Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

POLYALPHABETIC CIPHER

• Another way to improve on the simple


monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds
through the plaintext message.
• The general name for this approach is
polyalphabetic substitution cipher.
• Polyalphabetic substitution ciphers are
1. Vigenere cipher
2. One-time pad cipher
VIGENERE CIPHER
One Time Pad
• In cryptography, a one-time pad is a system in which
a randomly generated private key is used only once
to encrypt a message that is then decrypted by the
receiver using a matching one-time pad and key.
• One-time pad cipher is a type of Vignere cipher which
includes the following features −
• It is an unbreakable cipher.
• The key is exactly same as the length of message which
is encrypted.
• The key is made up of random symbols.
• As the name suggests, key is used one time only and
never used again for any other message to be
encrypted.
One Time Pad contd..
• Due to this, encrypted message will be vulnerable to
attack for a cryptanalyst. The key used for a one-time
pad cipher is called pad, as it is printed on pads of
paper.
Encryption
• To encrypt a letter, a user needs to write a key
underneath the plaintext.
• The plaintext letter is placed on the top and the key
letter on the left.
• The cross section achieved between two letters is the
plain text.
• It is described in the example in the next slide.
One Time Pad contd..
One Time Pad contd..
Decryption
• To decrypt a letter, user takes the key letter on
the left and finds cipher text letter in that row.
• The plain text letter is placed at the top of the
column where the user can find the cipher
text letter.
TRANSPOSTION TECHNIQUES

• Transposition Cipher is a cryptographic


algorithm where the order of alphabets in
the plaintext is rearranged to form a cipher
text.
• In this process, the actual plain text alphabets
are not included.
• We are considering two techniques
1. Rail-Fence Technique
2. Simple columnar transposition techniques
RAIL FENCE
• Rail-Fence is the simple Transposition technique that involves writing
plain text as a sequence of diagonals and then reading it row by row
to produce the ciphertext.

• Now read the plain text by row-wise, i.e. croaerdeoprtbig.


• So, here the plain text is a corporate bridge, and ciphertext is
croaerdeoprtbig
Simple columnar transposition techniques
• The simple columnar transposition technique
can be categorized into two parts – Basic
technique and multiple rounds.
• Simples columnar transposition technique –
basic technique.
• The simple columnar transposition technique
simply arranges the plain text in a sequence of
rows of a rectangle and reads it in a columnar
manner.
ALGORITHM
• Step 1: Write all the characters of plain text
message row by row in a rectangle of
predefined size.
• Step 2: Read the message in a columnar
manner, i.e. column by column.
• Note: For reading the message, it needs not to
be in the order of columns. It can happen in
any random sequence.
• Step 3: The resultant message is ciphertext.
Example
• Let’s assume that Plain text is a corporate
bridge, and we need to calculate the cipher
text using a simple columnar transposition
technique.
• Let’s take 6 columns and arrange the plain text
in a row-wise manner.
• The Table is taken as in the next slide.
Example contd..
COLUMN-1 COLUMN-2 COLUMN-3 COLUMN-4 COLUMN-5 COLUMN-6

C O R P O R

A T E B R I

D G E

Decide the column order for reading the message – let’s


assume 1,3,5,2,4,6 is an order.
Now read the message in a columnar manner using the
decided order. – cadreeorotgpbri
cadreeorotgpbri is a ciphertext.
Steganography

• The purpose of steganography is to conceal


and deceive.
• It is a form of covert communication and can
involve the use of any medium to hide
messages.
• It's not a form of cryptography, because it
doesn't involve scrambling data or using a
key.
• Instead, it is a form of data hiding and can be
executed in clever ways.
Types of Steganography techniques
• Depending on the nature of the cover
object(actual object in which secret data is
embedded), steganography can be divided
into five types:
• Text Steganography.
• Image Steganography.
• Video Steganography.
• Audio Steganography.
• Network Steganography.

You might also like