0% found this document useful (0 votes)
14 views

Lecture 4

Uploaded by

nadosh.alya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Lecture 4

Uploaded by

nadosh.alya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Data Security

LECTURE 4
2- Transposition cipher

• A transposition cipher is methods of encryption by which the


positions held by units of plaintext.
• the transposition method is an attempt to make it difficult i.e
diffusion.
Transposition cipher
1- Keyless Transposition Cipher
There are two methods for permutation of characters :
(a) Text is written into a table column by column and
transmitted row by row .

Example:
Plaintext: meet me at the park
Encryption: Decryption:
2 ???
1 memateak
e t e thpr
Ciphertext:
memateaketethpr
Transposition cipher
(b)Text is written into the table row by row and then transmitted
column by column.

Example:
Plaintext: meet me at the park

Encryption: Decryption:
1 ???
2 meet
meat
t hep
ark
Ciphertext:
mmtaeehreaekttp
Transposition cipher
2- Keyed transposition cipher
“Simple Columnar Transposition”

• The plaintext is arrange horizontally in table (left to


right).
• Number of column equal to key value.
• Then the ciphertext is read vertically top-down, left-right
.
Example:
• plaintext is “golden statue is in eleventh cave”
• Key = 5
Transposition cipher
2- Keyed transposition cipher
“Simple Columnar Transposition” (Route Cipher)

The ciphertext is “gnuneaoseenvltiltedasehetivc”


Transposition cipher
Decrypt:

• The receiver then writes the received ciphertext


vertically down and from left to right column.
• Then, reads horizontally left to right and from top to
bottom

The plaintext is “golden statue is in eleventh cave”


Transposition cipher (Columnar transposition)
As an example, let's encrypt the message "The tomato is a
plant in the nightshade family" using the keyword tomato. We
get the grid given below.
The plaintext is written in a grid beneath the keyword. The
numbers represent the alphabetical order of the keyword, and
so the order in which the columns will be read.

Starting with the column headed by "A", our ciphertext begins


"TINESAX" from this column. We now move to the column
headed by "M", and so on through the letters of the keyword in
alphabetical order to get the ciphertext "TINESAX / EOAHTFX /
HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX"
Transposition cipher (Columnar transposition)
Decryption:As an example, we shall decrypt the ciphertext "ARESA SXOST HEYLO IIAIE
XPENG DLLTA HTFAX TENHM WX" given the keyword potato. We start by writing out
the keyword and the order of the letters. There are 42 letters in the ciphertext, and
the keyword has six letters, so we need 42 ÷ 6 = 7 rows.

You might also like