Lecture 4
Lecture 4
SECURITY
By
0784990516
TRANSPOSITION TECHNIQUES
H O L
E L W R D
L O
HOLELWRDLO
Exercise
i. Encrypt the message “Good morning” with a rail
fence of depth 2,
ii. Decrypt the message
“GFEKOIOODECSAEODEGBUSONMGNHR” with a rail
fence of depth 3
M E E T A T T
H E S C H O O
L H O U S E X
CT = ESOTCUEEHMHLAHSTOETOX
Row Transposition Ciphers……
A pure transposition cipher is easily recognized
Developed in 1977