Security - Lecture 6
Security - Lecture 6
Fourth Stage
Security
Lecture 6
Transposition Techniques
Encryption and Decryption using Play fair
Cipher.
Transposition Techniques
All the techniques examined so far involve the substitution of a Ciphertext symbol for a
plaintext symbol. A very different kind of mapping is achieved by performing some sort
of permutation on the plaintext letters. This techniques is referred to as a transposition
cipher.
A transposition cipher does not substitute one symbol for another, instead it changes the
location of the symbol, a symbol in the first position of the plaintext ma appear in the
tenth position of the Ciphertext a symbol in the eighth position in the plaintext ay
appear in the first position of the Ciphertext, in another words, a transposition cipher
reorders (transposes) the symbols.
In substitution which each element in the plaintext (bit, letter, group of bits or
letters) is mapped into another element, and Transposition in which elements in the
plaintext are rearranged. The fundamental requirement is that no information be lost
(that is, that all operations are reversible). Most systems, referred to as product
systems, involve multiple stages of substitutions and transpositions.
There is technique that depend on Transposition is :
1. Play fair Cipher.
Play fair Cipher
The best known multiple letter encryption cipher is the Play fair, which
treats diagrams in the plaintext as single units and translates these units
into Ciphertext diagrams. The Play fair algorithm is based on the use of a
𝟓 ∗ 𝟓 Matrix of letters constructed using a keyword.
Here is an example :
keyword is monarchy
AB C D E F G H I J K L MN O P Q R S T U VWX Y Z
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Play fair Cipher
In this case, the keyword is monarchy. The matrix is constructed by filling
in the letters of the keyword (minus duplicates) from left to right and from
top to bottom, and then filling in the remainder of the matrix with the
remaining letters in alphabetic order.
The letters I and J count as one letter. Plaintext is encrypted two letters at
a time, according to the following rules:
1. Repeating plaintext letters that are in the same pair are separated with
a filler letter, such as x, so that balloon would be treated as ba lx lo on.
2. Two plaintext letters that fall in the same row of the matrix are each
replaced by the letter to the right, with the first element of the row
circularly following the last.
For example, ar is encrypted as RM.
Play fair Cipher
3. Two plaintext letters that fall in the same column are each replaced by
the letter beneath, with the top element of the column circularly
following the last.
For example, mu is encrypted as CM.
4. Otherwise, each plaintext letter in a pair is replaced by the letter that
lies in its own row and the column occupied by the other plaintext
letter. Thus, hs become BP and ea becomes IM (or JM, as the
enciphered wishes).
Alice
Play fair Cipher
Bob
Sender Receiver
Keyword Keyword
𝟓 ∗ 𝟓 𝒎𝒂𝒕𝒓𝒊𝒙 𝟓 ∗ 𝟓 𝒎𝒂𝒕𝒓𝒊𝒙
Encryption Decryption
Cipher text
Example
Encrypt and then decrypt the Plaintext “hello bop” by using
Play fair Cipher with the Keyword “teaching”.
Ans:-
1. Encryption Algorithm
The Play fair algorithm is based on the use of a 𝟓 ∗ 𝟓 Matrix of letters
constructed using a keyword.
AB C D E F G H I J K L MN O P Q R S T U VWX Y Z
T E A C H
𝐊𝐞𝐲𝐰𝐨𝐫𝐝 𝐢𝐬 𝟓 ∗ 𝟓 I/J N G B D
Matrix F K L M O
P Q R S U
V W X Y Z
Plaintext : hello bop Plaintext : helxlo bopx
Plaintext he lx lo bo px
𝐏𝟏 𝐏𝟐 𝐏𝟑 𝐏𝟒 𝐏𝟓
𝐏𝟏 = 𝐡𝐞 𝐂𝟏 = 𝐓𝐀 T E A C H
I/J N G B D
𝐏𝟐 = 𝐥𝐱 𝐂𝟐 = 𝐑𝐀
F K L M O
𝐏𝟑 = 𝐥𝐨 𝐂𝟑 = 𝐌𝐅 P Q R S U
𝐏𝟒 = 𝐛𝐨 𝐂𝟒 = 𝐃𝐌 V W X Y Z
Ciphertext TA RA MF DM RV
𝐂𝟏 𝐂𝟐 𝐂𝟑 𝐂𝟒 𝐂𝟓
𝐂𝟏 = 𝐓𝐀 𝐏𝟏 = 𝐡𝐞
T E A C H
𝐂𝟐 = 𝐑𝐀 𝐏𝟐 = 𝐥𝐱 I/J N G B D
𝐂𝟑 = 𝐌𝐅 𝐏𝟑 = 𝐥𝐨 F K L M O
P Q R S U
𝐂𝟒 = 𝐃𝐌 𝐏𝟒 = 𝐛𝐨
V W X Y Z
𝐂𝟓 = 𝐑𝐕 𝐏𝟓 = 𝐩𝐱
The Plaintext is “helxlobopx” The Plaintext is “hello bop”
𝐊𝐞𝐲𝐰𝐨𝐫𝐝 𝐢𝐬 𝟓 ∗ 𝟓 Matrix 𝐊𝐞𝐲𝐰𝐨𝐫𝐝 𝐢𝐬 𝟓 ∗ 𝟓 Matrix
T E A C H T E A C H
I/J N G B D I/J N G B D
F K L M O F K L M O
P Q R S U P Q R S U
V W X Y Z V W X Y Z
TARAMFDMRV
hello bop hello bop
)Sender( )receiver(
Encryption algorithm Decryption algorithm
By using Play fair By using Play fair
Cipher Cipher
Homework