LECTURE NOTES ON Classical Cryptographic Techniques (: Substitution Ciphers System)
LECTURE NOTES ON Classical Cryptographic Techniques (: Substitution Ciphers System)
10/15/2012
Homophonic System
In the substitution system the relation between the text and key is one to one. In this type the relation is one to many (i.e each letter can enciphered in multi images) Example:Plain text letter A I L N O P T Cipher text homophonic letters 17,19,34,41,56,60,67,83 08,22,53,65,88,90 03,44,76 02,09,15,27,32,40,59 01,11,23,28,42,54,70 33,91 05,10,20,29,45,58,64,78,99
Example: Plain Text: PILOT Cipher Text: 91 88 76 70 99 Plain Text : ALL Cipher Text :19 76 03
10/15/2012
Notes of Lecture 4
10/15/2012
Notes of Lecture 4
There might be five different simple substitution ciphers used: 1. Vigenre cipher 2. Beaufort cipher 3. Beale cipher also called (book cipher) where the key string is an agreed text in a book. 4. Hill cipher 5. Permutation cipher
10/15/2012
Notes of Lecture 4
We can draw only a partial table containing the key letters as follows
Cipher : The cipher text letters can be found by taking the letters apposing the key letters from the above table as follows comput er sun sunsu u i z h o g w l (the cipher text) Decipher: The key letters are spreaded over the cipher text. When two letters crossected on the same row ,then the letter above the crossection in the outside row is the plaintext letter.
10/15/2012
Notes of Lecture 4
As a Result, The Vigenere cipher In the Vigenere cipher the key consists of a string of k letters. These are written repeatedly below the message (from which all spaces have been removed). The message is then encrypted a letter at a time by adding the message and key letters together, working mod 26 with the letters taking values A = 0 to Z = 25. For example if the key is the three letter sequence key then the message 1
10/15/2012
Notes of Lecture 4
10/15/2012
Notes of Lecture 4
10/15/2012
Notes of Lecture 4
Of determinant 1.if we want to encrypt the word MALAYSIA we have to form the corresponding numerical string (12,0,11,0,24,18,8,0) and break it up into 4-pairs and then compute the image vectors under the transformation A.Hence we get A(12o)=(1210),A(110)=(117), A(2418)=(86), A(80)=(8 24) yielding the encryption MKLHIGIY
1 2 A= 3 7
10/15/2012
Notes of Lecture 4
3.
Procedure of Decryption:
1 = 1
2.
1. A-1=1/d .
1 1 2 12 12 12 = ( ) Mod 26 = 26= 1 3 7 0 36 10
1 1 = 1 =Plain Text
s q r p
10/15/2012
Notes of Lecture 4
1 =
d=ps-qr=(7-6)=1
7 2 3 1
1 7 2 1 = 1 = ( 3 1
12 ) mod 26 = 10
84 20 26 12 = = 36 + 10 26 0
Plain Text
10/15/2012
Notes of Lecture 4