Classical Encryption Techniques: Dr. Rajkumar Tekchandani Assistant Professor - CSED
Classical Encryption Techniques: Dr. Rajkumar Tekchandani Assistant Professor - CSED
• Example:
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
2. If both letters fall in the same row, replace each with letter to
right (wrapping back to start from end) [AR→RM] M O N A R
C H Y B D
3. If both letters fall in the same column, replace each with the
letter below it (again wrapping to top from bottom) [PV→VO] E F G I/J K
L P Q S T
4. Replacement with diagonally opposite letter, if pair falls in U V W X Z
different row or column. Note: Order must be preserved.
[OY→NH, BZ→DX]
• Would need a 676 entry frequency table to analyse (verses 26 for a monoalphabetic)
The sender wants to encrypt the message, say ‘attack from south east’. He will arrange plaintext and
numeric key as follows −
He now shifts each plaintext alphabet by the number written below it to create ciphertext as shown below
• These hide the message by rearranging the letter order without altering the actual
letters used
M E M A T R H P R Y
E T E F E T E A T
me ma t r h pry
e t e f e t e at
• Giving ciphertext
me ma t r h prye t e f e t e at
Key: 3421567
Plaintext: a t t a c k p
ostpone
duntilt
woamxyz
Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ