0% found this document useful (0 votes)
46 views3 pages

3-Substitution Techniques

The document discusses classical encryption techniques, including substitution and transposition ciphers. It describes Caesar and Playfair ciphers as examples of substitution ciphers. The Caesar cipher shifts each letter by a set number of places in the alphabet. The Playfair cipher uses a 5x5 grid generated from a keyword to encrypt letters. Polyalphabetic ciphers use multiple substitution alphabets, while a monoalphabetic cipher substitutes each plaintext letter with a random ciphertext letter according to a key.

Uploaded by

177 Sumit Rathor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views3 pages

3-Substitution Techniques

The document discusses classical encryption techniques, including substitution and transposition ciphers. It describes Caesar and Playfair ciphers as examples of substitution ciphers. The Caesar cipher shifts each letter by a set number of places in the alphabet. The Playfair cipher uses a 5x5 grid generated from a keyword to encrypt letters. Polyalphabetic ciphers use multiple substitution alphabets, while a monoalphabetic cipher substitutes each plaintext letter with a random ciphertext letter according to a key.

Uploaded by

177 Sumit Rathor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Lecture-3

Topic -CLASSICAL ENCRYPTION TECHNIQUES


CS 703

Department of CSE/IT

CLASSICAL ENCRYPTION TECHNIQUES

There are two types of encryption techniques:


Substitution
Transposition.

SUBSTITUTION TECHNIQUES

 A substitution technique is one in which the letters of plaintext are


replaced by other letters or by numbers or symbols.

 If the plaintext is viewed as a sequence of bits, then substitution involves


replacing plaintext bit patterns with cipher text bit patterns.

Types of Substitution Techniques


• Caeser Cipher
• Monoalphabetic Cipher
• Polyalphabetic Cipher
• Playfair Cipher

1) Caesar cipher

The Caesar cipher involves replacing each letter of the alphabet with the letter
standing 3 places further down the alphabet.

e.g., plain text : pay more money


Cipher text: SDB PRUH PRQHB
2) Playfair cipher

The playfair algorithm is based on the use of 5x5 matrix of letters constructed
using a keyword.

Let the keyword be „monarchy‟.

The matrix is constructed by filling in the letters of the keyword from left to
right and from top to bottom, and then filling in the remainder of the matrix
with the remaining letters in alphabetical order.

Rules for Encryption:


• If both the letters are in the same column: Take the letter below each
one (going back to the top if at the bottom).
• If both the letters are in the same row: Take the letter to the right of
each one (going back to the leftmost if at the rightmost position).
• If neither of the above rules is true: Form a rectangle with the two
letters and take the letters on the horizontal opposite corner of the
rectangle.

3) Polyalphabetic ciphers
Encryption
Given a key letter X and a plaintext letter y, the cipher text is at the intersection
of the row labeled x and the column labeled y; in this case, the ciphertext is V.

To encrypt a message, a key is needed that is as long as the message. Usually,


the key is a repeating keyword.

Decryption

The key letter again identifies the row. The position of the cipher text letter in
that row determines the column, and the plaintext letter is at the top of that
column.

4) Monoalphabetic Cipher

• Rather than just shifting the alphabet


• Could shuffle (jumble) the letters arbitrarily
• Each plaintext letter maps to a different random cipher text letter
• hence key is 26 letters long

Plain: abcdefghijklmnopqrstuvwxyz
Key: DKVQFIBJWPESCXHTMYAUOLRGZN

Plaintext: ifwewishtoreplaceletters
Cipher text: WIRFRWAJUHYFTSDVFSFUUFYA

You might also like