:let,theplaintext:THESIMPLESTOPSSIBLETANSPOSITIONSXX andKey:4716235 THESI I BLET MPLESONSXX TPOSS THESI IBLETEOSITI RANSPMPLES OSITITPOSS ONSXX RANSP Ciphertext: IBLETONSXX THESIEOSITIMPLESTPOSS RANSP This procedure produce a very limited degree of message security, however, geometrical patterns are useful an intermediate step for another encryption procedure ,route transposition 3.Routetransposition: Itisprovidingawayoffurtherscramblinggeometricallyshapedmessage. Example: Let,theplaintext:SENDHELPSOON theciphertext: SE ND HE LP SO ON The cipher text message is easily understood. The procedure provides very little security. We can increase the scrambling if we make use of the rectangle (2*6)as intermediate step. Then the cipher text become: theciphertext: SNHLSO EDEPON
Dr.SamaherHusseinAli
NotesofLecture2
TranspositionCiphers
4.Zig Zag Transposition In this method, The plaintext divided into fixed lengths. one length contains every even positioned letter of the message. The transposing process follow this type of pattern(zig zag) Example: Let,the plaintext:SENDHELPSOON,anddepth=2findciphertext: theciphertext:SNHLSO EDEPON *ReversedZig Zag Transposition The enciphering starts with the last letter of the plain text and continues back to the beginning of the message first the odd positioned letters are taken and then even positioned ones Example: Let,the plaintext:SENDHELPSOON theciphertext:NOPEDEOSLHNS 5.Routevariations Routetranspositionscangoinmanydifferentdirections: Horizontal Vertical Diagonal Clockwise Counterclockwise Ifweusethemessagein(3*4)geometricshapes,severaloftheseroutetranspositionscanbeillustrated:
Dr.SamaherHusseinAli
NotesofLecture2
TranspositionCiphers
5.1.HorizontalRoute SEND NOOS HELPPLEH SOON DNES 5.2.VerticalRoutes SDLO NSEN EHPO OPHE NESN OLDS 5.3.Digonal Routes SEDL N OSE NHPOO PHN ESONLDES
S O S
E O P
3
N N L
D H E
2
S O S
P O E
1
L N N
E H D
2
Dr.SamaherHusseinAli
NotesofLecture2
ClassicalCryptographicTechniques
Asaresultclassicalciphers : substitution and transposition
Transposition Methods
Substitution Methods
Message Reversal
Geometric Patterns
Route variations
Route transposition
Next Lecture
Horizontal
Vertical
Diagonal
Clockwise
Counter Clockwise
Fig2.ExpendingofClassicalcipherMethods
Dr.SamaherHusseinAli
NotesofLecture2