L04-Ciphers-Substitution

# L04-Ciphers-Substitution - Classical Cryptography 1 Ciphers...

This preview shows pages 1–7. Sign up to view the full content.

1 Classical Cryptography Classical Cryptography

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
2 Ciphers Ciphers Transforming intelligible text into unintelligible text – Simple ciphers –B lock
3 Techniques Techniques • Substitution – permutations on texts •T r a n s p o s i t i o n – permutations on places

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
4 Symmetric Symmetric - - key Encryption and Decryption key Encryption and Decryption • Symmetric Key algorithms use a secret key for Encryption and Decryption. – transformations are simple and fast enough for practical use and implementation. – “Keyspace” large enough to protect against exhaustive search. Key (k) Ciphertext (C) Encrypt E k (P) Plaintext (P) Key (k) Plaintext (P) Decrypt D k (P) Ciphertext (C)
5 Substitution Methods Substitution Methods – Mono-Alphabetic Ciphers • Caesar/shift – Poly-Graphic Ciphers • Playfair Cipher (keyed-table lookup) • Hill Cipher (matrix-multiplication operation) – Poly-Alphabetic Ciphers • Vigenere Cipher

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
6 Simple Substitution Simple Substitution
This is the end of the preview. Sign up to access the rest of the document.

## This note was uploaded on 09/15/2010 for the course CSE IT325 taught by Professor Maniklaldas during the Fall '09 term at Punjab Engineering College.

### Page1 / 13

L04-Ciphers-Substitution - Classical Cryptography 1 Ciphers...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document
Ask a homework question - tutors are online