0% found this document useful (0 votes)
32 views12 pages

Security - Lecture 6

Here are the steps to encrypt the message "See you" using the Playfair cipher with the keyword "tomorrow": 1. Construct the 5x5 Playfair square using the keyword: ABCD EFGH IJKL MNOP QRST UVWX YZ T O M A R R O W B C E F G I/J D L P S K U H N V X Y Z 2. The plaintext is "Seeyou". Separate repeated letters with X: "Sexyou" 3. Encrypt each bigram: SX = RU Ey = OU Ou = PK The ciphertext is "RUOU PK".

Uploaded by

Saif Shubbar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views12 pages

Security - Lecture 6

Here are the steps to encrypt the message "See you" using the Playfair cipher with the keyword "tomorrow": 1. Construct the 5x5 Playfair square using the keyword: ABCD EFGH IJKL MNOP QRST UVWX YZ T O M A R R O W B C E F G I/J D L P S K U H N V X Y Z 2. The plaintext is "Seeyou". Separate repeated letters with X: "Sexyou" 3. Encrypt each bigram: SX = RU Ey = OU Ou = PK The ciphertext is "RUOU PK".

Uploaded by

Saif Shubbar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

The Islamic University

College of Technical Engineering


Department of Computer Technical Engineering

Fourth Stage

Security

Lecture 6

Asst. Lec. Yousif Samer Mudhafar


Email: [email protected]
Lecture objectives
The student will recognize the following objectives

 Transposition Techniques
 Encryption and Decryption using Play fair
Cipher.
Transposition Techniques
All the techniques examined so far involve the substitution of a Ciphertext symbol for a
plaintext symbol. A very different kind of mapping is achieved by performing some sort
of permutation on the plaintext letters. This techniques is referred to as a transposition
cipher.
A transposition cipher does not substitute one symbol for another, instead it changes the
location of the symbol, a symbol in the first position of the plaintext ma appear in the
tenth position of the Ciphertext a symbol in the eighth position in the plaintext ay
appear in the first position of the Ciphertext, in another words, a transposition cipher
reorders (transposes) the symbols.
In substitution which each element in the plaintext (bit, letter, group of bits or
letters) is mapped into another element, and Transposition in which elements in the
plaintext are rearranged. The fundamental requirement is that no information be lost
(that is, that all operations are reversible). Most systems, referred to as product
systems, involve multiple stages of substitutions and transpositions.
There is technique that depend on Transposition is :
1. Play fair Cipher.
Play fair Cipher
The best known multiple letter encryption cipher is the Play fair, which
treats diagrams in the plaintext as single units and translates these units
into Ciphertext diagrams. The Play fair algorithm is based on the use of a
𝟓 ∗ 𝟓 Matrix of letters constructed using a keyword.
Here is an example :
keyword is monarchy
AB C D E F G H I J K L MN O P Q R S T U VWX Y Z

M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Play fair Cipher
In this case, the keyword is monarchy. The matrix is constructed by filling
in the letters of the keyword (minus duplicates) from left to right and from
top to bottom, and then filling in the remainder of the matrix with the
remaining letters in alphabetic order.
The letters I and J count as one letter. Plaintext is encrypted two letters at
a time, according to the following rules:
1. Repeating plaintext letters that are in the same pair are separated with
a filler letter, such as x, so that balloon would be treated as ba lx lo on.
2. Two plaintext letters that fall in the same row of the matrix are each
replaced by the letter to the right, with the first element of the row
circularly following the last.
For example, ar is encrypted as RM.
Play fair Cipher
3. Two plaintext letters that fall in the same column are each replaced by
the letter beneath, with the top element of the column circularly
following the last.
For example, mu is encrypted as CM.
4. Otherwise, each plaintext letter in a pair is replaced by the letter that
lies in its own row and the column occupied by the other plaintext
letter. Thus, hs become BP and ea becomes IM (or JM, as the
enciphered wishes).
Alice
Play fair Cipher
Bob

Sender Receiver
Keyword Keyword
𝟓 ∗ 𝟓 𝒎𝒂𝒕𝒓𝒊𝒙 𝟓 ∗ 𝟓 𝒎𝒂𝒕𝒓𝒊𝒙

Encryption Decryption
Cipher text
Example
Encrypt and then decrypt the Plaintext “hello bop” by using
Play fair Cipher with the Keyword “teaching”.
Ans:-
1. Encryption Algorithm
The Play fair algorithm is based on the use of a 𝟓 ∗ 𝟓 Matrix of letters
constructed using a keyword.
AB C D E F G H I J K L MN O P Q R S T U VWX Y Z
T E A C H
𝐊𝐞𝐲𝐰𝐨𝐫𝐝 𝐢𝐬 𝟓 ∗ 𝟓 I/J N G B D
Matrix F K L M O
P Q R S U
V W X Y Z
Plaintext : hello bop Plaintext : helxlo bopx

Plaintext he lx lo bo px

𝐏𝟏 𝐏𝟐 𝐏𝟑 𝐏𝟒 𝐏𝟓
𝐏𝟏 = 𝐡𝐞 𝐂𝟏 = 𝐓𝐀 T E A C H
I/J N G B D
𝐏𝟐 = 𝐥𝐱 𝐂𝟐 = 𝐑𝐀
F K L M O
𝐏𝟑 = 𝐥𝐨 𝐂𝟑 = 𝐌𝐅 P Q R S U
𝐏𝟒 = 𝐛𝐨 𝐂𝟒 = 𝐃𝐌 V W X Y Z

𝐏𝟓 = 𝐩𝐱 𝐂𝟓 = 𝐑𝐕 The Cipher text is “TARAMFDMRV”


2. Decryption Algorithm The Cipher text is “TARAMFDMRV”

Ciphertext TA RA MF DM RV

𝐂𝟏 𝐂𝟐 𝐂𝟑 𝐂𝟒 𝐂𝟓
𝐂𝟏 = 𝐓𝐀 𝐏𝟏 = 𝐡𝐞
T E A C H
𝐂𝟐 = 𝐑𝐀 𝐏𝟐 = 𝐥𝐱 I/J N G B D
𝐂𝟑 = 𝐌𝐅 𝐏𝟑 = 𝐥𝐨 F K L M O
P Q R S U
𝐂𝟒 = 𝐃𝐌 𝐏𝟒 = 𝐛𝐨
V W X Y Z
𝐂𝟓 = 𝐑𝐕 𝐏𝟓 = 𝐩𝐱
The Plaintext is “helxlobopx” The Plaintext is “hello bop”
𝐊𝐞𝐲𝐰𝐨𝐫𝐝 𝐢𝐬 𝟓 ∗ 𝟓 Matrix 𝐊𝐞𝐲𝐰𝐨𝐫𝐝 𝐢𝐬 𝟓 ∗ 𝟓 Matrix
T E A C H T E A C H
I/J N G B D I/J N G B D
F K L M O F K L M O
P Q R S U P Q R S U
V W X Y Z V W X Y Z

TARAMFDMRV
hello bop hello bop
)Sender( )receiver(
Encryption algorithm Decryption algorithm
By using Play fair By using Play fair
Cipher Cipher
Homework

By using Play fair algorithm, encrypt this message


“See you” with the Keyword is “tomorrow”.

You might also like