Professional Documents
Culture Documents
Transposition Techniques (Class-L7)
Transposition Techniques (Class-L7)
Transposition Techniques
Techniques
(Class-L7)
(Class-L7)
Lecture Slides By:
Monalisa Panigrahi
Asst. Professor
LPU
Transposition Ciphers
• now consider classical transposition
or permutation ciphers
• these hide the message by
rearranging the letter order without
altering the actual letters used
• can recognise these since have the
same frequency distribution as the
original text
Types of Transposition
Ciphers Techniques
• Rail Fence Technique
2. Cipher Text :
HlovroeelEeyn
Example:
H e l l
o E v e
r y o n
e
Example
• Decide a random order : 2 4 1 3
• Read the text in the order of these
columns
• Cipher Text : eEylenHorelvo
Simple Columnar
Transposition Techniques
with multiple rounds
• Given Text – Hello Everyone
• After Round 1, Cipher text is
eEylenHorelvo
• Perform Step 1 to 3 as many times as
desired
Example
• Round 2: e E y l
• eEylenHorelvo
e n H o
r e l v
o
– Algorithms
– Key (used for encryption and
decryption)
Encryption and Decryption… Cont
– Introduction
2 4
A = g^x mod n B = g^y mod n
3 5
A B
6 7
K1=B^x modn K2=A^y modn
» K2 = Ay mod n
» What is A? from step 2 we have;
» A = gx mod n
» There for, substitute this value of A in step 7 we have
following equation
» K2 = (gx)y mod n = gxy mod n
Alice fill
up Bob fills
Another up
one-third Another
one-third
Of the
One-Third of the key(g) is public g Of the
key using g
her key using
secret his
random secret
number Alice sends the Bob sends the random
key to Alice y number
x key to Bob
Alice g
g Bob
Completes Completes
The key The key
By adding By adding
The last x y
The last
Part
Received
y x Part
Both keys are the same because the order of Received
From g g From
Bob Completion (x First or y First) does not matter
Alice
Diffie-Hellman Key Exchange / Agreement Algorithm…
Cont
Fig. 3.24
Fig. 3.25
Diffie-Hellman Key Exchange / Agreement Algorithm…
Cont
Fig. 3.27
Fig. 3.28
Asymmetric Key Operation
Fig. 3.30
Key Range and Key Size
• The cryptanalyst is armed with the
following information
– The encryption/ decryption algorithm
– The encrypted message
– Knowledge about the key size
• Keys – challenge for the attackers
• Attackers can develop programming to
solve the keys – depend to size of key
Key Range and Key Size… Cont
Key Range and Key Size… Cont