0% found this document useful (0 votes)
79 views14 pages

Subs Titu It On Tech

The document discusses various substitution cipher techniques where the letters, numbers, or symbols of a plaintext are replaced by other letters, numbers, or symbols to encrypt the message. It provides examples of common substitution ciphers like Caesar cipher, monoalphabetic cipher, homophonic cipher, polygram cipher, polyalphabetic cipher like Vigenere cipher, and one-time pad cipher. It explains the encryption algorithms and provides examples for each type of cipher.

Uploaded by

jaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views14 pages

Subs Titu It On Tech

The document discusses various substitution cipher techniques where the letters, numbers, or symbols of a plaintext are replaced by other letters, numbers, or symbols to encrypt the message. It provides examples of common substitution ciphers like Caesar cipher, monoalphabetic cipher, homophonic cipher, polygram cipher, polyalphabetic cipher like Vigenere cipher, and one-time pad cipher. It explains the encryption algorithms and provides examples for each type of cipher.

Uploaded by

jaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

A substitution technique is one in which the

letters/number/symbols of plain text are replaced by


other letters/numbers/symbols.

Visit for more Learning Resources


1. Caesar's Cipher –right shift by 3
2. Mono-Alphabetic Cipher –random substitution
3. A Homophonic Substitution Cipher-one to many substitution
4. A Polygram Substitution Cipher-many to many substitution
5. A Polyalphabetic Substitution Cipher-key to each plain text
1. e g. Vigenere Cipher
6. One time Pad( Vernam Cipher)

[Note: write plain text in lower letter and cipher text in capital
letters]
 It is earliest known substitution cipher
 by Julius Caesar
 first attested use in military affairs
 replaces each letter by 3rd letter after it
 Example:

meet me after the party


PHHW PH DIWHU WKH SDUWB
 can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
 mathematically give each letter a number
a b c d e f g h i j k l m
0 1 2 3 4 5 6 7 8 9 10 11 12
n o p q r s t u v w x y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
 then have Caesar cipher as:
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
 The week ness of Caesar's cipher is it’s predictability.
 Instead of using a unique form for all alphabets in a plain text
message use a random substitution.
 Rather than just shifting the alphabet we could shuffle (jumble) the
letters arbitrarily
 Each plaintext letter maps to a different random cipher text letter
hence key is 26 letters long
Plain text: Hello word
Cipher text: ACDER PQSAK
 In this technique one plain text is mapped with more than one
cipher text alphabet.

 h-[ABXY]
 I –[MNQR]

 Plain text: hi
 Cipher text: ABXYMNQR
 Rather than replacing one plain text with
another cipher text at time block of alphabet
is replaced with another.

 Plain text: hi hello


 Cipher text: JH KNHPL
 It uses multiple one character key.
 Each of the key encrypts one plain text character.
 First key encrypts 1st key , second key encrypts 2nd key, so on..
 E.g
◦ Vigenere cipher is example of poly alphabetic cipher
 It is based on vigenere table.
 It is made up of 27 rows.
 1st row of lower case letters represents plain text character.
 Each subsequent row represent cipher alphabet.
 Key (K) : FRINGE
 Plain text(P): get all soldier a meal.
 Cipher text(C):

 See key in vertical column and plain text in 1st row and write down intersection
letter as cipher text.
 It is implemented using random set of non repeating
characters as the input cipher text.
 Once the key is used to encrypt and decrypt a single message
it will never used again for any other message so it is called
one time pad
 The length of key must equal to length of original plain text.

 Plain text: how are you


 One time pad: NCBTZQARX
For more detail contact us

You might also like