Shift Cipher
Cryptology
Cryptography
Originated from the Greek works KRYPTO
which means hidden and GRAPHENE means
writing.
Is a method of making and breaking of secret
codes.
Cryptography
Cryptology- is defined as the science of making
communication incomprehensible to all people
except those who have the right to read and
understand it.
The study of cryptology consists of two parts:
• cryptography- which concerns itself with the secrecy
system itself and its design, and
• cryptanalysis- which concerns itself with the breaking
of the secrecy system above.
DIFINITION:
Code
a set of information that will allow words to be
changed to other words or symbols that is not
the type of analyze.
The only way to decode a message is by
having the set of words and their codes. If
someone is able to get his hands on the
codebook, then every secrecy message can be
broken.
Plaintext – the message that you wish to put into a
secret form. Plaintext is usually written in all lower
case letters without spaces. Numbers are written out
and punctuation is ignored. So the message
“I will meet you at 5 PM in the mall” is written as:
iwillmeetyouatfivepminthemall
Cipher - the method for altering the plain
text.
Ciphertext - the secret version of the
plaintext. So the plain text.
ex. iwillmeetyouatfivepminthemall
may be changed to:
NBNQQRJJYDTZFYKNAJURNSYMJRFQQ
N BNQQ RJJY DTZ FY KNAJ UR NS YMJ RFQQ
Encryption/Encipher - changing from
plaintext to ciphertext
Decrytion/Decipher - changing from
ciphertext to plaintext
Key - information that will allow someone to
encipher the plaintext and also decipher the
ciphertext.
The Additive (or shift) Cipher System
The first type of monoalphabetic substitution cipher we wish to
examine is called the additive cipher.
In this cipher method, each plaintext letter is replaced by another
character whose position in the alphabetis a certain number of
units away. We actually shift each letter a certain number of
places over.
One of the first additive ciphers was used by Julius Caesar
around 50 B.C.
ILLUSTRATION:
(Message : Plain text ) Maths is fun
ILLUSTRATION:
(Message : Plain text ) Maths is fun
(Message : Coded Form) PDWKV LV IXQ
TERMS:
1. PLAIN TEXT = refers to the original message
2. CIPHERTEXT = refers to the coded message
3. KEY = refers to the strings of information
that is used to reveal the encrypted
message into readable form.
Simple Methods of Crytography
Shift Cipher
- it is called Ceasar Cipher
- it is the simple type of substitution of cipher.
It is the method of cryptology where in the
message is encrypted using a fixed number of
shift (move) in order the have the equivalent
character in a form of ciphertext.
The number of shift can be any number from 0
- 25
Method of Shift Cipher
1. Shift to either left or right
Example: Shift of 3 to the right.
PROCEDURE:
- Place the sliding ruler to the first letter of the alphabet of the plain text to the
right using the indicated shift.
Method of Shift Cipher
1. Shift to either left or right
Example: Shift of 3 to the right.
Method of Shift Cipher
Example : Using a shift of 5 to the left.
Example :
Using the key of shift of 3 to the right,
encrypt the Word “ CRYPTOGRAPHY”
Answer:
CRYPTOGRAPHY = FUBSWRJUDKCT
Key:
Example
Decrypt the cipher text, “BJY DN BJJY”,
using the key of 5-shifts to the left.
Answer :
“BJY DN BJJY” = God is good.
Key:
Example:
3. Encrypt the word “ Our Lady of Fatima
University” using 2 shift to the left.
ANSWER:
Key:
“Our Lady of Fatima University”
MSP JYBW MD DYRGKY SLGTCPQGRW
EXAMPLE:
Decryt the ciphertext “ G YK GLRCJJGECLR”
using 2-shift to the left.
ANSWER:
Key:
“ G YK GLRCJJGECLR”
I AM INTELLIGENT
BONUS POINTS: ( 10 –POINTS)
Encrypt the word “Phillipines”, using 6-shift to
the right.
Answer to the bonus point
Key:
PHILIPPINES
VNOROVVOTKS
BONUS POINTS: 10 PTS
Decrypt the word “ SGZNKSGZOIY”, using 2-
shift to the left.
Answer to the bonus point
Key:
SGZNKSGZOIY
MATHEMATICS
Method of Shift Cipher
Using the Modulo operator
= The sender of the message uses the key K
to encrypt and to decrypt the secret
message. The key K may have any integer
value from 0 – 25 and this will be shared to
the person/s who will be receiving the secret
message.
Using the Modulo Operator
To encrypt the message:
1. Express the letters of the alphabet into an
integer from 0 to 25, that matches its order,
for example A = 0, B = 1, C = 3 ….., then label
them as C
2. Calculate Y = (C+ K) mod 26 , for every
letter of the message.
3. Convert the number Y into a letter following
the order of the letter of the alphabet.
M = 12 , W = 22, I = 8, S = 18, F = 5, U = 20, N = 13, T = 19, O = 14, L = 11,
E = 4, A = 0, R = 17
Example:
1. : Encrypt the message “MMW is fun to learn”
Let K = 5
Answer :
RRB NX KZS YT QJFWS
How to decrypt..
To Decrypt the Message:
1. Express the letters of the alphabet into an
integer from 0 to 25, that matches its order,
for example A = 0, B = 1, C = 3 ….., then label
them as Y
2. Calculate C = (Y - K) mod 26 , for every
letter of the decrypted message.
3. Convert the number C into a letter following
the order of the letter of the alphabet.
Example:
Decrypt the RRB NX KZS YT QJFWS
Example # 2
Encrypt the word text “FATIMA” using the
Modulo Operator, given k = 20
Answer :
ZUNCGU