cypher technique

36

Upload: zubair-ch

Post on 13-Apr-2017

104 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Cypher technique
Page 2: Cypher technique

Amad KhadimZubair Farooq

Subject :

Encryption Topic :

Presented by :

Network Security

Page 3: Cypher technique

ROAD MAP

Page 4: Cypher technique

ENCRYPTIONBasic Terminology

Why Do We Use Encryption ?

Real Life ExamplesCryptography

Types

Symmetric Asymmetric

Caesar Mono alphabetic One-time pad

Hill Cipher Play Fair Vigenere Cipher

Techniques of Cryptography

Page 5: Cypher technique

Plaintext: The original message

Ciphertext: The coded message

Cipher:Algorithm for transforming plaintext to ciphertext.

Key:Info used in cipher known only to sender/receiver.

BASIC CONCEPTSEncipher (encrypt):

Converting plaintext to ciphertext.

Decipher (decrypt): Recovering ciphertext from plaintext.

Cryptography :Study of encryption principles/methods.

Cryptanalysis (code breaking):The study of principles/ methods of deciphering ciphertext without

knowing key.

Cryptology:The field of both cryptography and cryptanalysis

Page 6: Cypher technique

WHY DO WE USE ENCRYPTION?

To secure important information e.g.

Files on computers Data being passed through the Internet ATM machines E-Commerce

Credit card information

Etc.

Prevents information from getting stolen or read Without encryption, there is no reliable security

Page 7: Cypher technique

REAL LIFE EXAMPLES

Used in the military and the government Now used in everyday life:

Online banking

E-commerce

Student records, health records, tax records etc.

ATM machines

Social networking (emails, texts, instant messengers)

Businesses

Page 8: Cypher technique

SYMMETRIC CRYPTOGRAPHYA cryptography system in which both parties have the same encryption key, as in secret key cryptography. 

Page 9: Cypher technique

ASYMMETRIC CRYPTOGRAPHY

Cryptography in which the key used in decryption is different from that used for encryption

Page 10: Cypher technique

To pass an encrypted message from one person to another, it is first

necessary that both parties have the 'key' for the cipher

Encryption Method: C = P + K Key = 3 Decryption Method: P = C - K Key = 3

CAESAR CIPHER

Caesar Cipher is One of the simplest examples of a substitution cipher, which have been used by Julius Caesar to communicate with his army.

Page 11: Cypher technique

Example: Plain Text: BACHELOR

Key = 3Cipher Text: EDFKHORU

Page 12: Cypher technique

Monoalphabetic Ciphers

The substitution is fixed for each letter of the alphabet.

Thus, if "a" is encrypted to "R", then every time we see the letter "a" in the plaintext,

we replace it with the letter "R" in the ciphertext.

A simple example is where each letter is encrypted as the next letter in the alphabet:

"a simple message“.Plain Text:” a simple message “Cipher Text: B TJNQMF NFTTBHF

A monoalphabetic cipher, also known as a simple substitution cipher, relies on a fixed replacement structure.

Page 13: Cypher technique

One-time Pad Ciphers

The one-time pad is a long sequence of random letters.

These letters are combined with the plaintext message to produce the cipher

text.

To decipher the message, a person must have a copy of the one-time pad to

reverse the process.

A one-time pad should be used only once (hence the name) and then

destroyed.

To encipher a message, you take the first letter in the plaintext message and add

it to the first random letter from the one-time pad.

Page 14: Cypher technique

Suppose you are enciphering the letter S (the 19th letter of the alphabet) and

the one-time pad gives you C (3rd letter of the alphabet).

You add the two letters and subtract 1.

When you add S and C and subtract 1, you get 21 which is U.

Each letter is enciphered in this method.

One-time Pad Example

Plaintext : SECRETMESSAGE

One-time pad: CIJTHUUHMLFRU

Ciphertext : UMLKLNGLEDFXY

Page 15: Cypher technique

Hill Ciphers The Hill Cipher was invented by Lester S. Hill in 1929.

It can work on digraphs (2X2), trigraphs (3X3) or theoretically

any sized blocks.

The Hill Cipher uses an area of mathematics called Linear

Algebra.

It also makes use of Modulo Arithmetic.

The cipher has a significantly more mathematical nature than

some of the others ciphers.

Page 16: Cypher technique

Hill Cipher Example

The key for a hill cipher is a matrix e.g.

In the above case, we have taken the size to be 3×3 Assume we want to encipher the message ATTACK AT DAWN.

We now take the first 3 characters from our plaintext, ATT and create a vector that corresponds to the letters to get: [0 19 19] 

Hill Ciphers example

Page 17: Cypher technique

Playfair Ciphers

Invented by Charles Wheatstone in 1854, but named after his friend

Baron Playfair.

In order to encrypt using the Playfair Cipher, we must first draw up

a Polybius Square.

Its providing a stronger cipher than a Monoalphabetic Cipher.

Playfair Cipher is the best known such cipher.

Page 18: Cypher technique

Playfair Key Matrix

Use a 5 x 5 matrix.

Fill in letters of the key (combine "I" and "J"

in the square).

Fill the rest of matrix with other letters.

E.g. key = PLAYFIRE.

Page 19: Cypher technique

Playfair Rules

Plaintext is encrypted two letters at a time. If a pair is a repeated letter, insert filler like 'X’.

If both letters fall in the same row, replace each with the letter to

its right (circularly).

If both letters fall in the same column, replace each with the

letter below it (circularly).

Otherwise, each letter is replaced by the letter in the same row

but in the column of the other letter of the pair.

Page 20: Cypher technique

“hide the gold in the tree stump”Plain Text :

Rule 1, and split up any double letter digraphs by inserting an "x"

between them.

The first image below shows the initial digraph split of the plaintext, and

the second image displays how we split up the "ee" into "ex" and "es".

The digraph split once we apply Rule 1, and remove any digraphs made from two of the same letter.

Playfair Example

Page 21: Cypher technique
Page 22: Cypher technique
Page 23: Cypher technique
Page 24: Cypher technique
Page 25: Cypher technique
Page 26: Cypher technique
Page 27: Cypher technique
Page 28: Cypher technique
Page 29: Cypher technique
Page 30: Cypher technique
Page 31: Cypher technique
Page 32: Cypher technique
Page 33: Cypher technique

The Vigenere cipher, was invented by a Frenchman, Blaise de

Vigenere in the 16th century.

The Vigenere cipher uses a 26×26 table with A to Z as the row

heading and column heading.

This table is usually referred to as the Vigenere Tableau, Vigenere

Table or Vigenere Square.

Vigenere Ciphers

Page 34: Cypher technique

Vigenere Cipher Table

Page 35: Cypher technique

Vigenere Ciphers

To encrypt a message using the Vigenere

Cipher you first need to choose a keyword

(or keyphrase).

Then repeat this keyword over and over

until it is the same length as the plaintext.

This is called the keystream.

The keystream using the keyword battista

Page 36: Cypher technique