CRYPTOGRAPHY
CRYPTOGRAPHY
CRYPTOGRAPHY
- A A N N A R AT H N A
19CSC07
KHOOR DOO !!!
DP GHWHFWLYH DQQDP.
KHOS PH VROYH WKLV FDVH
DQG
OHDUQ WKH PHWLRGV RI
FUBSWRJUDSKB DORQJ ZLWK
PH LQ WKLV MRXQHB.
CRYPTOGRAPHY
The science of encryption, known as
cryptology, encompasses cryptography
and cryptanalysis.
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
S E E M E I N MALL AR JAW M PU N Q Z
INFOSECINFO INFOSECINFO
AR JAW M PU N Q Z SE E M EI NMALL
Transposition Ciphers:
Unlike substitution ciphers that replace letters with other letters, transposition ciphers
keep the letters the same, but rearrange their order according to a specific algorithm.
For instance, in a simple columnar transposition cipher, a message might be read
horizontally but would be written vertically to produce the ciphertext.
Exclusive OR
Encryption: To see how XOR works, consider an example in which the
plaintext is the word “CAT.” The ASCII binary
The exclusive OR operation (XOR) is a
representation of the plaintext is “01000011 01000001
function of Boolean algebra in which two
01010100”. In order to encrypt the plaintext, a key value
bits are compared, and if the two bits are
should be selected. In this case, the bit pattern for the letter
identical, the result is a binary 0.
“V” (01010110) is used, and is repeated for each character
If the two bits are not the same, the result to be encrypted,
is a binary 1.
HI = 01101000 01101001
Key= 01010010 01000101
24 4 20 2 10
PLAY TIME!
Encrypted
Text:
YEUCK
PLAY TIME!
Text: MERCY
Key: MADAM
Book or Running Key Ciphers:
One encryption method made popular by spy movies involves using the text in a book
as the key to decrypt a message.
The ciphertext consists of a list of codes representing the page number, line number,
and word number of the plaintext word.
The algorithm is the mechanical process of looking up the references from the
ciphertext and converting each reference to a word by using the ciphertext’s value and
the key (the book).
For example, from a copy of a particular popular novel, one may send the message:
259,19,8; 22,3,8; 375,7,4; 394,17,2.
Although almost any book can be used, dictionaries and thesauruses are typically the
most popular sources as they are likely to contain almost any word that might be
needed.
Book or Running Key Ciphers:
The recipient of a running key cipher must first know which book is used—in this case,
suppose it is the science fiction novel A Fire Upon the Deep, the 1992 TOR edition.
To decrypt the ciphertext, the receiver acquires the book and turns to page 259, finds
line 19, and selects the eighth word in that line (which is “sack”).
Then the receiver turns to page 22, line 3, and selects the eighth word again, and so
forth. In this example, the resulting message is “SACK ISLAND SHARP PATH.”
If dictionaries are used, the message consists of only the page number and the number
of the word on the page.
An even more sophisticated version might use multiple books, perhaps even in a
particular sequence for each word or phrase.
WKDQN BRX