0% found this document useful (0 votes)
51 views13 pages

Lecture 1 (Vigenere Cipher)

The document discusses the syllabus for an information security course which includes topics like network security, cryptography, encryption, symmetric and asymmetric key cryptography, and provides an example of the Vigenere cipher technique.

Uploaded by

Prateek Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views13 pages

Lecture 1 (Vigenere Cipher)

The document discusses the syllabus for an information security course which includes topics like network security, cryptography, encryption, symmetric and asymmetric key cryptography, and provides an example of the Vigenere cipher technique.

Uploaded by

Prateek Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

INFORMATION

SECURITY
(CSD-410)
(Lecture 1)
IMPORTANT BOOKS
1. Cryptography and Network Security: Principles and Practice
by William Stallings, Seventh Edition.

2. Cryptography & Network Security by Behrouz A. Forouzan,


McGraw Hill Education.
SYLLABUS COVERED
1. Network security
2. CIA triad
3. OSI security architecture
4. Types of attacks
5. Security services (X.800)
6. Cryptography, cryptology and cryptanalysis
7. Encryption and decryption
8. Types of cryptography
1. Symmetric key cryptography
2. Asymmetric key cryptography
SYMMETRIC KEY
CRYPTOGRAPHY
ASYMMETRIC KEY
CRYPTOGRAPHY
SYLLABUS COVERED
VIGENERE CIPHER
▪ Designed by Blaise de Vigenere (in 16th century a French
mathematician).

▪ A polyalphabetic cipher.

▪ The encryption is done using (26×26) matrix/table

▪ Two methods for converting plain text into cipher text:


1. Vigenere table

2. When vigenere table is not given


EXAMPLE: METHOD 1
▪ Plain text: GIVE MONEY

▪ Key: LOCK

Plain
G I V E M O N E Y
Text:

KEY: L O C K L O C K
VIGENERE TABLE
EXAMPLE

Cipher
R W X O X C P O J
Text:
METHOD 2: WHEN VIGENERE
TABLE IS NOT GIVEN
▪ Encryption: Ci= Ei= (Pi+Ki) mod 26

▪ Decryption: Di=(Ei+Ki) mod 26


EXAMPLE: METHOD 2
▪ Plain text: SHE IS LISTENING

▪ Key: PASCAL

▪ The initial key stream is (15, 0, 18, 2, 0, 11).


Plain
S H E I S L I S T E N I N G
Text:

P’s
18 07 04 08 18 11 08 18 19 04 13 08 13 06
Value

Key 15 00 18 02 00 11 15 00 18 02 00 11 15 00

C’s
07 07 22 10 18 22 23 18 11 6 13 19 02 06
value

Ciphe
H H W K S W X S L G N T C G
r text

You might also like