SlideShare ist ein Scribd-Unternehmen logo
1 von 9
SQC
Group Task Management


     Enigma
The Battlefield of
       Cryptology

• Cryptographers – The Code Makers



• Cryptanalysers – The Code Breakers
CIPHER
• Any system used for hiding the
  message by replacing the letters of
  the message with some other
  letters
Types of Ciphers
1.   Simple Reverse Cipher:

Reverse the sequence of letters and write from
   end to beginning.
E.g.:
      this is a simple reverse cipher
      rehpic esrever elpmis a si siht
Types of Ciphers
2.   Rail Fence Cipher:

Write the letters in odd places first followed by the
    letters in even places.

E.g. rail fence cipher

     r i f n e i h r
      a l e c c p e

     rifneihraleccpe
Types of Ciphers
3.   Alternation Cipher:

Divide the message into two parts containing
   equal number of letters. Introduce the
   letters in second part between the letters in
   the first part.
E.g. alternation cipher
      a l t e r n a t i
       o n c i p h e r
     aolntceirpnhaetri
Types of Ciphers
4.   Scytale Cipher:

The sequence of letters are written vertically in finite
    number of rows and columns. Then the rows are
    written one after the other.
E.g. this is an example of scytale cipher
   t s a o t i
   h a m f a p
   i n p s l h
   s e l c e e
   i x e y c r
 tsaoti hamfap inpslh selcee ixeycr
Types of Ciphers
5.   Caesar Cipher:

Here each letter is substituted with some other letter in
   the alphabetical order.

E.g.     this is a caesar cipher

     key: abcdefghijklmnopqrstuvwxyz
          bcdefghijklmnopqrstuvwxyza

         uijt jt b dbftbs djqifs
Questions:
1. dnim fo etats a eb dluohs ytilauq

2. qtqyran uyuitst aiamaqi lslpnut ielotay

3. dinyvql znantrzraq

4. Wrigoehrsucsokntgteisces

5. aplewcaiyfsifcoaltlioownss

Weitere ähnliche Inhalte

Ähnlich wie Enigma

Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codesTedi Thug
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptographyG Prachi
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdfDevangShukla10
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher SystemAsad Ali
 
Information and network security 12 classical substitution ciphers
Information and network security 12 classical substitution ciphersInformation and network security 12 classical substitution ciphers
Information and network security 12 classical substitution ciphersVaibhav Khanna
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques Dr. Kapil Gupta
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.nagwaAboElenein
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.pptutsavkakkad1
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentationMuneebZahid10
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Anas Rock
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersAswathi Nair
 

Ähnlich wie Enigma (20)

Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
UNIT 2.ppt
UNIT 2.pptUNIT 2.ppt
UNIT 2.ppt
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
Information and network security 12 classical substitution ciphers
Information and network security 12 classical substitution ciphersInformation and network security 12 classical substitution ciphers
Information and network security 12 classical substitution ciphers
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Ch02
Ch02Ch02
Ch02
 
Ch02
Ch02Ch02
Ch02
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentation
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 

Enigma

  • 2. The Battlefield of Cryptology • Cryptographers – The Code Makers • Cryptanalysers – The Code Breakers
  • 3. CIPHER • Any system used for hiding the message by replacing the letters of the message with some other letters
  • 4. Types of Ciphers 1. Simple Reverse Cipher: Reverse the sequence of letters and write from end to beginning. E.g.: this is a simple reverse cipher rehpic esrever elpmis a si siht
  • 5. Types of Ciphers 2. Rail Fence Cipher: Write the letters in odd places first followed by the letters in even places. E.g. rail fence cipher r i f n e i h r a l e c c p e rifneihraleccpe
  • 6. Types of Ciphers 3. Alternation Cipher: Divide the message into two parts containing equal number of letters. Introduce the letters in second part between the letters in the first part. E.g. alternation cipher a l t e r n a t i o n c i p h e r aolntceirpnhaetri
  • 7. Types of Ciphers 4. Scytale Cipher: The sequence of letters are written vertically in finite number of rows and columns. Then the rows are written one after the other. E.g. this is an example of scytale cipher t s a o t i h a m f a p i n p s l h s e l c e e i x e y c r tsaoti hamfap inpslh selcee ixeycr
  • 8. Types of Ciphers 5. Caesar Cipher: Here each letter is substituted with some other letter in the alphabetical order. E.g. this is a caesar cipher key: abcdefghijklmnopqrstuvwxyz bcdefghijklmnopqrstuvwxyza uijt jt b dbftbs djqifs
  • 9. Questions: 1. dnim fo etats a eb dluohs ytilauq 2. qtqyran uyuitst aiamaqi lslpnut ielotay 3. dinyvql znantrzraq 4. Wrigoehrsucsokntgteisces 5. aplewcaiyfsifcoaltlioownss