Lec-2 Classical Encryption Techniques
Lec-2 Classical Encryption Techniques
BIT – 410
Classical Encryption Techniques
Caesar Cipher:
• The Caesar cipher involves shifting each letter of the alphabet in the
plaintext with the letter standing three places further down the alphabet
in the ciphertext. For example:
• Plaintext: meet me after the toga party
• Cipher text: PHHW PH DIWHU WKH WRJD SDUWB
• Key(K)=3
Substitution Cipher(Monoalphabetic Cipher):
• A substitution technique is one in which the letters of plain text are
replaced by other letters or by numbers or symbols.
• In this cipher, the letters of the plain text are mapped to cipher text
letters based on a single alphabetic key.
Substitution Cipher(Monoalphabetic Cipher):
• Example:
Message:
Key:
(red)-> (green)
ga -> in
tl -> st
mz -> ru
cl -> me
rq -> nt
tx -> sz
Playfair Cipher(Decryption):
Vigenere Cipher
• Polyalphabetic substitution cipher is, also called a Vigenere Cipher.
• A polyalphabetic cipher is any cipher based on substitution, using
multiple substitution alphabets. The encryption of the original text is
done using the Vigenère square or Vigenère table.
• All these techniques have the following features in common:
1. A set of related monoalphabetic substitution rules is used
2. A key determines which particular rule is chosen for a given
transformation
Vigenere Cipher
• The Vigenère cipher uses a 26×26 table with A to Z as the row heading
and column heading
• The first row of this table has the 26 English letters. Starting with the
second row, each row has the letters shifted to the left one position in a
cyclic way.
• For example, when B is shifted to the first position on the second row,
the letter A moves to the end.
Vigenere Cipher Table
Vigenere Cipher(Encryption):
• The first letter of the plaintext is paired with the first letter of the key. So
use row of first letter of the plaintext and column of first letter of the key
in the Vigenère square.
• Similarly, for the second letter of the plaintext, the second letter of the
key is used. The rest of the plaintext is enciphered in a similar fashion.
Vigenere Cipher(Decryption):
• Decryption is performed by going to the row in the table corresponding
to the key, finding the position of the ciphertext letter in this row, and
then using the column’s label as the plaintext.
Vigenere Cipher
• For example, suppose that the plaintext to be encrypted is:
Transposition Cipher
• Transposition Cipher is a cryptographic algorithm where the order of
alphabets in the plaintext is rearranged to form a cipher text. In this
process, the actual plain text alphabets are not included.
• The simplest such cipher is the rail fence technique, in which the
plaintext is written down as a sequence of diagonals and then read off
as a sequence of rows.
Transposition Cipher
• For example, to encipher the message “meet me after the toga party”
is written as: