Information Security: Reber Ahmed Mohammed

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Information Security

Reber Ahmed Mohammed


LAST LECTURE
 Hill Cipher
OUTLINE LINE
 Mixed Alphabet Cipher
 Pigpen Cipher

 Tap Code Cipher


Mixed Alphabet
Cipher
 The Mixed Alphabet Cipher is another
example of a Monoalphabetic Substitution
Cipher.
 The Mixed Alphabet Cipher does not use
a number as a key, but rather a keyword
or keyphrase.
Mixed Alphabet
Cipher
Use mixed alphabet cipher to encrypt this
message “MIXED ALPHABET”.
 Key: ZEBRA
 Plaintext: MIXED ALPHABET

Plaintext M I X E D A L P H A B E T
Ciphertxet K G W A R Z J N F Z E A S
Mixed Alphabet (decryption)
 Use mixed alphabet cipher to decrypt this
cipher message “MLJGLA”.
 Key: ZEBRA
 Cipher text: MLJGLA

Cipher txet M L J G L A
Plaintext O N L I N E
Pigpen Cipher
 The Pigpen Cipher is another example of a substitution
cipher, but rather than replacing each letter with another
letter, the letters are replaced by symbols.
 It has been used by many groups. Most notoriously, it was
the cipher of choice for use by the Freemasons, and they
used it so much, that it is often referred to as the
Freemasons Cipher.
 There are many possible variation of the Pigpen Cipher,
however, we will take the standard Pigpen Cipher.
Pigpen Cipher (Encryption)
 The encryption process is fairly straightforward, replacing
each occurrence of a letter with the designated symbol.
 The symbols are assigned to the letters using the key shown
below, where the letter shown is replaced by the part of
the image in which it is located.

T
Pigpen Cipher (Decryption)
 T he decryption process is just reverse of the
the encryption process.
 Using the same key (the grid), locate the image depicted in
the ciphertext, and replace it with the letter given by that
part of the grid.
 Using Pigpen cipher method, decrypt the following message
rendered in ciphertext as:

P A R ALL
ELOGRAM
Tap
Code
The tap code, sometimes called the knock code,
is a way to encode text messages on a letter-by-
letter basis in a very simple way.
 The message is transmitted using a series of tap
sounds, hence its name.
 The tap code has been commonly used by
prisoners to communicate with each other.
Tap
The tap code is based on a Polybius square using
Code
a 5×5 grid of letters representing all the letters
of the Latin alphabet, except for K, which is
represented by C.
 Each letter is communicated by tapping two
numbers
 the first designating the row and the second
for the column
Tap
Code
For example, to specify the letter "B", one taps
once, pauses, and then taps twice.
 Or to communicate the word "water", the cipher
would be the following (the pause between
each number in a pair is smaller than the pause
between letters):

W A T E R
5, 2 1, 1 4, 4 1, 5 4, 2
····· ·· ·· ···· ···· · ····· ···· ··
• Use Mixed alphabet Cipher to decrypt this cipher text
• Cipher Massage is “DLW WE RQECTE MICFK TEXT” with key=
corner.

Use the standard Pigpen Cipher to decrypt mathematical


words.
End of Lecture
 Any Questions!

You might also like