Cryptography
Cryptography
Seminar On
“CRYPTOGRAPHY”
Seminar Guide:
Murugendrappa. N
Lecturer,
Department Of Electronics
Jnana Sahyadri
Shankaraghatta.
Seminar By:
Deepti.S
M.Sc. І І semester
Department Of Electronics
Jnana Sahyadri
Shankaraghatta.
1
Contents :
Introduction to Cryptography.
Why Cryptography.
Encryption and Decryption.
The Encryption model.
Cryptography in Mathematical Representation.
Algorithm Secrecy.
Some methods of Encryption.
1.Substitution cipher.
2.Transposition cipher.
3. One – Time Pad.
Fundamental Cryptographic principle.
Uses of Encryption.
Reference.
2
Introduction to cryptography
Cryptography – comes from Greek word crypto-secret graphy
-writing.
Definition :
Cryptography deals with all aspects of secure messaging,
authentication, digital signatures, electronic money, and other
applications
6
Definitions:
Plain text : In cryptographic terminology, the message is called
plaintext or cleartext.
Active Intruder : The intruder can also record messages and play
them back later, inject his own messages, or modify messages
before they get to the receiver.
Decryption P = EK-1(C).
the mapping is
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
12
A Simple Substitution Cipher
Plaintext:
abcdefghijklmnopqrstuvwxyz
QIAYMWFUBKPDGJZSOCVLXNETRH
Ciphertext:
13
Polyalphabetic
Substitution Example
Suppose that a polyalphabetic cipher of period 3 is being used, with the
three monoalphabetic ciphers M1, M2, M3 as defined below. To
encrypt a message, the first 3 letters of the plaintext are enciphered
according to ciphers M1, M2, M3 respectively, with the process being
repeated for each subsequent block of 3 plaintext letters.
a b c d e f g h i j k l m n o p q r s t u v w x y z
M1: K D N H P A W X C Z I M Q J B Y E T U G V R F O S L
M2: P A G U K H J B Y D S O E M Q N W F Z I T C V L X R
M3: J M F Z R N L D O W G I A K E S U C Q V H Y X T P B
Plaintext
now is the time for every good man
Ciphertext
14
Transposition Ciphers
Transposition or permutation ciphers hide the message
contents by rearranging the order of the letters.
15
Transposition Cipher Example
(1)
M E G A B U C K Key
p l e a s e t r
Plaintext
a n s f e r o n
pleasetransferonemilliondollarstomyswis
e m i l l i o n sbankaccountsixtwotwo
d o l l a r s t
o m y s w i s s Ciphertext
b a n k a c c o AFLLSKSOSELAWAIATOOSSCTCLNM
u n t s i x t w OMANTESILYNTWRNNTSOWDPAEDO
BUOERIRICXB
o t w o a b c d
16
Transposition Cipher
Example(2)
Key S H O E S
Weights to be used for double transposition 1 4 5 3 2
p a y m e
Plaintext
b y s u n
paymebysundayorsufferthecons
d a y o r
equences
s u f f e
Ciphertext r t h e c
o n s e q
PBDSROUSENRECQEZMUOF
EECZAYAUTNEZYSYFHSNZ u e n c e
s z z z z 17
One Time Pad - OTP
In this method we have to choose a random bit string as the
key. Then convert the plain text into a bit string.
For example using its ASCII representation finally, compute
the XOR (exclusive OR) of these two strings bit by bit.
with a one time pad there are many bits in the key as in the
plaintext.
Freshness :
21
References
Computer Networks…
Tanenbaum third edition.
Internet…
22
23