0% found this document useful (0 votes)
24 views18 pages

Lecture 3

The document provides an overview of cryptographic communication, defining key terms such as cryptography, encryption, decryption, and cryptanalysis. It explains the process of using secret keys for encryption and decryption, and introduces the Caesar and Affine ciphers as examples of substitution ciphers. Additionally, it includes exercises for decrypting messages using these methods.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views18 pages

Lecture 3

The document provides an overview of cryptographic communication, defining key terms such as cryptography, encryption, decryption, and cryptanalysis. It explains the process of using secret keys for encryption and decryption, and introduces the Caesar and Affine ciphers as examples of substitution ciphers. Additionally, it includes exercises for decrypting messages using these methods.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

CRYPTOGRAPHIC COMMUNICATION

Terminology
• Cryptography: Schemes for encryption and
decryption
• Encryption: The process by which plaintext is
converted into cipher text.
• Decryption: Recovering plaintext from the cipher text
CRYPTOGRAPHIC COMMUNICATION
Secret key: Used to set some or all of the various
parameters used by the encryption algorithm. In a
classical (symmetric key) cryptography, the same secret
key is used for encryption and decryption
Cryptanalysis: The study of “breaking the code”.
Cryptanalysts!
Cryptology: Cryptography and cryptanalysis together
constitute the area of cryptology.
CRYPTOGRAPHY
Cryptography has five ingredients:
Plaintext
Encryption algorithm
Secret Key
Cipher text
Decryption algorithm
CRYPTOGRAPHY
The input message, called plaintext, is
encrypted with a secret (encryption) key.
The encrypted message is called cipher text,
which moves through an unsecure
communication channel, the Internet
FOR EXAMPLE
Cryptography is an example of old and very simple based
on members theory julin Caesar , is also called Caesar
ciphering .
The idea was simple shifting of letters
Replace every letters in the plain text message by the
letter these letters to the right to get the coded message
To decode the coded message one needs to shift each
letters 3 unit to ware left
Caesar ciphering

For Caesar ciphering, we have the following two equations

1. € (m)= (m+3)mode26 For encrypting original message

2. ∂(s) = (s-3)mod26 For decrypting coded message


For example

• The corresponding of Caesar cipher is shown below


Clear text A B C D …. Z
Cipher text D E F G …. A
For example

• Example: I LOVE MATH could be seen as ILOVEMATH ,


just for the sake of Simplification
• Using the Caesar ciphering to encode the message would
be read “L ORYH PDWK “
• And to decrypt this message we will use (-3) back warding.
Example (Encryptions)
• For example : [ Y ]→ corresponds to the Number 24
• There for using the above equations to encrypted the letter Y
• Let’s Use € (m)= (m+3)mode 26
= 24 +3 mode 26
= 27 mode 26
= 1→It produce letter B
Example (Decryptions)
• To decrypt the coded message also we will use
∂(s) = (s-3)mod 26
= ( 1- 3)mode 26
= -2 mode 26
= 26 -2
= 24 → produce Y
Exercise

Decrypt the given Message Below


A) KRZ DUH BRX VWXGHQWV
Affine Cipher
▪ Affine Cipher – is another type of substitution
cipher , just you pick two Variables “ a “ and ‘
b ‘ and set
 € (m)= (am+b)mod 26 , Gcd ( a , 26 )
∂(s) = x(s-b)mod 26 , ax = 1 mod 26
Affine Cipher
A B C D E F G H I J K L M N
0 1 2 3 4 5 6 7 8 9 10 11 12 13

O P Q R S T U V W X Y Z
14 15 16 17 18 19 20 21 22 23 24 25
Encryption
• Example: ‘ A ‘ corresponds to ‘ 0 ‘
Take the value of a = 3 , and b = 2

€ (m)= (am+b)mod 26
= (3(0)+2) mod 26
= 0 +2 mod 26
= 2 → produce ‘ C ‘
DECRYPT
•To decrypt the Message
∂(s) = x(s-b)mod 26
ax = 1 mod 1
3x = 1 mod 1
3x = 26 + 1
3x = 27
X=9
DECRYPT

• There fore
∂(s) = x(s-b)mod 26
9( 2 – 2) mod 26
9( 0 ) mod 26
0 → produce A
DECRYPT
S → Cross ponds to number ‘ 18  To decrypted the message
€ (m)= (am+b)mod 26
∂(s) = x(s-b) mod 26
= (3(18)+2 mod 26
= 9(4 -2 ) mod 26
= 54 + 2 mode 26
= 9( 2 ) mod 26
= 56 mod 26
= 4 → produce ‘ E ‘ = 18 →S
Exercise

Decrypt the given message using Affine


Ciphering and find the Original Message
A: FBCNS

You might also like