7 - Cryptography
7 - Cryptography
7 - Cryptography
Depaynos, MA AS
When people need to secretly store or communicate
messages, they turn to cryptography.
Cryptography involves using techniques to obscure a
message so outsiders cannot read the message. It is
typically split into two steps:
Encryption – in which the message is obscured, and
Decryption – in which the original message is recovered
from the obscured form
Substitution cipher
Caesar/shift cipher
Random mapping
Transposition cipher
Substitution cipher replaces each letter in the
message with a different letter, following some
established mapping.
Caesar/shift cipher – each letter is replaced with
a letter some fixed number of positions in the
alphabet
Example: Shift 3
Use the Caesar cipher with shift of 3 to encrypt the
message:
DURA LEX SED LEX
GXUD OHA VHG OHA
To obscure the message, the letters are often
rearranged into EQUAL sized blocks.
GXU DOH AVH GOH APH
Use the Caesar cipher with shift of 15 to encrypt the
message:
SANA ALL MAY PERA
HPCP PAA BPN ETGP
HPC PPA ABP NET GPC
Decrypt the message below if it was encrypted using
a shift cipher with shift 5
YMJ FWY TKX JIZ HYN TSV
Note: Work backwards to decrypt the message.
THE ART OFS EDU CTI ONQ
THE ART OF SEDUCTION
Decrypt the message below if it was encrypted using
a shift cipher with shift 9
LOG LZA FYK SJW AFX AFA LWL ZWM FAN WJK
WSF VZM ESF KLM HAV ALQ SFV AEF GLK MJW
STG MLL ZWM FAN WJK WHO.
Substitution cipher
Caesar/shift cipher
Random mapping
Transposition cipher
Use the substitution mapping below to encrypt the message
I LOVE YOU 3000
HEINRICH HIMMLER
Substitution cipher
Caesar/shift cipher
Random mapping
Transposition cipher
Encrypt:
“Horizontal Market Software” in rows of 5 characters each.
Encrypt:
“Check Document Grinding” with the keyword: FORCED
Decrypt:
CAIN FONN TAMD EECM LIRE with rows of 4 characters.
Decrypt:
PGNNEW CRTRET OIIIMZ YHFGNA with the keyword: FLEX