2 Symmetric Cryptography

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 40

CS 3202: INFORMATION SYSTEMS

SECURITY

INTRODUCTION
VISION-MISSION DEPARTMENT

VISION
❖TO ACHIEVE EXCELLENCE IN COMPUTER SCIENCE &
ENGINEERING EDUCATION FOR GLOBAL COMPETENCY WITH
HUMAN VALUES

MISSION
❖PROVIDE INNOVATIVE ACADEMIC & RESEARCH ENVIRONMENT
TO DEVELOP COMPETITIVE ENGINEERS IN THE FIELD OF
COMPUTER SCIENCE AND ENGINEERING.
❖DEVELOP PROBLEM-SOLVING & PROJECT MANAGEMENT SKILLS
BY STUDENT CENTRIC ACTIVITIES & INDUSTRY
COLLABORATION.
❖NURTURE THE STUDENTS WITH SOCIAL & ETHICAL VALUES
INTRODUCTION

❖THIS COURSE IS OFFERED BY DEPT. OF COMPUTER SCIENCE, THE


AIM OF THE COURSE TO PROVIDE THE STUDENTS BASIC
BACKGROUND ON INFORMATION SYSTEMS.
❖THIS IS TARGETING STUDENTS WHO WISH TO PURSUE CAREER IN
THE FIELD OF INFORMATION SECURITY. THE COURSE INCLUDES
UNDERSTANDING THE PRINCIPLES FOR MULTI-LAYER SECURITY
AND MANAGEMENT SYSTEMS FOR THE NETWORK. THE FOCUS IS
ON TECHNIQUES AND PROTOCOL USED FOR DIFFERENT TYPES OF
SECURITY POLICIES.
COURSE OUTCOME
• [CS 3101.1] ILLUSTRATE THE CONCEPT OF INFORMATION SYSTEM AND
CLASSICAL CRYPTOGRAPHY.

• [CS 3101.2] APPLY THE CONCEPTS OF CIPHER ALGORITHMS WITH


MATHEMATICAL STANDARDS.

• [CS 3101.3] MAKE USE OF PUBLIC KEY ENCRYPTION WITH KEY EXCHANGE
FUNDAMENTALS.

• [CS 3101.4] DEMONSTRATE AUTHENTICATION MANAGEMENT AND ITS


RELEVANT ISSUES.

• [CS 3101.5] INFER THE APPLICATIONS OF CRYPTOGRAPHY FOR INFORMATION


SYSTEMS.
PROGRAM OUTCOME
• [PO.1]. ENGINEERING KNOWLEDGE: APPLY THE KNOWLEDGE OF MATHEMATICS,
COMPUTER SCIENCE, AND COMMUNICATION ENGINEERING FUNDAMENTALS TO THE
SOLUTION OF COMPLEX ENGINEERING PROBLEMS.

• [PO.2]. PROBLEM ANALYSIS: THE SOPHISTICATED CURRICULUM WOULD ENABLE A


GRADUATE TO IDENTIFY, FORMULATE, REVIEW RESEARCH LITERATURE, AND ANALYSES
COMPLEX ENGINEERING PROBLEMS REACHING SUBSTANTIATED CONCLUSIONS USING
BASIC PRINCIPLES OF MATHEMATICS, COMPUTING TECHNIQUES AND COMMUNICATION
ENGINEERING PRINCIPLES.

• [PO.3]. DESIGN/DEVELOPMENT OF SOLUTIONS: UPON ANALYZING, THE B. TECH CCE


GRADUATE SHOULD BE ABLE TO DEVISE SOLUTIONS FOR COMPLEX ENGINEERING
PROBLEMS AND DESIGN SYSTEM COMPONENTS OR PROCESSES THAT MEET THE SPECIFIED
REQUIREMENTS WITH APPROPRIATE CONSIDERATION FOR LAW, SAFETY, CULTURAL &
SOCIETAL OBLIGATIONS WITH ENVIRONMENTAL CONSIDERATIONS
PROGRAM OUTCOME
• [PO.4]. CONDUCT INVESTIGATIONS OF COMPLEX PROBLEMS: TO IMBIBE THE INQUISITIVE
PRACTICES TO HAVE THRUST FOR INNOVATION AND EXCELLENCE THAT LEADS TO USE
RESEARCH-BASED KNOWLEDGE AND RESEARCH METHODS INCLUDING DESIGN OF
EXPERIMENTS, ANALYSIS AND INTERPRETATION OF DATA, AND SYNTHESIS OF THE
INFORMATION TO PROVIDE VALID CONCLUSIONS.

• [PO.5]. MODERN TOOL USAGE: CREATE, SELECT, AND APPLY APPROPRIATE TECHNIQUES,
RESOURCES, AND MODERN ENGINEERING AND IT TOOLS INCLUDING PREDICTION AND
MODELLING TO COMPLEX ENGINEERING ACTIVITIES WITH AN UNDERSTANDING OF THE
LIMITATIONS.

• [PO.6]. THE ENGINEER AND SOCIETY: THE ENGINEERS ARE CALLED SOCIETY BUILDERS AND
TRANSFORMERS. B. TECH CCE GRADUATE SHOULD BE ABLE TO APPLY REASONING
INFORMED BY THE CONTEXTUAL KNOWLEDGE TO ASSESS SOCIETAL, HEALTH, SAFETY,
LEGAL AND CULTURAL ISSUES AND THE CONSEQUENT RESPONSIBILITIES RELEVANT TO THE
PROFESSIONAL ENGINEERING PRACTICE.
PROGRAM OUTCOME
• [[PO.7]. ENVIRONMENT AND SUSTAINABILITY: THE ZERO EFFECT AND ZERO DEFECT IS NOT
JUST A SLOGAN, IT IS TO BE PRACTICED IN EACH ACTION. THUS, A B. TECH. CCE SHOULD
UNDERSTAND THE IMPACT OF THE PROFESSIONAL ENGINEERING SOLUTIONS IN SOCIETAL
AND ENVIRONMENTAL CONTEXTS, AND DEMONSTRATE THE KNOWLEDGE OF, AND NEED
FOR SUSTAINABLE DEVELOPMENT.
• [PO.8]. ETHICS: PROTECTION OF IPR, STAYING AWAY FROM PLAGIARISM ARE IMPORTANT.
STUDENT SHOULD BE ABLE TO APPLY ETHICAL PRINCIPLES AND COMMIT TO PROFESSIONAL
ETHICS, RESPONSIBILITIES AND NORMS OF THE ENGINEERING PRACTICE.
• [PO.9]. INDIVIDUAL AND TEAMWORK: UNITED WE GROW, DIVIDED WE FALL IS A CULTURE
AT MUJ. THUS, AN OUTGOING STUDENT SHOULD BE ABLE TO FUNCTION EFFECTIVELY AS
AN INDIVIDUAL, AND AS A MEMBER OR LEADER IN DIVERSE TEAMS, AND IN
MULTIDISCIPLINARY SETTINGS.
• [PO.10]. COMMUNICATION: COMMUNICATE EFFECTIVELY FOR ALL ENGINEERING
PROCESSES & ACTIVITIES WITH THE PEER ENGINEERING TEAM, COMMUNITY AND WITH
SOCIETY AT LARGE. CLARITY OF THOUGHTS, BEING ABLE TO COMPREHEND AND
FORMULATE EFFECTIVE REPORTS AND DESIGN DOCUMENTATION, MAKE EFFECTIVE
PRESENTATIONS, AND GIVE AND RECEIVE CLEAR INSTRUCTIONS
PROGRAM OUTCOME
• [PO.11]. PROJECT MANAGEMENT AND FINANCE: DEMONSTRATE KNOWLEDGE AND
UNDERSTANDING OF THE ENGINEERING AND MANAGEMENT PRINCIPLES AND APPLY THESE
TO ONE’S OWN WORK, AS A MEMBER AND LEADER IN A TEAM, TO MANAGE PROJECTS
AND IN VARIED ENVIRONMENTS.

• [PO.12]. LIFE-LONG LEARNING: RECOGNIZE THE NEED FOR AND HAVE THE PREPARATION
AND ABILITY TO ENGAGE IN INDEPENDENT AND LIFE-LONG LEARNING IN THE BROADEST
CONTEXT OF TECHNOLOGICAL CHANGE.
CLASSIFICATION OF CRYPTOGRAPHY
CLASSICAL CRYPTOGRAPHY

• IN CRYPTOGRAPHY, A CLASSICAL CRYPTOGRAPHY IS A TYPE OF CIPHER THAT WAS


USED HISTORICALLY BUT FOR THE MOST PART, HAS FALLEN INTO DISUSE.
• IN CONTRAST TO MODERN CRYPTOGRAPHIC ALGORITHMS, MOST CLASSICAL
CIPHERS CAN BE PRACTICALLY COMPUTED AND SOLVED BY HAND. HOWEVER, THEY
ARE ALSO USUALLY VERY SIMPLE TO BREAK WITH MODERN TECHNOLOGY.
• HAVE TWO BASIC COMPONENTS OF CLASSICAL CIPHERS: SUBSTITUTION AND
TRANSPOSITION
SUBSTITUTION CRYPTOGRAPHY
• IN A SUBSTITUTION CIPHER, LETTERS (OR GROUPS OF LETTERS) ARE
SYSTEMATICALLY REPLACED THROUGHOUT THE MESSAGE FOR OTHER LETTERS (OR
GROUPS OF LETTERS).
• A WELL-KNOWN EXAMPLE OF A SUBSTITUTION CIPHER IS THE CAESAR CIPHER. TO
ENCRYPT A MESSAGE WITH THE CAESAR CIPHER, EACH LETTER OF MESSAGE IS
REPLACED BY THE LETTER THREE POSITIONS LATER IN THE ALPHABET.
• A IS REPLACED BY D, B BY E, C BY F, ETC IF KEY IS 3.
TRANSPOSITION CRYPTOGRAPHY
• IN A TRANSPOSITION CIPHER, THE LETTERS THEMSELVES ARE KEPT UNCHANGED,
BUT THEIR ORDER WITHIN THE MESSAGE IS SCRAMBLED ACCORDING TO SOME
WELL-DEFINED SCHEME.
STREAM CIPHER
• IN STREAM CIPHER, ONE BYTE IS ENCRYPTED AT A TIME WHILE IN BLOCK CIPHER
~128 BITS ARE ENCRYPTED AT A TIME.
• INITIALLY, A KEY(K) WILL BE SUPPLIED AS INPUT TO PSEUDORANDOM BIT
GENERATOR AND THEN IT PRODUCES A RANDOM 8-BIT OUTPUT WHICH IS TREATED
AS KEYSTREAM.
• THE RESULTED KEYSTREAM WILL BE OF SIZE 1 BYTE, I.E., 8 BITS.
• STREAM CIPHER FOLLOWS THE SEQUENCE OF PSEUDORANDOM NUMBER STREAM.
• ONE OF THE BENEFITS OF FOLLOWING STREAM CIPHER IS TO MAKE
CRYPTANALYSIS MORE DIFFICULT, SO THE NUMBER OF BITS CHOSEN IN THE
KEYSTREAM MUST BE LONG IN ORDER TO MAKE CRYPTANALYSIS MORE DIFFICULT.
• BY MAKING THE KEY MORE LONGER IT IS ALSO SAFE AGAINST BRUTE FORCE
ATTACKS.
• KEYSTREAM CAN BE DESIGNED MORE EFFICIENTLY BY INCLUDING MORE NUMBER
OF 1S AND 0S, FOR MAKING CRYPTANALYSIS MORE DIFFICULT.
• CONSIDERABLE BENEFIT OF A STREAM CIPHER IS, IT REQUIRES FEW LINES OF CODE
COMPARED TO BLOCK CIPHER.
• ENCRYPTION : FOR ENCRYPTION,
• PLAIN TEXT AND KEYSTREAM PRODUCES CIPHER TEXT (SAME KEYSTREAM WILL BE
USED FOR DECRYPTION.).
• THE PLAINTEXT WILL UNDERGO XOR OPERATION WITH KEYSTREAM BIT-BY-BIT AND
PRODUCES THE CIPHER TEXT.
• EXAMPLE –
• PLAIN TEXT : 10011001
• KEYSTREAM : 11000011
• `````````````````````
• CIPHER TEXT : 01011010
• DECRYPTION : FOR DECRYPTION,
• CIPHER TEXT AND KEYSTREAM GIVES THE ORIGINAL PLAIN TEXT (SAME KEYSTREAM
WILL BE USED FOR ENCRYPTION.).
• THE CIPHERTEXT WILL UNDERGO XOR OPERATION WITH KEYSTREAM BIT-BY-BIT
AND PRODUCES THE ACTUAL PLAIN TEXT.
• EXAMPLE –
• CIPHER TEXT : 01011010
• KEYSTREAM : 11000011
• ``````````````````````
• PLAIN TEXT : 10011001
• DECRYPTION IS JUST THE REVERSE PROCESS OF ENCRYPTION I.E. PERFORMING XOR
WITH CIPHER TEXT.
BLOCK CIPHER
• A BLOCK CIPHER IS A SYMMETRIC CRYPTOGRAPHIC TECHNIQUE WHICH WE USED
TO ENCRYPT A FIXED-SIZE DATA BLOCK USING A SHARED, SECRET KEY.
• DURING ENCRYPTION, WE USED PLAINTEXT AND CIPHERTEXT IS THE RESULTANT
ENCRYPTED TEXT.
• IT USES THE SAME KEY TO ENCRYPT BOTH THE PLAINTEXT, AND THE CIPHERTEXT.
• A BLOCK CIPHER PROCESSES THE DATA BLOCKS OF FIXED SIZE. TYPICALLY, A
MESSAGE'S SIZE EXCEEDS A BLOCK'S SIZE.
• AS A RESULT, THE LENGTHY MESSAGE IS BROKEN UP INTO A NUMBER OF
SEQUENTIAL MESSAGE BLOCKS, AND THE CIPHER OPERATES ON THESE BLOCKS
ONE AT A TIME.
• POPULAR VARIATIONS OF THE BLOCK CIPHER ALGORITHM INCLUDE THE DATA
ENCRYPTION STANDARD (DES), TRIPLEDES, AND THE ADVANCED ENCRYPTION
STANDARD (AES).
TYPES OF SUBSTITUTION TECHNIQUE
• 1. MONOALPHABETIC CIPHER : A MONOALPHABETIC CIPHER IS ANY CIPHER IN
WHICH THE LETTERS OF THE PLAIN TEXT ARE MAPPED TO CIPHER TEXT LETTERS
BASED ON A SINGLE ALPHABETIC KEY. EXAMPLES OF MONOALPHABETIC CIPHERS
WOULD INCLUDE THE CAESAR-SHIFT CIPHER, WHERE EACH LETTER IS SHIFTED BASED
ON A NUMERIC KEY, AND THE ATBASH CIPHER, WHERE EACH LETTER IS MAPPED TO
THE LETTER SYMMETRIC TO IT ABOUT THE CENTER OF THE ALPHABET.

• 2. POLYALPHABETIC CIPHER : A POLYALPHABETIC CIPHER IS ANY CIPHER BASED ON


SUBSTITUTION, USING MULTIPLE SUBSTITUTION ALPHABETS. THE VIGENÈRE CIPHER
IS PROBABLY THE BEST-KNOWN EXAMPLE OF A POLYALPHABETIC CIPHER, THOUGH
IT IS A SIMPLIFIED SPECIAL CASE.
SR. Monoalphabetic Cipher Polyalphabetic Cipher

Polyalphabetic cipher is any cipher based on


Monoalphabetic cipher is one where each symbol in plain
1 substitution, using multiple substitution alphabets.
text is mapped to a fixed symbol in cipher text.

The relationship between a character in the plain


The relationship between a character in the plain text and
2 text and the characters in the cipher text is one-to-
the characters in the cipher text is one-to-one.
many.
Each alphabetic character of plain text can be
Each alphabetic character of plain text is mapped onto a
3 mapped onto ‘m’ alphabetic characters of a cipher
unique alphabetic character of a cipher text.
text.

A stream cipher is a monoalphabetic cipher if the value of A stream cipher is a polyalphabetic cipher if the
4 key does not depend on the position of the plain text value of key does depend on the position of the
character in the plain text stream. plain text character in the plain text stream.

It includes autokey, Playfair, Vigenere, Hill, one-


It includes additive, multiplicative, affine and
5 time pad, rotor, and Enigma cipher.
monoalphabetic substitution cipher.

6 It is a simple substitution cipher. It is multiple substitutions cipher.

Polyalphabetic Cipher is described as substitution


Monoalphabetic Cipher is described as a substitution
cipher in which plain text letters in different
7 cipher in which the same fixed mappings from plain text
positions are enciphered using different
to cipher letters across the entire text are used.
cryptoalphabets.

Monoalphabetic ciphers are not that strong as compared


8 Polyalphabetic ciphers are much stronger.
to polyalphabetic cipher.
CEASER CIPHER
• THE CAESAR CIPHER METHOD IS BASED ON A MONO-ALPHABETIC CIPHER AND IS
ALSO CALLED A SHIFT CIPHER OR ADDITIVE CIPHER.
• JULIUS CAESAR USED THE SHIFT CIPHER (ADDITIVE CIPHER) TECHNIQUE TO
COMMUNICATE WITH HIS OFFICERS. FOR THIS REASON, THE SHIFT CIPHER
TECHNIQUE IS CALLED THE CAESAR CIPHER.
• THE CAESAR CIPHER IS A KIND OF REPLACEMENT (SUBSTITUTION) CIPHER, WHERE
ALL LETTER OF PLAIN TEXT IS REPLACED BY ANOTHER LETTER.
• THE FORMULA OF ENCRYPTION IS:
• EN (X) = (X + N) MOD 26
• THE FORMULA OF DECRYPTION IS:
• DN (X) = (XI - N) MOD 26
• IF ANY CASE (DN) VALUE BECOMES NEGATIVE (-VE), IN THIS CASE, WE WILL
ADD 26 IN THE NEGATIVE VALUE.
• WHERE,
• E DENOTES THE ENCRYPTION
• D DENOTES THE DECRYPTION
• X DENOTES THE LETTERS VALUE
• N DENOTES THE KEY VALUE (SHIFT VALUE)
PLAYFAIR CIPHER
• PLAYFAIR CIPHER IS PROPOSED BY CHARLES WHETSTONE IN 1889. BUT IT WAS
NAMED FOR ONE OF HIS FRIENDS LORD LYON PLAYFAIR BECAUSE HE POPULARIZED
ITS USES.
• IT IS THE MOST POPULAR SYMMETRIC ENCRYPTION TECHNIQUE THAT FALLS UNDER
THE SUBSTITUTION CIPHER.
• IT IS AN ENCODING PROCEDURE THAT ENCIPHERS MORE THAN ONE LETTER AT A
TIME.
• PLAYFAIR CIPHER IS AN ENCRYPTION ALGORITHM TO ENCRYPT OR ENCODE A
MESSAGE.
• IT IS THE SAME AS A TRADITIONAL CIPHER. THE ONLY DIFFERENCE IS THAT IT
ENCRYPTS A DIGRAPH (A PAIR OF TWO LETTERS) INSTEAD OF A SINGLE LETTER.
• IT INITIALLY CREATES A KEY-TABLE OF 5*5 MATRIX. THE MATRIX CONTAINS
ALPHABETS THAT ACT AS THE KEY FOR ENCRYPTION OF THE PLAINTEXT. NOTE THAT
ANY ALPHABET SHOULD NOT BE REPEATED. ANOTHER POINT TO NOTE THAT THERE
ARE 26 ALPHABETS AND WE HAVE ONLY 25 BLOCKS TO PUT A LETTER INSIDE IT.
• THEREFORE, ONE LETTER IS EXCESS SO, A LETTER WILL BE OMITTED (USUALLY J)
FROM THE MATRIX. NEVERTHELESS, THE PLAINTEXT CONTAINS J, THEN J IS REPLACED
BY I. IT MEANS TREAT I AND J AS THE SAME LETTER, ACCORDINGLY.
• PLAYFAIR CIPHER ENCRYPTION RULES
• 1. FIRST, SPLIT THE PLAINTEXT INTO DIGRAPHS (PAIR OF TWO LETTERS). IF THE
PLAINTEXT HAS THE ODD NUMBER OF LETTERS, APPEND THE LETTER Z AT THE END
OF THE PLAINTEXT. IT MAKES THE PLAINTEXT OF EVEN FOR EXAMPLE, THE
PLAINTEXT MANGO HAS FIVE LETTERS. SO, IT IS NOT POSSIBLE TO MAKE A DIGRAPH.
SINCE, WE WILL APPEND A LETTER Z AT THE END OF THE PLAINTEXT, I.E. MANGOZ.
• 2. AFTER THAT, BREAK THE PLAINTEXT INTO DIGRAPHS (PAIR OF TWO LETTERS). IF
ANY LETTER APPEARS TWICE (SIDE BY SIDE), PUT X AT THE PLACE OF THE SECOND
OCCURRENCE. SUPPOSE, THE PLAINTEXT IS COMMUNICATE THEN ITS DIGRAPH
BECOMES CO MX MU NI CA TE. SIMILARLY, THE DIGRAPH FOR THE
PLAINTEXT JAZZ WILL BE JA ZX ZX, AND FOR PLAINTEXT GREET, THE DIGRAPH WILL
BE GR EX ET.
• TO DETERMINE THE CIPHER (ENCRYPTION) TEXT, FIRST, BUILD A 5*5 KEY-MATRIX OR
KEY-TABLE AND FILLED IT WITH THE LETTERS OF ALPHABETS, AS DIRECTED BELOW:
• FILL THE FIRST ROW (LEFT TO RIGHT) WITH THE LETTERS OF THE GIVEN KEYWORD
(ATHENS). IF THE KEYWORD HAS DUPLICATE LETTERS (IF ANY) AVOID THEM. IT
MEANS A LETTER WILL BE CONSIDERED ONLY ONCE. AFTER THAT, FILL THE
REMAINING LETTERS IN ALPHABETICAL ORDER. LET'S CREATE A 5*5 KEY-MATRIX FOR
THE KEYWORD ATHENS.
• THERE MAY BE THE FOLLOWING THREE CONDITIONS:
• I) IF A PAIR OF LETTERS (DIGRAPH) APPEARS IN THE SAME ROW
• IN THIS CASE, REPLACE EACH LETTER OF THE DIGRAPH WITH THE LETTERS
IMMEDIATELY TO THEIR RIGHT. IF THERE IS NO LETTER TO THE RIGHT, CONSIDER THE
FIRST LETTER OF THE SAME ROW AS THE RIGHT LETTER. SUPPOSE, Z IS A LETTER
WHOSE RIGHT LETTER IS REQUIRED, IN SUCH CASE, T WILL BE RIGHT TO Z.
• II) IF A PAIR OF LETTERS (DIGRAPH) APPEARS IN THE SAME COLUMN
• IN THIS CASE, REPLACE EACH LETTER OF THE DIGRAPH WITH THE LETTERS
IMMEDIATELY BELOW THEM. IF THERE IS NO LETTER BELOW, WRAP AROUND TO THE
TOP OF THE SAME COLUMN. SUPPOSE, W IS A LETTER WHOSE BELOW LETTER IS
REQUIRED, IN SUCH CASE, V WILL BE BELOW W.
• III) IF A PAIR OF LETTERS (DIGRAPH) APPEARS IN A DIFFERENT ROW AND
DIFFERENT COLUMN: IN THIS CASE, SELECT A 3*3 MATRIX FROM A 5*5 MATRIX
SUCH THAT PAIR OF LETTERS APPEAR IN THE 3*3 MATRIX. SINCE THEY OCCUPY TWO
OPPOSITE CORNERS OF A SQUARE WITHIN THE MATRIX. THE OTHER CORNER WILL
BE A CIPHER FOR THE GIVEN DIGRAPH.
• SUPPOSE, A DIGRAPH IS HY AND WE HAVE TO FIND A CIPHER FOR IT. WE OBSERVE
THAT BOTH H AND Y ARE PLACED IN DIFFERENT ROWS AND DIFFERENT COLUMNS.
IN SUCH CASES, WE HAVE TO SELECT A 3*3 MATRIX IN SUCH A WAY THAT BOTH H
AND Y APPEAR IN THE 3*3 MATRIX (HIGHLIGHTED WITH YELLOW COLOR). NOW, WE
WILL CONSIDER ONLY THE SELECTED MATRIX TO FIND THE CIPHER.
• NOW TO FIND THE CIPHER FOR HY, WE WILL CONSIDER THE DIAGONAL OPPOSITE
TO HY, I.E. LU. THEREFORE, THE CIPHER FOR H WILL BE L, AND THE CIPHER FOR Y
WILL BE U.

• PLAYFAIR CIPHER DECRYPTION


• THE DECRYPTION PROCEDURE IS THE SAME AS ENCRYPTION BUT THE STEPS ARE
APPLIED IN REVERSE ORDER. FOR DECRYPTION CIPHER IS SYMMETRIC (MOVE LEFT
ALONG ROWS AND UP ALONG COLUMNS). THE RECEIVER OF THE PLAIN TEXT HAS
THE SAME KEY AND CAN CREATE THE SAME KEY-TABLE THAT IS USED TO DECRYPT
THE MESSAGE.
• EXAMPLE OF PLAYFAIR CIPHES: SUPPOSE, THE PLAINTEXT IS COMMUNICATION AND
THE KEY THAT WE WILL USE TO ENCIPHER THE PLAINTEXT IS COMPUTER. THE KEY
CAN BE ANY WORD OR PHRASE. LET'S ENCIPHER THE MESSAGE COMMUNICATION.
• 1. FIRST, SPLIT THE PLAINTEXT INTO DIGRAPH (BY RULE 2) I.E. CO MX MU NI CA TE.
• 2. CONSTRUCT A 5*5 KEY-MATRIX (BY RULE 3). IN OUR CASE, THE KEY IS
COMPUTER.
• NOW, WE WILL TRAVERSE IN KEY-MATRIX PAIR BY PAIR AND FIND THE
CORRESPONDING ENCIPHER FOR THE PAIR.
• THE FIRST DIGRAPH IS CO. THE PAIR APPEARS IN THE SAME ROW. BY USING RULE
4(I) CO GETS ENCIPHER INTO OM.
• THE SECOND DIGRAPH IS MX. THE PAIR APPEARS IN THE SAME COLUMN. BY USING
RULE 4(II) MX GETS ENCIPHER INTO RM.
• THE THIRD DIGRAPH IS MU. THE PAIR APPEARS IN THE SAME ROW. BY USING RULE
4(I) MU GETS ENCIPHER INTO PC.
• THE FOURTH DIGRAPH IS NI. THE PAIR APPEARS IN DIFFERENT ROWS AND
DIFFERENT COLUMNS. BY USING RULE 4(III) NI GETS ENCIPHER INTO SG.
• THE FIFTH DIGRAPH IS CA. THE PAIR APPEARS IN DIFFERENT ROWS AND DIFFERENT
COLUMNS. BY USING RULE 4(III) CA GETS ENCIPHER INTO PT.
• THE SIXTH DIGRAPH IS TE. THE PAIR APPEARS IN THE SAME ROW. BY USING RULE
4(I) TE GETS ENCIPHER INTO ER.
• THEREFORE, THE PLAINTEXT COMMUNICATE GETS ENCIPHER (ENCRYPTED) INTO
OMRMPCSGPTER.
VIGENERE CIPHER
• THE VIGENERE CIPHER IS AN ALGORITHM THAT IS USED TO ENCRYPTING AND
DECRYPTING THE TEXT.
• THE VIGENERE CIPHER IS AN ALGORITHM OF ENCRYPTING AN ALPHABETIC TEXT
THAT USES A SERIES OF INTERWOVEN CAESAR CIPHERS. IT IS BASED ON A
KEYWORD'S LETTERS.
• IT IS AN EXAMPLE OF A POLYALPHABETIC SUBSTITUTION CIPHER. THIS ALGORITHM
IS EASY TO UNDERSTAND AND IMPLEMENT.
• THIS ALGORITHM WAS FIRST DESCRIBED IN 1553 BY GIOVAN BATTISTA BELLASO.
• IT USES A VIGENERE TABLE OR VIGENERE SQUARE FOR ENCRYPTION AND
DECRYPTION OF THE TEXT. THE VIGENERE TABLE IS ALSO CALLED THE TABULA
RECTA.
• WHEN THE VIGENERE TABLE IS NOT GIVEN, THE ENCRYPTION AND DECRYPTION
ARE DONE BY VIGENAR ALGEBRAICALLY FORMULA IN THIS METHOD (CONVERT THE
LETTERS (A-Z) INTO THE NUMBERS (0-25)).
• FORMULA OF ENCRYPTION IS,
• EI = (PI + KI) MOD 26
• FORMULA OF DECRYPTION IS,
• DI = (EI - KI) MOD 26
• IF ANY CASE (DI) VALUE BECOMES NEGATIVE (-VE), IN THIS CASE, WE WILL ADD 26 IN
THE NEGATIVE VALUE.
• EXAMPLE: THE PLAINTEXT IS "JAVATPOINT", AND THE KEY IS "BEST".
• ENCRYPTION: EI = (PI + KI) MOD 26

Plaintex J A V A T P O I N T
t
Plaintex 09 00 21 00 19 15 14 08 13 19
t value
(P)
Key B E S T B E S T B E
Key 01 04 18 19 01 04 18 19 01 04
value
(K)
Ciphert 10 04 13 19 20 19 06 01 14 23
ext
value
(E)
Ciphert K E N T U T G B O X
ext
• DECRYPTION: DI = (EI - KI) MOD 26
• IF ANY CASE (DI) VALUE BECOMES NEGATIVE (-VE), IN THIS CASE, WE WILL ADD 26 IN
THE NEGATIVE VALUE. LIKE, THE THIRD LETTER OF THE CIPHERTEXT;
• N = 13 AND S = 18
• DI = (EI - KI) MOD 26
• DI = (13 - 18) MOD 26
• DI = -5 MOD 26
• DI = (-5 + 26) MOD 26
• DI = 21
Ciphert K E N T U T G B O X
ext

Ciphert 10 04 13 19 20 19 06 01 14 23
ext
value
(E)

Key B E S T B E S T B E

Key 01 04 18 19 01 04 18 19 01 04
value
(K)

Plaintex 09 00 21 00 19 15 14 08 13 19
t value
(P)

Plaintex J A V A T P O I N T
t
HILL CIPHER
• IN CLASSICAL CRYPTOGRAPHY, THE HILL CIPHER IS A POLYGRAPHIC SUBSTITUTION
CIPHER BASED ON LINEAR ALGEBRA.
• IT WAS INVENTED BY LESTER S. HILL IN THE YEAR 1929. IN SIMPLE WORDS, IT IS A
CRYPTOGRAPHY ALGORITHM USED TO ENCRYPT AND DECRYPT DATA FOR THE
PURPOSE OF DATA SECURITY.
• THE ALGORITHM USES MATRIX CALCULATIONS USED IN LINEAR ALGEBRA.
• IT IS EASIER TO UNDERSTAND IF WE HAVE THE BASIC KNOWLEDGE OF MATRIX
MULTIPLICATION, MODULO CALCULATION, AND THE INVERSE CALCULATION OF
MATRICES.
• KEY MUST BE IN SQUARE MATRIX.
• ENCRYPTION: TO ENCRYPT THE TEXT USING HILL CIPHER, WE NEED TO PERFORM
THE FOLLOWING OPERATION.
• E(K, P) = (K * P) MOD 26
• WHERE K IS THE KEY MATRIX AND P IS PLAIN TEXT IN VECTOR FORM. MATRIX
MULTIPLICATION OF K AND P GENERATES THE ENCRYPTED CIPHERTEXT.
• STEPS FOR ENCRYPTION
• STEP 1: LET'S SAY OUR KEY TEXT (2X2) IS DCDF. CONVERT THIS KEY USING A
SUBSTITUTION SCHEME INTO A 2X2 KEY MATRIX AS SHOWN BELOW:

• STEP 2: NOW, WE WILL CONVERT OUR PLAIN TEXT INTO VECTOR FORM. SINCE THE
KEY MATRIX IS 2X2, THE VECTOR MUST BE 2X1 FOR MATRIX MULTIPLICATION.
(SUPPOSE THE KEY MATRIX IS 3X3, A VECTOR WILL BE A 3X1 MATRIX.)
• IN OUR CASE, PLAIN TEXT IS TEXT THAT IS FOUR LETTERS LONG WORD; THUS WE
CAN PUT IN A 2X1 VECTOR AND THEN SUBSTITUTE AS:
• STEP 3: MULTIPLY THE KEY MATRIX WITH EACH 2X1 PLAIN TEXT VECTOR, AND TAKE
THE MODULO OF RESULT (2X1 VECTORS) BY 26. THEN CONCATENATE THE RESULTS,
AND WE GET THE ENCRYPTED OR CIPHERTEXT AS RGWL.

• DECRYPTION: TO ENCRYPT THE TEXT USING HILL CIPHER, WE NEED TO PERFORM


THE FOLLOWING OPERATION.
• D(K, C) = (K-1 * C) MOD 26
• WHERE K IS THE KEY MATRIX AND C IS THE CIPHERTEXT IN VECTOR FORM. MATRIX
MULTIPLICATION OF INVERSE OF KEY MATRIX K AND CIPHERTEXT C GENERATES THE
DECRYPTED PLAIN TEXT.

You might also like