Vernam Cipher in Cryptography
Vernam Cipher in Cryptography
Vernam Cipher in Cryptography
KEY: R A N C H O B A B A
NO: 17 0 13 2 7 14 1 0 1 0
8-4
Example:
Now add the number of Plain-Text and Key and after doing the addition
and subtraction operation (if required), we will get the corresponding
Cipher-Text character number.
CT-NO: 34 0 25 20 29 14 18 20 16 10
In this case, there are two numbers which are greater than the 26 so we
have to subtract 26 from them and after applying the subtraction operation
the new Cipher text character numbers are as follow:
CT-NO: 8 0 25 20 3 14 18 20 16 10
New Cipher-Text is after getting the corresponding character from the
number.
CIPHER-TEXT: I A Z U D O S U Q K
For the Decryption apply the just reverse process of encryption. Network Security 8-5
6
One-Time Pad
Fix the vulnerability of the Vigenere cipher by using very long keys
CS555 8-6
7
One-Time Pad
Let Zm ={0,1,…,m-1} be
the alphabet.
CS555 8-8
9
Bit Operators
Bit AND
00=0 01=0 10=0 11=1
Bit OR
00=0 01=1 10=1 11=1
Can we use operators other than Bit XOR for binary version of One-Time Pad?
CS555 8-9
10
CS555 8-10
11
Spring 2012/Topic
CS555 3 8-11
12
The channel for distributing keys may have the property that keys
can be leaked, but such leakage will be detected
Such as in Quantum cryptography
8-12
Caesar Cipher in Cryptography
The Caesar Cipher technique is one of the earliest and simplest method of
encryption technique.
It’s simply a type of substitution cipher, i.e., each letter of a given text is
replaced by a letter some fixed number of positions down the alphabet.
For example with a shift of 1, A would be replaced by B, B would become
C, and so on.
The method is apparently named after Julius Caesar, who apparently used
it to communicate with his officials.
Thus to cipher a given text we need an integer value, known as shift which
indicates the number of position each letter of the text has been moved
down. Network Security 8-13
Example
The encryption can be represented using modular arithmetic by
first transforming the letters into numbers, according to the
scheme, A = 0, B = 1,…, Z = 25. Encryption of a letter by a
shift n can be described mathematically as.
Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI
Procedure: