Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
738 views16 pages

Polyalphabetic Cipher

The document discusses several cryptographic techniques including polyalphabetic substitution ciphers like the Vigenere cipher and one-time pad cipher. The one-time pad cipher uses a private key that is randomly generated and only used once to encrypt a message. Transposition techniques like rail fence and columnar transposition are also covered, rearranging the order of letters in the plaintext. Finally, steganography is introduced as a method of covert communication by hiding messages in various file formats like images, text, audio and video rather than encrypting them.

Uploaded by

thirumal536
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
738 views16 pages

Polyalphabetic Cipher

The document discusses several cryptographic techniques including polyalphabetic substitution ciphers like the Vigenere cipher and one-time pad cipher. The one-time pad cipher uses a private key that is randomly generated and only used once to encrypt a message. Transposition techniques like rail fence and columnar transposition are also covered, rearranging the order of letters in the plaintext. Finally, steganography is introduced as a method of covert communication by hiding messages in various file formats like images, text, audio and video rather than encrypting them.

Uploaded by

thirumal536
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

POLYALPHABETIC CIPHER

• Another way to improve on the simple


monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds
through the plaintext message.
• The general name for this approach is
polyalphabetic substitution cipher.
• Polyalphabetic substitution ciphers are
1. Vigenere cipher
2. One-time pad cipher
VIGENERE CIPHER
One Time Pad
• In cryptography, a one-time pad is a system in which
a randomly generated private key is used only once
to encrypt a message that is then decrypted by the
receiver using a matching one-time pad and key.
• One-time pad cipher is a type of Vignere cipher which
includes the following features −
• It is an unbreakable cipher.
• The key is exactly same as the length of message which
is encrypted.
• The key is made up of random symbols.
• As the name suggests, key is used one time only and
never used again for any other message to be
encrypted.
One Time Pad contd..
• Due to this, encrypted message will be vulnerable to
attack for a cryptanalyst. The key used for a one-time
pad cipher is called pad, as it is printed on pads of
paper.
Encryption
• To encrypt a letter, a user needs to write a key
underneath the plaintext.
• The plaintext letter is placed on the top and the key
letter on the left.
• The cross section achieved between two letters is the
plain text.
• It is described in the example in the next slide.
One Time Pad contd..
One Time Pad contd..
Decryption
• To decrypt a letter, user takes the key letter on
the left and finds cipher text letter in that row.
• The plain text letter is placed at the top of the
column where the user can find the cipher
text letter.
TRANSPOSTION TECHNIQUES

• Transposition Cipher is a cryptographic


algorithm where the order of alphabets in
the plaintext is rearranged to form a cipher
text.
• In this process, the actual plain text alphabets
are not included.
• We are considering two techniques
1. Rail-Fence Technique
2. Simple columnar transposition techniques
RAIL FENCE
• Rail-Fence is the simple Transposition technique that involves writing
plain text as a sequence of diagonals and then reading it row by row
to produce the ciphertext.

• Now read the plain text by row-wise, i.e. croaerdeoprtbig.


• So, here the plain text is a corporate bridge, and ciphertext is
croaerdeoprtbig
Simple columnar transposition techniques
• The simple columnar transposition technique
can be categorized into two parts – Basic
technique and multiple rounds.
• Simples columnar transposition technique –
basic technique.
• The simple columnar transposition technique
simply arranges the plain text in a sequence of
rows of a rectangle and reads it in a columnar
manner.
ALGORITHM
• Step 1: Write all the characters of plain text
message row by row in a rectangle of
predefined size.
• Step 2: Read the message in a columnar
manner, i.e. column by column.
• Note: For reading the message, it needs not to
be in the order of columns. It can happen in
any random sequence.
• Step 3: The resultant message is ciphertext.
Example
• Let’s assume that Plain text is a corporate
bridge, and we need to calculate the cipher
text using a simple columnar transposition
technique.
• Let’s take 6 columns and arrange the plain text
in a row-wise manner.
• The Table is taken as in the next slide.
Example contd..
COLUMN-1 COLUMN-2 COLUMN-3 COLUMN-4 COLUMN-5 COLUMN-6

C O R P O R

A T E B R I

D G E

Decide the column order for reading the message – let’s


assume 1,3,5,2,4,6 is an order.
Now read the message in a columnar manner using the
decided order. – cadreeorotgpbri
cadreeorotgpbri is a ciphertext.
Steganography

• The purpose of steganography is to conceal


and deceive.
• It is a form of covert communication and can
involve the use of any medium to hide
messages.
• It's not a form of cryptography, because it
doesn't involve scrambling data or using a
key.
• Instead, it is a form of data hiding and can be
executed in clever ways.
Types of Steganography techniques
• Depending on the nature of the cover
object(actual object in which secret data is
embedded), steganography can be divided
into five types:
• Text Steganography.
• Image Steganography.
• Video Steganography.
• Audio Steganography.
• Network Steganography.

You might also like