Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

CODES AND

CRYPTOGRAPHY
MATHEMATICS AS A TOOL
LESSON 2: CRYPTOGRAPHY

 Originated from two Greek words such as KRYPTO which means hidden and
GRAPHENE means writing.
 Is a method of making and breaking of secret codes.
 Is the method that is commonly used in military, some government agency’s
transactions, business firms such as bank, insurance, etc., to secure secrecy of
the information.
 It uses two processes such as ENCRYPTION and DECRYPTION.
CRYPTOGRAPHY

 EXAMPLE
 (plain text) MATH IS FUN
 (coded form) PDWKV LV IXQ

 ENCRYPTION
 Is the process of transforming plain text into code form using a certain algorithm

 DECRYPTION
 Is the process of returning/converting back the coded message into plain text

 PLAIN TEXT = refers to the original message


 CIPHER TEXT = refers to the coded message
 KEY = refers to the strings of information that is used to reveal the encrypted message into readable form
CRYPTOGRAPHY

 Example:
 ORIGINAL: ABCDEFGHIJKLMNOPQRSTUVWXYZ
 MAPS TO: DEFGHIJKLMNOPQRSTUVWXYZABC

 Note: Every letter of the English alphabet should be paired to


at least 1 character of the coded alphabet.
CRYPTOGRAPHY

 SIMPLE METHODS OF CRYPTOGRAPHY


SHIFT CIPHER (CEASAR CIPHER) = is the simple type of substitution
cipher. It uses shift in forming the key of cryptography. The cipher text is
obtained from taking an equivalent of a single letter of the alphabet to
another letter by doing a uniform number of shifts either left or right. Each
letter of the English alphabet should be matched to one letter of the cipher
alphabet.
CRYPTOGRAPHY

 USING A SHIFT OF 3 TO THE LEFT (the commonly used number of shifts)


A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K LMNO P Q R S T U VWX Y Z A B C
 USING A SHIFT OF 5 TO THE RIGHT
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
CRYPTOGRAPHY

 USING A MODULO OPERATOR


The sender of the message uses the key K to encrypt and to decrypt the secret
message. The key K may have any integer from 0 to 25 and this will be shared to
the person/s who will be receiving the secret message.
 TO ENCYPT THE MESSAGE:
 1. Express the letter of the alphabet into an integer from 0 to 25, that
matches its order, for example A = 0, B = 1, C = 3, …., then label them as C.
 2. Calculate Y = (C + K) mod 26, for every letter of the message.
 3. Covert the number Y into a letter following the order of the letter of the
alphabet.
CRYPTOGRAPHY
END OF LESSON 2

You might also like