The document discusses several cryptographic techniques including polyalphabetic substitution ciphers like the Vigenere cipher and one-time pad cipher. The one-time pad cipher uses a private key that is randomly generated and only used once to encrypt a message. Transposition techniques like rail fence and columnar transposition are also covered, rearranging the order of letters in the plaintext. Finally, steganography is introduced as a method of covert communication by hiding messages in various file formats like images, text, audio and video rather than encrypting them.
The document discusses several cryptographic techniques including polyalphabetic substitution ciphers like the Vigenere cipher and one-time pad cipher. The one-time pad cipher uses a private key that is randomly generated and only used once to encrypt a message. Transposition techniques like rail fence and columnar transposition are also covered, rearranging the order of letters in the plaintext. Finally, steganography is introduced as a method of covert communication by hiding messages in various file formats like images, text, audio and video rather than encrypting them.
The document discusses several cryptographic techniques including polyalphabetic substitution ciphers like the Vigenere cipher and one-time pad cipher. The one-time pad cipher uses a private key that is randomly generated and only used once to encrypt a message. Transposition techniques like rail fence and columnar transposition are also covered, rearranging the order of letters in the plaintext. Finally, steganography is introduced as a method of covert communication by hiding messages in various file formats like images, text, audio and video rather than encrypting them.
monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message. • The general name for this approach is polyalphabetic substitution cipher. • Polyalphabetic substitution ciphers are 1. Vigenere cipher 2. One-time pad cipher VIGENERE CIPHER One Time Pad • In cryptography, a one-time pad is a system in which a randomly generated private key is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key. • One-time pad cipher is a type of Vignere cipher which includes the following features − • It is an unbreakable cipher. • The key is exactly same as the length of message which is encrypted. • The key is made up of random symbols. • As the name suggests, key is used one time only and never used again for any other message to be encrypted. One Time Pad contd.. • Due to this, encrypted message will be vulnerable to attack for a cryptanalyst. The key used for a one-time pad cipher is called pad, as it is printed on pads of paper. Encryption • To encrypt a letter, a user needs to write a key underneath the plaintext. • The plaintext letter is placed on the top and the key letter on the left. • The cross section achieved between two letters is the plain text. • It is described in the example in the next slide. One Time Pad contd.. One Time Pad contd.. Decryption • To decrypt a letter, user takes the key letter on the left and finds cipher text letter in that row. • The plain text letter is placed at the top of the column where the user can find the cipher text letter. TRANSPOSTION TECHNIQUES
• Transposition Cipher is a cryptographic
algorithm where the order of alphabets in the plaintext is rearranged to form a cipher text. • In this process, the actual plain text alphabets are not included. • We are considering two techniques 1. Rail-Fence Technique 2. Simple columnar transposition techniques RAIL FENCE • Rail-Fence is the simple Transposition technique that involves writing plain text as a sequence of diagonals and then reading it row by row to produce the ciphertext.
• Now read the plain text by row-wise, i.e. croaerdeoprtbig.
• So, here the plain text is a corporate bridge, and ciphertext is croaerdeoprtbig Simple columnar transposition techniques • The simple columnar transposition technique can be categorized into two parts – Basic technique and multiple rounds. • Simples columnar transposition technique – basic technique. • The simple columnar transposition technique simply arranges the plain text in a sequence of rows of a rectangle and reads it in a columnar manner. ALGORITHM • Step 1: Write all the characters of plain text message row by row in a rectangle of predefined size. • Step 2: Read the message in a columnar manner, i.e. column by column. • Note: For reading the message, it needs not to be in the order of columns. It can happen in any random sequence. • Step 3: The resultant message is ciphertext. Example • Let’s assume that Plain text is a corporate bridge, and we need to calculate the cipher text using a simple columnar transposition technique. • Let’s take 6 columns and arrange the plain text in a row-wise manner. • The Table is taken as in the next slide. Example contd.. COLUMN-1 COLUMN-2 COLUMN-3 COLUMN-4 COLUMN-5 COLUMN-6
C O R P O R
A T E B R I
D G E
Decide the column order for reading the message – let’s
assume 1,3,5,2,4,6 is an order. Now read the message in a columnar manner using the decided order. – cadreeorotgpbri cadreeorotgpbri is a ciphertext. Steganography
• The purpose of steganography is to conceal
and deceive. • It is a form of covert communication and can involve the use of any medium to hide messages. • It's not a form of cryptography, because it doesn't involve scrambling data or using a key. • Instead, it is a form of data hiding and can be executed in clever ways. Types of Steganography techniques • Depending on the nature of the cover object(actual object in which secret data is embedded), steganography can be divided into five types: • Text Steganography. • Image Steganography. • Video Steganography. • Audio Steganography. • Network Steganography.