435 Ciphers
435 Ciphers
Contents
1. Cipher/Cryptographic Algorithms
2. Types of Ciphers
3. Types of Classical Ciphers
4. Types of Modern Ciphers
5. Block Ciphers
6. Stream Ciphers
7. Some commonly used Algorithms
8. Key size and Speeds of Algorithms
9. DES
10. AES
Cryptographic Algorithms:
A Cryptographic algorithm or Ciphers is a set of well-defined but complex
mathematical instructions used to encrypt or decrypt data. The encryption and
decryption processes depend on a crypto-graphic key selected by the entities
participating in the encryption and decryption process.
Types of Ciphers:
Ciphers
Classical Modern
The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of substitution
cipher in which each letter in the plaintext is 'shifted' a certain number of places down the
alphabet.
Rule-1
Example:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Plain Text: CUB
Cipher Text: FXE
Here Key is: 3
Rule-2
A=1 B=2 C=3 D=4 E=5 F=6 G=7 H=8 I=9 J=10 K=11 L=12 M=13 N=14 0=15 P=16
Q=17 R=18 S=19 T=20 U=21 V=22 W=23 X=24 Y=25 Z=26
Here Key (K) =4
Key- Numerical (K)
C=(P+K) mod26
Here, C = Cipher Text, P= Plain Text, K = Value of key
Example
1. Plain text = HELLO
Key = 4
C(H) = (P+K) mod26 C(L) = (P+K) mod26 C(O) = (P+K) mod26
=(8+4) mod 26 =(12+4) mod 26 =(15+4) mod26
= 12 mod26 = 16 mod26 =19 mod26
=12 =16 =19
=L =P =S
Example: ALICE- AL IC EX
HELLO- HE LL O- HE LX LO
3. If both alphabets in the pair appear in the same row of matrix, replace them with alphabets to
their immediate right resp
Example: LY-AF
4. If both alphabets in the pair appear in the same Column of matrix, replace them with
alphabets to their immediate bellow resp
Example: BQ – HW
5. If the alphabets are not in same row or column, replace them with alphabets in the same row
resp but at other pair of corners.
ABCDEFGHIJKLMNOPQRSTUVWXYZ
P L A Y F
I/J R B C D
Key- PLAYFAIR E G H K M
Plain Text- NAME – NA ME N O Q S T
U V W X Z
Cipher Text-
Hill Cipher:
Transposition Cipher:
1. Symmetric key algorithms (Private-key Cryptography): Uses same key for encryption and
decryption.
2. Asymmetric key algorithms (Public-key Cryptography): Uses two different keys for
encryption and decryption.
Symmetric key algorithms:
1. Block Ciphers
2. Stream Ciphers
1. Block Ciphers:
2. Stream Ciphers
Some commonly used Algorithms:
Key size and Speeds of Algorithms:
DES(Data Encryption Standard):
AES(Advanced Encryption Standard):
RC4,RC5,RC6,MD5, Algorithms: