Cryptography Using Matrices-3
Cryptography Using Matrices-3
Using Matrices
1. The message is written out in rows of a fixed length, and then read out again
column by column, and the columns are chosen in some scrambled order.
2.Width of the rows and the permutation of the columns are usually defined by a
keyword.
3.For example, the word HACK is of length 4 (so the rows are of length 4), and the
permutation is defined by the alphabetical order of the letters in the keyword. In
this case, the order would be “3 1 2 4”.
4.Any spare spaces are filled with nulls or left blank or placed by a character
(Example: _).
5.Finally, the message is read off in columns, in the order specified by the
keyword.
ENCRYPTION:
*Reading the matrix lexicologically according to the key and column wise
Encrypted Text- I_CLA_LB_WE_I_BK
DECRYPTION:
1. To decipher it, the recipient has to work out the column lengths by dividing the message length by the key length.
2. Then, write the message out in columns again, then re-order the columns by reforming the key word.
Code For Columnar Transposition Cipher
Caesar Cipher
A message encoded with the Caesar cipher
has a shift in its frequency analysis diagram
(equal to the selected shift) and a
coincidence index similar to the one of the
plain text.
Any reference to Caesar, emperor of Rome,
or more generally to antiquity and the
Roman Empire are clues.
Caesar Cipher: How it works..
It is a type of substitution cipher in
which each letter in the plaintext is
'shifted' a certain number of places
down the alphabet. For example,
with a shift of 1, A would be
replaced by B, B would become C,
and so on. The method is named
after Julius Caesar, who apparently
used it to communicate with his
generals
Code For Caesar Cipher
Thank You