0% found this document useful (0 votes)
23 views

Coding and Cryptology

Uploaded by

keisha109554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Coding and Cryptology

Uploaded by

keisha109554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

MMW 111

Coding and Cryptology


Cryptography

 Originated from the Greek works


KRYPTO which means hidden and
GRAPHENE means writing.
 Is a method of making and breaking
of secret codes.
Process of Cryptography

CRYPTOGRAPHY
Process of Cryptologray

CRYPTOGRAPY
Process of Cryptologray

CRYPTOGRAPY

ENCRYPTION
Process of Cryptologray

CRYPTOGRAPY

ENCRYPTION
DECRYPTION
ILLUSTRATION:

(Plain text) Maths is fun

(Coded Form) PDWKV LV IXQ


TERM:

1. PLAIN TEXT = refers to the original


message
2. CIPHERTEXT = refers to the coded
message
3. KEY = refers to the strings of
information that is used to reveal
the encrypted message into
readable form.
Simple Methods of
Crytography
 Shift Cipher
- it is called Ceasar Cipher
- it is the simple type of
substitution of cipher.
Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the left


Method of Shift Cipher

Example : Using a shift of 5 to the


right
Example :

 Using
the key of shift of 3 to the left,
encrypt the Word “
CRYPTOGRAPHY”
Answer:

 CRYPTOGRAPHY =
FUBSWRJUDKCT
Example

 Decrypt the cipher text, “BJY DN


BJJY”, using the key of 5-shifts to
the right.
Answer :

 “BJY DN BJJY”= God is good.


Method of Shift Cipher

 Usingthe Modulo operator


= The sender of the message uses
the key K to encrypt and to decrypt
the secret message. The key K may
have any integer value from 0 – 25
and this will be shared to the
person/s who will be receiving the
secret message.
Using the Modulo
Operator
To encrypt the message:
 1. Express the letters of the alphabet
into an integer from 0 to 25, that
matches its order, for example A = 0, B
= 1, C = 3 ….., then label them as C
 2. Calculate Y = (C+ K) mod 26 , for
every letter of the message.
 3. Convert the number Y into a letter
following the order of the letter of the
alphabet.
M = 12 , W = 22, I = 8, S = 18, F = 5, U = 20, N = 13, T = 19, O = 14, L = 11,
E = 4, A = 0, R = 17

Example:

1. : Encrypt the message “MMW is fun


to learn”
Let K = 5
Answer :

RRB NX KZS YT
QJFWS
How to decrpyt..
 To Decrypt the Message:
 1. Express the letters of the alphabet into
an integer from 0 to 25, that matches its
order, for example A = 0, B = 1, C = 3 …..,
then label them as Y
 2. Calculate C = (Y - K) mod 26 , for
every letter of the decrypted message.

 3. Convert the number C into a letter


following the order of the letter of the
alphabet.
Example:

Decrypt the RRB NX KZS YT


QJFWS
Example # 2

 Encryptthe word text “FATIMA”


using the Modulo Operator, given k
= 20
Answer :

ZUNCGU

You might also like