0% found this document useful (0 votes)
13 views8 pages

Lecture 5

Uploaded by

sobia.shafique
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views8 pages

Lecture 5

Uploaded by

sobia.shafique
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Data Security and

Encryption
Lecture # 5
By: Engr. Sundas Hanif
[email protected]
Classical Ciphers
Polyalphabetic Substitution Ciphers
Vigenere Cipher
• Best known, and one of the simplest,
polyalphabetic ciphers
• Using a key and a table, it allow replacing a
letter by another one
• In order to encrypt using Vigenere method, the
easiest way is to have a double entry grid
Vigenere Cipher Encryption
• Locate the first letter of the plaintext message in
the first line of the table and the first letter of the
key on the left column
• The cipher letter is at the intersection
• Continue with the next letter of the plaintext,
and the next letter of the key
• When arrived at the end of the key, go back to
the first letter of the key
Vigenere Cipher Decryption
• To decrypt Vigenere with a double entry table, use the
same grid
• Locate the first letter of the key in the left column, and
locate on the row the first letter of the ciphered
message
• Then go up in the column to read the first letter, it is
the corresponding plain letter
• Continue with the next letters of the message and the
next letters of the key
• When arrived at the end of the key, go back the first
key of the key
Example
• Plaintext
ATTACKATDAWN
• Key
LEMON
• Keystream
LEMONLEMONLE
• Ciphertext
LXFOPVEFRNHR
Class Practice
• Plaintext
WEAREDISCOVEREDSAVEYOURSELF
• Key
DECEPTIVE

You might also like