0% found this document useful (0 votes)
11 views

Lecture-3

The lecture covers the basics of encryption and decryption techniques, focusing on the Caesar cipher as an example of an additive cipher. Students will work in groups to implement the algorithm in a programming language and understand the importance of encryption methods. The document also discusses traditional symmetric-key ciphers and substitution ciphers, emphasizing the relationship between plaintext and ciphertext.

Uploaded by

abdoalsenaweabdo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Lecture-3

The lecture covers the basics of encryption and decryption techniques, focusing on the Caesar cipher as an example of an additive cipher. Students will work in groups to implement the algorithm in a programming language and understand the importance of encryption methods. The document also discusses traditional symmetric-key ciphers and substitution ciphers, emphasizing the relationship between plaintext and ciphertext.

Uploaded by

abdoalsenaweabdo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

LECTURE 3

OUTLINES:

 Discussed the Basics of encryption and decryption techniques


 know there are many algorithms for encryption and decryption
 Students will be divided into groups of 3 girls
 Understand how additive (Caesar) encryption and decryption
works
 should implement the algorithm using a suitable
programming language.
OUTCOMES:

 know the importance of encryption and decryption techniques


 Learn how to encrypt a plaintext using (Caesar) algorithm.
TRADITIONAL SYMMETRIC‐KEY CIPHERS:
TRADITIONAL SYMMETRIC‐KEY CIPHERS:

 Plaintext is read by the user, he wants to encrypt it in some


manner. The hacker tries to decrypt the cipher text using
dif ferent keys.
 The hacker only sees the cipher text, he didn ’t know the key
and way in which the plain text is encrypted.
 Encryption and decryption algorithms depend on the key
itself.
SUBSTITUTION CIPHERS

 A substitution cipher replaces one symbol with another.


Substitution ciphers can be categorized as either
monoalphabetic ciphers or polyalphabetic ciphers .
 In monoalphabetic substitution, the relationship between a
symbol in the plaintext to a symbol in the cipher text is always
one-to-one
ALGORITHM 1:
ADDITIVE CIPHER (CAESAR CIPHER)

 mathematical nature.
ALGORITHM 1:
ADDITIVE CIPHER (CAESAR CIPHER)
 When the cipher is additive, the plaintext, cipher text, and key
are integers in Z26.
ALGORITHM 1:
ADDITIVE CIPHER (CAESAR CIPHER)
 Example: Use the additive cipher with key = 15 to encrypt the
message “hello”.

 Quiz: Use the additive cipher with key = 15 to decrypt the


message “W TAAD”.
ADDITIVE CIPHER (CAESAR CIPHER)
ALGORITHM

-Read Plaintext ( pt)


Encryption Method:
-Enter key
For( int i=0; i < pt.length; i++) {
0<Key≤ 25
Int emp=
-Encrypt (pt) convert_to_number(pt,i);
-Show the cipher text ( cp) Int c= (temp + k ) mod 26;
-Decrypt cp ct+= convert_to_letter(c);
-Show the original plain text }
ALGORITHM 1:
ADDITIVE CIPHER (CAESAR CIPHER)
 Your program after implementing the above algorithm should
be similar to the following program:
HOME WORK 1

Implement (Caesar) algorithm using a suitable programming


language.
Note: The expected time to finish submitting next lab

You might also like