Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
72 views35 pages

Cryptology EDITED

Shift cipher is a type of monoalphabetic substitution cipher where each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The additive (or shift) cipher was first used by Julius Caesar. It involves shifting each letter by a certain number of places in the alphabet, either left or right, according to a prearranged key. Decryption involves shifting letters in the opposite direction by the same number of places.

Uploaded by

MJ Nuarin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views35 pages

Cryptology EDITED

Shift cipher is a type of monoalphabetic substitution cipher where each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The additive (or shift) cipher was first used by Julius Caesar. It involves shifting each letter by a certain number of places in the alphabet, either left or right, according to a prearranged key. Decryption involves shifting letters in the opposite direction by the same number of places.

Uploaded by

MJ Nuarin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Shift Cipher

Cryptology
Cryptography

 Originated from the Greek works KRYPTO


which means hidden and GRAPHENE means
writing.
 Is a method of making and breaking of secret
codes.
Cryptography

 Cryptology- is defined as the science of making


communication incomprehensible to all people
except those who have the right to read and
understand it.

The study of cryptology consists of two parts:


 • cryptography- which concerns itself with the secrecy
system itself and its design, and
 • cryptanalysis- which concerns itself with the breaking
of the secrecy system above.
DIFINITION:

Code
a set of information that will allow words to be
changed to other words or symbols that is not
the type of analyze.
 The only way to decode a message is by
having the set of words and their codes. If
someone is able to get his hands on the
codebook, then every secrecy message can be
broken.
 Plaintext – the message that you wish to put into a
secret form. Plaintext is usually written in all lower
 case letters without spaces. Numbers are written out
and punctuation is ignored. So the message

“I will meet you at 5 PM in the mall” is written as:


iwillmeetyouatfivepminthemall
 Cipher - the method for altering the plain
 text.
 Ciphertext - the secret version of the
plaintext. So the plain text.
ex. iwillmeetyouatfivepminthemall
may be changed to:
 NBNQQRJJYDTZFYKNAJURNSYMJRFQQ
N BNQQ RJJY DTZ FY KNAJ UR NS YMJ RFQQ
 Encryption/Encipher - changing from
plaintext to ciphertext
 Decrytion/Decipher - changing from
ciphertext to plaintext
 Key - information that will allow someone to
encipher the plaintext and also decipher the
ciphertext.
The Additive (or shift) Cipher System

 The first type of monoalphabetic substitution cipher we wish to


examine is called the additive cipher.

 In this cipher method, each plaintext letter is replaced by another


character whose position in the alphabetis a certain number of
units away. We actually shift each letter a certain number of
places over.

 One of the first additive ciphers was used by Julius Caesar


around 50 B.C.
ILLUSTRATION:

(Message : Plain text ) Maths is fun


ILLUSTRATION:

(Message : Plain text ) Maths is fun

(Message : Coded Form) PDWKV LV IXQ


TERMS:

1. PLAIN TEXT = refers to the original message


2. CIPHERTEXT = refers to the coded message
3. KEY = refers to the strings of information
that is used to reveal the encrypted
message into readable form.
Simple Methods of Crytography

 Shift Cipher
- it is called Ceasar Cipher
- it is the simple type of substitution of cipher.
 It is the method of cryptology where in the
message is encrypted using a fixed number of
shift (move) in order the have the equivalent
character in a form of ciphertext.
 The number of shift can be any number from 0
- 25
Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.

PROCEDURE:
- Place the sliding ruler to the first letter of the alphabet of the plain text to the
right using the indicated shift.
Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.


Method of Shift Cipher

Example : Using a shift of 5 to the left.


Example :

 Using the key of shift of 3 to the right,


encrypt the Word “ CRYPTOGRAPHY”
Answer:

 CRYPTOGRAPHY = FUBSWRJUDKCT

Key:
Example

 Decrypt the cipher text, “BJY DN BJJY”,


using the key of 5-shifts to the left.
Answer :

 “BJY DN BJJY” = God is good.

Key:
Example:

3. Encrypt the word “ Our Lady of Fatima


University” using 2 shift to the left.
ANSWER:

Key:

“Our Lady of Fatima University”


MSP JYBW MD DYRGKY SLGTCPQGRW
EXAMPLE:

 Decryt the ciphertext “ G YK GLRCJJGECLR”


using 2-shift to the left.
ANSWER:

Key:

“ G YK GLRCJJGECLR”
I AM INTELLIGENT
BONUS POINTS: ( 10 –POINTS)

Encrypt the word “Phillipines”, using 6-shift to


the right.
Answer to the bonus point

Key:

PHILIPPINES
VNOROVVOTKS
BONUS POINTS: 10 PTS

Decrypt the word “ SGZNKSGZOIY”, using 2-


shift to the left.
Answer to the bonus point

Key:

SGZNKSGZOIY
MATHEMATICS
Method of Shift Cipher

 Using the Modulo operator


= The sender of the message uses the key K
to encrypt and to decrypt the secret
message. The key K may have any integer
value from 0 – 25 and this will be shared to
the person/s who will be receiving the secret
message.
Using the Modulo Operator

To encrypt the message:


 1. Express the letters of the alphabet into an
integer from 0 to 25, that matches its order,
for example A = 0, B = 1, C = 3 ….., then label
them as C
 2. Calculate Y = (C+ K) mod 26 , for every
letter of the message.
 3. Convert the number Y into a letter following
the order of the letter of the alphabet.
M = 12 , W = 22, I = 8, S = 18, F = 5, U = 20, N = 13, T = 19, O = 14, L = 11,
E = 4, A = 0, R = 17

Example:

1. : Encrypt the message “MMW is fun to learn”


Let K = 5
Answer :

RRB NX KZS YT QJFWS


How to decrypt..

To Decrypt the Message:


1. Express the letters of the alphabet into an
integer from 0 to 25, that matches its order,
for example A = 0, B = 1, C = 3 ….., then label
them as Y
2. Calculate C = (Y - K) mod 26 , for every
letter of the decrypted message.
3. Convert the number C into a letter following
the order of the letter of the alphabet.
Example:

Decrypt the RRB NX KZS YT QJFWS


Example # 2

 Encrypt the word text “FATIMA” using the


Modulo Operator, given k = 20
Answer :

ZUNCGU

You might also like