Decipher D Cipher - 2025
Decipher D Cipher - 2025
Pratyush Sharma
Ryan Azim Shaikh
Cryptography
Cryptography comes from the Greek words kryptós
meaning "hidden/secret" and graphein meaning
"writing".
It is about constructing and analyzing protocols that
prevent third parties or the public from reading
private messages.
Modern cryptography is heavily based on
mathematical theory and computer science.
Encryption and Decryption
Data that can be read and understood without any
special measures is called plaintext.
Disguising plaintext in such a way as to hide its
substance is called encryption.
Encrypting plaintext results in unreadable gibberish
called cipher text.
The process of reverting cipher text to its original
plaintext is called decryption.
Cipher
Examples:
Plain text: abcdefghijklmnopqrstuvwxyz
Cipher text: phqgiumeaylnofdxjkrcvstzwb
Plain text: DEFEND THE EAST WALL OF THE CASTLE
Cipher text: GIUIFG CEI IPRC TPNN DU CEI QPRCNI
Caesar’s Cipher
It is a type of substitution cipher in which each letter in the
plaintext is 'shifted' a certain number of places down the
alphabet.
If 'a'=0, 'b'=1, 'c'=2, ... , 'z'=25. We can now represent the
Caesar’s cipher encryption function, e(x), where x is the character
we are encrypting, as:
[A T T] = [0 19 19]
= ‘PFO’
Atbash Cipher:
A substitution cipher where the letters of the alphabet are reversed i.e.
all 'A's are replaced with 'Z's, all 'B's are replaced with 'Y's, and so on.
Example:
Plain text: ATTACK AT DAWN
Cipher text: ZGGZXP ZG WZDM
Transposition Cipher
A method of encryption by which the positions held by units of plaintext are shifted according to a regular system
that is, the order of the units is changed.
A simple example is to reverse the order of the letters in a plaintext. "a simple example" becomes "ELPMAXE ELPMIS A.”
Another example consists of writing the text in chunks of 5 letters with one chunk below the other and reading
columnwise
MEETM
ESOON
Cipher Text: ME ES EO TO MN
Vigenère and AutoKey Ciphers
The key repeats itself. This property has been exploited to design
a method to break vigenère cipher.
Vigenère and AutoKey cipher
In auto key cipher the key is not repeated but instead it is concatenated with the
plain text and then this is run all along the plain text, thus avoiding the repetition.
Example:
Plaintext: ATTACK AT D AWN…
Key: QUEENL YA T T ACK AT
DAWN
Ciphertext: QNXEPV YT WT WP …
First auto key cipher has defect that it did not use key but for all the letters in a
word the key character is the first letter of the word.
Thus it was as difficult for the receiver as anyone else to decipher the cipher text.
Notice how Vignère and AutoKey are different from Substitution codes, the
position of the character in a message matters.
Playfair Cipher
The First practical "digraph" substitution cipher. Invented by Charles Wheatstone
but named after Lord Playfair who promoted the use of cipher.
The key is 5*5 square which is built using a key word.
Start filling the key square by the key word and discard the letters which are
repeated and then fill the rest with the remaining letters in alphabetical order.
KEY :- PLAYFAIR EXAMPLE
Suppose there are a sender and a receiver who want to exchange a message.
Both of them have a cipher, say A, for the sender and B for the receiver. They
do not know much about the other persons cipher. All they know is that the
two ciphers commute, i.e. for any string s
Now to send a message s the sender and receiver can set up a system in
which
The sender applies on and transmits
The receiver now applies on and returns
The sender now applier on and transmits
Finally the receiver applies to get the final message .
Every time an encrypted sentence is transmitted, there is no transmission of
keys or other sensitive data. The sender may use the same cipher A to
communicate with other people and none of them will be able to snoop on
each others conversation.
THANK YOU!