SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Cryptography:
A Brief
Overview
•Abhishek Gautam
•Ashim Gurung
•Bikram Koirala
• Monil Adhikari
Agenda
Classical Cryptography coverage(esp. Substitution
Ciphers):
Mono-alphabetic Substitution Ciphers.
Homophonic Substitution Ciphers.
Poly-graphic Substitution Ciphers.
Poly-alphabetic Substitution Ciphers.
Substitution Ciphers
• Introduction
Substitution Ciphers are the ciphers where a alphabet is
replaced by another different ciphers. This ciphers mainly
uses the alphabets to encrypt messages for confidentiality in
communication.
Mono-alphabetic Ciphers
• The Mono-alphabetic Substitution cipher
is where each character in the plaintext is
replaced by a corresponding one from a
cipher alphabet. There are 3 types of
Mono-alphabetic Ciphers.
– 1) Caesar Ciphers
– 2) Affine Ciphers
– 3) Atbash Ciphers
Caesar Ciphers
• This is a video
which briefly
describes about
the working of a
Caesar ciphers.

(Youtube,2012)
Homophonic Ciphers
• A homophonic substitution cipher maps each
plaintext letter of a message to one or more
cipher text symbols. Homophonic ciphers hide
letter frequencies of plaintext messages which
are mapped to one or more cipher text units
called homophones.
• This method is based on the mono alphabetic
substitution. The original text is not only
encrypted by one but is also replaced with
multiple secret symbols.
Homophonic Ciphers(Contd.)
•

•

A Homophonic substitution cipher is like a simple substitution cryptosystem, in which a single character of plaintext can map to one of several
characters of cipher text. A plaintext message M=m1m2... is enciphered
as C=c1c2..., where each ci is picked at random from the set of
homophones f(mi).
Letter
Homophones
A
17 19 34 41 56 60 67 83
I
08 22 53 65 88 90
L
03 44 76
N
02 09 15 27 32 40 59
O
01 11 23 28 42 54 70 80
P
33 91
T
05 10 20 29 45 58 64 78 99
One possible encipherment of the message is:
M=P L A I N P I L O T
C = 91 44 56 65 59 33 08 76 28 78
Poly-graphic Ciphers
• “In a polygraphic substitution cipher plaintext letters
are substituted in large groups instead of
substituting letters individually”.(wordIQ, n.d)
• The first advantage is that the frequency distribution
is much flatter than that of individual letter.
• Second , the large numbers of symbols requires
correspondingly more cipher text to productively
analyze letter frequencies.
Playfair Ciphers
• The playfair cipher encrypts pair of
letters(diagraph), instead of single letters.
• It was invented in 1854 by Charles Wheatstone
for telegraph secrecy.
• It is the earliest practical Polygraphic
Substitution ciphers.
• The cipher used a 5 by five table containing a
key word.
Poly-alphabetic Ciphers
• In poly-alphabetic cipher, each plaintext
character may be replaced by more than one
character
• Since there are only 26 alphabets this process
will require using a different representation than
the alphabets
• Alphabets „A‟ through „Z‟ are replaced by 00,
01, 02, …, 25
• We need two digits in this representation since
we need to know how to reverse the process at
the decryption side (Babylon,1997).
Vignere Ciphers
• The most common method used as a
type of Poly-Alphabetic Cipher is
Vigenère cipher
• Vigenère cipher starts with a 26 x 26
matrix of alphabets in sequence. First
row starts with „A‟, second row starts
with „B‟, etc.
Vigenere(Contd.)
• E.g., Message = SEE ME
IN MALL
• Take keyword as
INFOSEC
• Vigenère cipher works as
follows:
SEEME I NMALL
I NFOSEC I NFO
------------------------------------A RJ AWMPUNQZ
Conclusion
• We have considered mainly the key
aspects of Substitution Ciphers and their
workings as well as their algorithms.
References
•

Brown, 1996, Introduction to Cryptography, [online], Available at:
http://williamstallings.com/Extras/Security-Notes/lectures/classical.html [Accessed at 1st
Jan 2012]

•

All Science Projects, 2011, [online], Available at: http://www.all-science-fairprojects.com/science_fair_projects_encyclopedia/Caesar_cipher [Accessed at 1 Jan 2012]

•

Chargrill, 2006,PlayFair Cipher ,[online] http://www.perlmonks.org/?node_id=554404
accessed on Jan 11

•

WordIQ, n.d, Substitution cipher- Definition, [online]
http://www.wordiq.com/definition/Substitution_cipher#Polygraphic_substitution accessed on
Jan 11

•

University of Adelaide,2012,[online],Available at :
https://www.eleceng.adelaide.edu.au/personal/dabbott/wiki/index.php/Cipher_Crossoff_List#Homophonic_Substitution_Ciphers,[Accessed on 10 Jan 2012]

•

Mrgeorged, 2009. Top Gear The Stig revealed Full. [video online],Available
at:<http://www.youtube.com/watch#!v=eTapK5dRaw4>[Accessed 23 June 2009].
Superficial Study on the Concept of Cryptography

Weitere ähnliche Inhalte

Ähnlich wie Superficial Study on the Concept of Cryptography

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptxChethanKrishna14
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.nagwaAboElenein
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programmingShaishavShah8
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryptionRashmi Burugupalli
 
IS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfIS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfRameezRaja32147
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
 
Cryptography CET 2.pptx
Cryptography CET 2.pptxCryptography CET 2.pptx
Cryptography CET 2.pptxjhonmacchony
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
 
Introduction to cryptography part2-final
Introduction to cryptography  part2-finalIntroduction to cryptography  part2-final
Introduction to cryptography part2-finalTaymoor Nazmy
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptographyG Prachi
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdfDevangShukla10
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher SystemAsad Ali
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniquesbabak danyal
 

Ähnlich wie Superficial Study on the Concept of Cryptography (20)

EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
IS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfIS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdf
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
Cryptography CET 2.pptx
Cryptography CET 2.pptxCryptography CET 2.pptx
Cryptography CET 2.pptx
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
UNIT 2.ppt
UNIT 2.pptUNIT 2.ppt
UNIT 2.ppt
 
Introduction to cryptography part2-final
Introduction to cryptography  part2-finalIntroduction to cryptography  part2-final
Introduction to cryptography part2-final
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 

Mehr von Monil Adhikari

Personal Network Packet Sniffer
Personal Network Packet SnifferPersonal Network Packet Sniffer
Personal Network Packet SnifferMonil Adhikari
 
FOSS ka Kura, My Understanding About Open Source Movement
FOSS ka Kura, My Understanding About Open Source MovementFOSS ka Kura, My Understanding About Open Source Movement
FOSS ka Kura, My Understanding About Open Source MovementMonil Adhikari
 
Mozilla Nepal Community Orientation Seminar
Mozilla Nepal Community Orientation SeminarMozilla Nepal Community Orientation Seminar
Mozilla Nepal Community Orientation SeminarMonil Adhikari
 
Islington Open Source Community Orientation
Islington Open Source Community OrientationIslington Open Source Community Orientation
Islington Open Source Community OrientationMonil Adhikari
 
Arduino computing and networking 2nd year
Arduino computing and networking 2nd yearArduino computing and networking 2nd year
Arduino computing and networking 2nd yearMonil Adhikari
 
Islington open source community
Islington open source communityIslington open source community
Islington open source communityMonil Adhikari
 
Application for internship
Application for internshipApplication for internship
Application for internshipMonil Adhikari
 

Mehr von Monil Adhikari (7)

Personal Network Packet Sniffer
Personal Network Packet SnifferPersonal Network Packet Sniffer
Personal Network Packet Sniffer
 
FOSS ka Kura, My Understanding About Open Source Movement
FOSS ka Kura, My Understanding About Open Source MovementFOSS ka Kura, My Understanding About Open Source Movement
FOSS ka Kura, My Understanding About Open Source Movement
 
Mozilla Nepal Community Orientation Seminar
Mozilla Nepal Community Orientation SeminarMozilla Nepal Community Orientation Seminar
Mozilla Nepal Community Orientation Seminar
 
Islington Open Source Community Orientation
Islington Open Source Community OrientationIslington Open Source Community Orientation
Islington Open Source Community Orientation
 
Arduino computing and networking 2nd year
Arduino computing and networking 2nd yearArduino computing and networking 2nd year
Arduino computing and networking 2nd year
 
Islington open source community
Islington open source communityIslington open source community
Islington open source community
 
Application for internship
Application for internshipApplication for internship
Application for internship
 

Kürzlich hochgeladen

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Kürzlich hochgeladen (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Superficial Study on the Concept of Cryptography

  • 1. Cryptography: A Brief Overview •Abhishek Gautam •Ashim Gurung •Bikram Koirala • Monil Adhikari
  • 2. Agenda Classical Cryptography coverage(esp. Substitution Ciphers): Mono-alphabetic Substitution Ciphers. Homophonic Substitution Ciphers. Poly-graphic Substitution Ciphers. Poly-alphabetic Substitution Ciphers.
  • 3. Substitution Ciphers • Introduction Substitution Ciphers are the ciphers where a alphabet is replaced by another different ciphers. This ciphers mainly uses the alphabets to encrypt messages for confidentiality in communication.
  • 4. Mono-alphabetic Ciphers • The Mono-alphabetic Substitution cipher is where each character in the plaintext is replaced by a corresponding one from a cipher alphabet. There are 3 types of Mono-alphabetic Ciphers. – 1) Caesar Ciphers – 2) Affine Ciphers – 3) Atbash Ciphers
  • 5. Caesar Ciphers • This is a video which briefly describes about the working of a Caesar ciphers. (Youtube,2012)
  • 6. Homophonic Ciphers • A homophonic substitution cipher maps each plaintext letter of a message to one or more cipher text symbols. Homophonic ciphers hide letter frequencies of plaintext messages which are mapped to one or more cipher text units called homophones. • This method is based on the mono alphabetic substitution. The original text is not only encrypted by one but is also replaced with multiple secret symbols.
  • 7. Homophonic Ciphers(Contd.) • • A Homophonic substitution cipher is like a simple substitution cryptosystem, in which a single character of plaintext can map to one of several characters of cipher text. A plaintext message M=m1m2... is enciphered as C=c1c2..., where each ci is picked at random from the set of homophones f(mi). Letter Homophones A 17 19 34 41 56 60 67 83 I 08 22 53 65 88 90 L 03 44 76 N 02 09 15 27 32 40 59 O 01 11 23 28 42 54 70 80 P 33 91 T 05 10 20 29 45 58 64 78 99 One possible encipherment of the message is: M=P L A I N P I L O T C = 91 44 56 65 59 33 08 76 28 78
  • 8. Poly-graphic Ciphers • “In a polygraphic substitution cipher plaintext letters are substituted in large groups instead of substituting letters individually”.(wordIQ, n.d) • The first advantage is that the frequency distribution is much flatter than that of individual letter. • Second , the large numbers of symbols requires correspondingly more cipher text to productively analyze letter frequencies.
  • 9. Playfair Ciphers • The playfair cipher encrypts pair of letters(diagraph), instead of single letters. • It was invented in 1854 by Charles Wheatstone for telegraph secrecy. • It is the earliest practical Polygraphic Substitution ciphers. • The cipher used a 5 by five table containing a key word.
  • 10. Poly-alphabetic Ciphers • In poly-alphabetic cipher, each plaintext character may be replaced by more than one character • Since there are only 26 alphabets this process will require using a different representation than the alphabets • Alphabets „A‟ through „Z‟ are replaced by 00, 01, 02, …, 25 • We need two digits in this representation since we need to know how to reverse the process at the decryption side (Babylon,1997).
  • 11. Vignere Ciphers • The most common method used as a type of Poly-Alphabetic Cipher is Vigenère cipher • Vigenère cipher starts with a 26 x 26 matrix of alphabets in sequence. First row starts with „A‟, second row starts with „B‟, etc.
  • 12. Vigenere(Contd.) • E.g., Message = SEE ME IN MALL • Take keyword as INFOSEC • Vigenère cipher works as follows: SEEME I NMALL I NFOSEC I NFO ------------------------------------A RJ AWMPUNQZ
  • 13. Conclusion • We have considered mainly the key aspects of Substitution Ciphers and their workings as well as their algorithms.
  • 14. References • Brown, 1996, Introduction to Cryptography, [online], Available at: http://williamstallings.com/Extras/Security-Notes/lectures/classical.html [Accessed at 1st Jan 2012] • All Science Projects, 2011, [online], Available at: http://www.all-science-fairprojects.com/science_fair_projects_encyclopedia/Caesar_cipher [Accessed at 1 Jan 2012] • Chargrill, 2006,PlayFair Cipher ,[online] http://www.perlmonks.org/?node_id=554404 accessed on Jan 11 • WordIQ, n.d, Substitution cipher- Definition, [online] http://www.wordiq.com/definition/Substitution_cipher#Polygraphic_substitution accessed on Jan 11 • University of Adelaide,2012,[online],Available at : https://www.eleceng.adelaide.edu.au/personal/dabbott/wiki/index.php/Cipher_Crossoff_List#Homophonic_Substitution_Ciphers,[Accessed on 10 Jan 2012] • Mrgeorged, 2009. Top Gear The Stig revealed Full. [video online],Available at:<http://www.youtube.com/watch#!v=eTapK5dRaw4>[Accessed 23 June 2009].