SlideShare ist ein Scribd-Unternehmen logo
1 von 18
CRYPTOGRAPHY
Sowmya K
Assistant Professor
Dept.of Mathematics
St.Mary’s College,Thrissur.
 Cryptography : It is the study of methods of sending
messages in disguised form .
 Plain text: The message we want to send.
 Ciphertext: The message in disguised form.
 Enciphering /encryption: The process of converting a plain
text to a ciphertext.
 Deciphering /decryption: The process of converting a
ciphertext to a plaintext.
 Cryptanalysis: It is the science of breaking secret messages.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Terminology
 The plaintext and ciphertext are broken up into message
units.
 A message unit might be a single letter,a pair of
letters(digraph),a triple of letters (trigraph) and so on.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Substitution Ciphers
• In this method,we substitute a letter of the alphabet for each letter
of the plaintext.
• Suppose we are using 26 letter alphabet A-Z with numerical
equivalents 0-25.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Around 50 B C the Roman emperor Julius Caesar sent encoded
messages to his general Marcus T Cicero during the Gallic Wars, using a
substitution cipher based on modular arithmetic.
A Ceasar cipher shifts each letter by three places to the right, described
by the congruences C = P +3 (mod 26).
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Shift Ciphers
The shift enciphering transformation is
𝐶 ≡ 𝑃 + 𝑘 𝑚𝑜𝑑 26
A shift cipher is a substitution cipher.
A cryptanalyst can break the code by using the
universally available knowledge of the relative frequency
distribution of letters in ordinary most frequently occurring
letter in the plaintext is “E”. The next three letters are “T”,
”A” and “O”.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Q.No.5: Decipher the following ciphertext using shift cipher
“FQOCUDEM”.Suppose the most frequently occurring letter
in the English language is “E” and “U” is the ,most
frequently occurring character in the ciphertext.
Solution
The deciphering transformation is 𝑃≡𝐶−16 (𝑚𝑜𝑑 26)
The shift takes “E”=4 to “U”=20.
i.e., 20 ≡ 4+b mod 26
i.e.,b=16
Converting to numerical equivalents
5 16 14 2 20 3 4 12
Using the deciphering transformation ,
15 0 24 12 4 13 14 22
The plaintext is “PAYMENOW”.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Affine Ciphers
An Affine enciphering transformation is given by
𝐶 ≡ 𝑎𝑃 + 𝑘 𝑚𝑜𝑑 26
The deciphering transformation is
𝑃 ≡ 𝑎′ 𝐶 + 𝑏′ (𝑚𝑜𝑑 26) where
𝑎′= 𝑎−1, 𝑏′ = −𝑎−1 𝑏
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Q.No.6:Encipher the message “PAY ME NOW”using the
affine transformation on 26 letter alphabet with a=7
,b=12.
Solution
The enciphering transformation is 𝐶≡7𝑃+12 (𝑚𝑜𝑑 26)
Converting to numerical equivalents
15 0 24 12 4 13 14 22
7P: 105 0 168 84 28 91 98 154
7P+12: 117 12 180 96 40 103 110 166
Mod 26: 13 12 24 8 14 25 6 10
The ciphertext is “NMYSOZGK”
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Q.No.7:In the 27-letter alphabet (withblank=26),use the
affine enciphering transformation with key a=13,b=9 to
encipher the message “THRPXDH”
SOLUTION:
The deciphering transformation is P≡ 𝑎′ 𝐶 + 𝑏′(𝑚𝑜𝑑 𝑁)
,where 𝑎′=𝑎−1 and 𝑏′= −𝑎−1b.
27 = 2 x 13 +1
i.e 1= 27 -( 2 x 13)
1=-2 x13
ie13−1=-2=25 (mod 27)
𝑎′=25 and 𝑏′=-25x9=18
The numerical equivalents are 19 7 17 15 23 3 7
Corresponding P are 7 4 11 15 26 12 4
The plaintext is “HELP ME”
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
The message units contain two-letter blocks called the
digraphs.
If the plaintext has an odd number of letters, add an extra
letter may be a blank or “X” or “Q”.
The numerical equivalent of each digraph is 𝑥𝑁+𝑦, where
x is the numerical equivalent of the first letter, y is the
numerical equivalent of the second letter and N is the
number of letters in the alphabet.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Q.No.8:Suppose we are working in a 26-letter alphabet
and using the digraph enciphering transformation 𝐶 ≡
159𝑃 + 580 𝑚𝑜𝑑 676. Encipher “NO” and decipher
“NV”.
Solution:
The numerical equivalent of “NO” is
xN + y = 26 x 13 + 14 = 352
𝐶 ≡ (159 𝑥 352) + 580 (𝑚𝑜𝑑 676)
≡ 440 (mod 676)
i.e. c = 440.
𝑐 = 𝑥′ 𝑁 + 𝑦′ 440 = 26 𝑥′ + 𝑦′
=26 x 16+24
i.e.,𝑥′ = 16 𝑦′=24.
The ciphertext is “QY”.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
Q.No.9:Decipher the ciphertext “PWULPZTQAWHF” which was
encrypted using the affine map on digraphs in the 26-letter alphabet.A
frequency analysis shows that the most frequently occurring digraphs
in the English language are “TH” and “HE”in that order and “IX” and
“TQ”in that order.
Solution:
The enciphering key is P≡ 𝑎′
𝐶 + 𝑏′
(mod 262
)
To find 𝑎′
, 𝑏′
501≡ 231 𝑎′+ 𝑏′ (mod 676)
186≡ 510 𝑎′ + 𝑏′(mod 676)
subtracting,
-279𝑎′ ≡ 315 (𝑚𝑜𝑑 676)
𝑎′≡(−279)−1
315 (mod 676)
𝑎′ ≡ − 63 x 315 (mod 676)
𝑎′ ≡ 435 (mod 676)
𝑏′ =64 (mod 676)
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
The plaintext is “FOUNDTHEGOLD”
Cryptography, Sowmya K, St.Mary’s College, Thrissur.
REFERENCE
Neal Koblitz, A Course in Number Theory and
Cryptography, Springer Verlag, New York,1987.
Cryptography, Sowmya K, St.Mary’s College, Thrissur.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Discrete Math in Real Life
Discrete Math in Real LifeDiscrete Math in Real Life
Discrete Math in Real Lifesulaiman hridoy
 
Matrices And Application Of Matrices
Matrices And Application Of MatricesMatrices And Application Of Matrices
Matrices And Application Of Matricesmailrenuka
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra Sami Ullah
 
Intro & Applications of Discrete Math
Intro & Applications of Discrete MathIntro & Applications of Discrete Math
Intro & Applications of Discrete MathBilal Khan
 
Applications of matrices in real life
Applications of matrices in real lifeApplications of matrices in real life
Applications of matrices in real lifeSuhaibFaiz
 
Application of discrete math in real life
Application of discrete math in real lifeApplication of discrete math in real life
Application of discrete math in real lifeMdArifHossain30
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Applications of Linear Algebra in Computer Sciences
Applications of Linear Algebra in Computer SciencesApplications of Linear Algebra in Computer Sciences
Applications of Linear Algebra in Computer SciencesAmir Sharif Chishti
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 

Was ist angesagt? (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Discrete Math in Real Life
Discrete Math in Real LifeDiscrete Math in Real Life
Discrete Math in Real Life
 
Matrices And Application Of Matrices
Matrices And Application Of MatricesMatrices And Application Of Matrices
Matrices And Application Of Matrices
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
 
Cryptography
CryptographyCryptography
Cryptography
 
DES
DESDES
DES
 
Ch03
Ch03Ch03
Ch03
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Intro & Applications of Discrete Math
Intro & Applications of Discrete MathIntro & Applications of Discrete Math
Intro & Applications of Discrete Math
 
Applications of matrices in real life
Applications of matrices in real lifeApplications of matrices in real life
Applications of matrices in real life
 
Application of discrete math in real life
Application of discrete math in real lifeApplication of discrete math in real life
Application of discrete math in real life
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Rc4
Rc4Rc4
Rc4
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Applications of Linear Algebra in Computer Sciences
Applications of Linear Algebra in Computer SciencesApplications of Linear Algebra in Computer Sciences
Applications of Linear Algebra in Computer Sciences
 
Hamilton path and euler path
Hamilton path and euler pathHamilton path and euler path
Hamilton path and euler path
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography
CryptographyCryptography
Cryptography
 

Ähnlich wie Cryptography Techniques Explained by Sowmya K

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution CipherSHUBHA CHATURVEDI
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1SHUBHA CHATURVEDI
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques parves kamal
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & CryptographyDr. Himanshu Gupta
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxGauriBornare1
 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2SHUBHA CHATURVEDI
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptxRavikumarVadana
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptxMahmoodTareq3
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...ijtsrd
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdfMeera357768
 

Ähnlich wie Cryptography Techniques Explained by Sowmya K (13)

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptx
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf
 

Mehr von St Mary's College,Thrissur,Kerala

Microbiology:Induction Course-Introduction to Medical Microbiology
Microbiology:Induction Course-Introduction to Medical MicrobiologyMicrobiology:Induction Course-Introduction to Medical Microbiology
Microbiology:Induction Course-Introduction to Medical MicrobiologySt Mary's College,Thrissur,Kerala
 

Mehr von St Mary's College,Thrissur,Kerala (20)

Creative writing and literature
Creative writing and literature Creative writing and literature
Creative writing and literature
 
Magnetic Tape
Magnetic TapeMagnetic Tape
Magnetic Tape
 
Online Data Storage
Online Data StorageOnline Data Storage
Online Data Storage
 
Mathematics:Arithmetical Functions
Mathematics:Arithmetical FunctionsMathematics:Arithmetical Functions
Mathematics:Arithmetical Functions
 
Physical education :Yoga For Stress Relief
Physical education :Yoga For Stress ReliefPhysical education :Yoga For Stress Relief
Physical education :Yoga For Stress Relief
 
Psychology:PAIN: Types, Theories and Assessment of pain
Psychology:PAIN: Types, Theories and  Assessment of pain Psychology:PAIN: Types, Theories and  Assessment of pain
Psychology:PAIN: Types, Theories and Assessment of pain
 
Economics:Functions
Economics:FunctionsEconomics:Functions
Economics:Functions
 
Mathematics:H-Complexity
Mathematics:H-ComplexityMathematics:H-Complexity
Mathematics:H-Complexity
 
Statistics:Probability Theory
Statistics:Probability TheoryStatistics:Probability Theory
Statistics:Probability Theory
 
Statistics:Fundamentals Of Statistics
Statistics:Fundamentals Of StatisticsStatistics:Fundamentals Of Statistics
Statistics:Fundamentals Of Statistics
 
Economics:Public Revenue
Economics:Public RevenueEconomics:Public Revenue
Economics:Public Revenue
 
Economics:Public Debt
Economics:Public  DebtEconomics:Public  Debt
Economics:Public Debt
 
Economics:Poverty-perspectives And Dimensions
Economics:Poverty-perspectives And DimensionsEconomics:Poverty-perspectives And Dimensions
Economics:Poverty-perspectives And Dimensions
 
Economics:Economic Integration
Economics:Economic IntegrationEconomics:Economic Integration
Economics:Economic Integration
 
Economics:Enviornmental Pollution
Economics:Enviornmental Pollution Economics:Enviornmental Pollution
Economics:Enviornmental Pollution
 
Computer Science:JavaScript
Computer Science:JavaScript Computer Science:JavaScript
Computer Science:JavaScript
 
Computer Science:Sql Set Operation
Computer Science:Sql Set OperationComputer Science:Sql Set Operation
Computer Science:Sql Set Operation
 
Computer Science:Java jdbc
Computer Science:Java jdbcComputer Science:Java jdbc
Computer Science:Java jdbc
 
Microbiology:General Principles of Food Preservation
Microbiology:General Principles of Food PreservationMicrobiology:General Principles of Food Preservation
Microbiology:General Principles of Food Preservation
 
Microbiology:Induction Course-Introduction to Medical Microbiology
Microbiology:Induction Course-Introduction to Medical MicrobiologyMicrobiology:Induction Course-Introduction to Medical Microbiology
Microbiology:Induction Course-Introduction to Medical Microbiology
 

Kürzlich hochgeladen

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Kürzlich hochgeladen (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Cryptography Techniques Explained by Sowmya K

  • 1. CRYPTOGRAPHY Sowmya K Assistant Professor Dept.of Mathematics St.Mary’s College,Thrissur.
  • 2.  Cryptography : It is the study of methods of sending messages in disguised form .  Plain text: The message we want to send.  Ciphertext: The message in disguised form.  Enciphering /encryption: The process of converting a plain text to a ciphertext.  Deciphering /decryption: The process of converting a ciphertext to a plaintext.  Cryptanalysis: It is the science of breaking secret messages. Cryptography, Sowmya K, St.Mary’s College, Thrissur. Terminology
  • 3.  The plaintext and ciphertext are broken up into message units.  A message unit might be a single letter,a pair of letters(digraph),a triple of letters (trigraph) and so on. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 4. Substitution Ciphers • In this method,we substitute a letter of the alphabet for each letter of the plaintext. • Suppose we are using 26 letter alphabet A-Z with numerical equivalents 0-25. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 5. Around 50 B C the Roman emperor Julius Caesar sent encoded messages to his general Marcus T Cicero during the Gallic Wars, using a substitution cipher based on modular arithmetic. A Ceasar cipher shifts each letter by three places to the right, described by the congruences C = P +3 (mod 26). Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 6. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 7. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 8. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 9. Shift Ciphers The shift enciphering transformation is 𝐶 ≡ 𝑃 + 𝑘 𝑚𝑜𝑑 26 A shift cipher is a substitution cipher. A cryptanalyst can break the code by using the universally available knowledge of the relative frequency distribution of letters in ordinary most frequently occurring letter in the plaintext is “E”. The next three letters are “T”, ”A” and “O”. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 10. Q.No.5: Decipher the following ciphertext using shift cipher “FQOCUDEM”.Suppose the most frequently occurring letter in the English language is “E” and “U” is the ,most frequently occurring character in the ciphertext. Solution The deciphering transformation is 𝑃≡𝐶−16 (𝑚𝑜𝑑 26) The shift takes “E”=4 to “U”=20. i.e., 20 ≡ 4+b mod 26 i.e.,b=16 Converting to numerical equivalents 5 16 14 2 20 3 4 12 Using the deciphering transformation , 15 0 24 12 4 13 14 22 The plaintext is “PAYMENOW”. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 11. Affine Ciphers An Affine enciphering transformation is given by 𝐶 ≡ 𝑎𝑃 + 𝑘 𝑚𝑜𝑑 26 The deciphering transformation is 𝑃 ≡ 𝑎′ 𝐶 + 𝑏′ (𝑚𝑜𝑑 26) where 𝑎′= 𝑎−1, 𝑏′ = −𝑎−1 𝑏 Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 12. Q.No.6:Encipher the message “PAY ME NOW”using the affine transformation on 26 letter alphabet with a=7 ,b=12. Solution The enciphering transformation is 𝐶≡7𝑃+12 (𝑚𝑜𝑑 26) Converting to numerical equivalents 15 0 24 12 4 13 14 22 7P: 105 0 168 84 28 91 98 154 7P+12: 117 12 180 96 40 103 110 166 Mod 26: 13 12 24 8 14 25 6 10 The ciphertext is “NMYSOZGK” Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 13. Q.No.7:In the 27-letter alphabet (withblank=26),use the affine enciphering transformation with key a=13,b=9 to encipher the message “THRPXDH” SOLUTION: The deciphering transformation is P≡ 𝑎′ 𝐶 + 𝑏′(𝑚𝑜𝑑 𝑁) ,where 𝑎′=𝑎−1 and 𝑏′= −𝑎−1b. 27 = 2 x 13 +1 i.e 1= 27 -( 2 x 13) 1=-2 x13 ie13−1=-2=25 (mod 27) 𝑎′=25 and 𝑏′=-25x9=18 The numerical equivalents are 19 7 17 15 23 3 7 Corresponding P are 7 4 11 15 26 12 4 The plaintext is “HELP ME” Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 14. The message units contain two-letter blocks called the digraphs. If the plaintext has an odd number of letters, add an extra letter may be a blank or “X” or “Q”. The numerical equivalent of each digraph is 𝑥𝑁+𝑦, where x is the numerical equivalent of the first letter, y is the numerical equivalent of the second letter and N is the number of letters in the alphabet. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 15. Q.No.8:Suppose we are working in a 26-letter alphabet and using the digraph enciphering transformation 𝐶 ≡ 159𝑃 + 580 𝑚𝑜𝑑 676. Encipher “NO” and decipher “NV”. Solution: The numerical equivalent of “NO” is xN + y = 26 x 13 + 14 = 352 𝐶 ≡ (159 𝑥 352) + 580 (𝑚𝑜𝑑 676) ≡ 440 (mod 676) i.e. c = 440. 𝑐 = 𝑥′ 𝑁 + 𝑦′ 440 = 26 𝑥′ + 𝑦′ =26 x 16+24 i.e.,𝑥′ = 16 𝑦′=24. The ciphertext is “QY”. Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 16. Q.No.9:Decipher the ciphertext “PWULPZTQAWHF” which was encrypted using the affine map on digraphs in the 26-letter alphabet.A frequency analysis shows that the most frequently occurring digraphs in the English language are “TH” and “HE”in that order and “IX” and “TQ”in that order. Solution: The enciphering key is P≡ 𝑎′ 𝐶 + 𝑏′ (mod 262 ) To find 𝑎′ , 𝑏′ 501≡ 231 𝑎′+ 𝑏′ (mod 676) 186≡ 510 𝑎′ + 𝑏′(mod 676) subtracting, -279𝑎′ ≡ 315 (𝑚𝑜𝑑 676) 𝑎′≡(−279)−1 315 (mod 676) 𝑎′ ≡ − 63 x 315 (mod 676) 𝑎′ ≡ 435 (mod 676) 𝑏′ =64 (mod 676) Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 17. The plaintext is “FOUNDTHEGOLD” Cryptography, Sowmya K, St.Mary’s College, Thrissur.
  • 18. REFERENCE Neal Koblitz, A Course in Number Theory and Cryptography, Springer Verlag, New York,1987. Cryptography, Sowmya K, St.Mary’s College, Thrissur.