Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

7 - Cryptography

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

J. L.

Depaynos, MA AS
 When people need to secretly store or communicate
messages, they turn to cryptography.
 Cryptography involves using techniques to obscure a
message so outsiders cannot read the message. It is
typically split into two steps:
 Encryption – in which the message is obscured, and
 Decryption – in which the original message is recovered
from the obscured form
 Substitution cipher
 Caesar/shift cipher
 Random mapping
 Transposition cipher
 Substitution cipher replaces each letter in the
message with a different letter, following some
established mapping.
 Caesar/shift cipher – each letter is replaced with
a letter some fixed number of positions in the
alphabet
 Example: Shift 3
 Use the Caesar cipher with shift of 3 to encrypt the
message:
DURA LEX SED LEX
GXUD OHA VHG OHA
To obscure the message, the letters are often
rearranged into EQUAL sized blocks.
GXU DOH AVH GOH APH
 Use the Caesar cipher with shift of 15 to encrypt the
message:
SANA ALL MAY PERA
HPCP PAA BPN ETGP
HPC PPA ABP NET GPC
 Decrypt the message below if it was encrypted using
a shift cipher with shift 5
YMJ FWY TKX JIZ HYN TSV
Note: Work backwards to decrypt the message.
THE ART OFS EDU CTI ONQ
THE ART OF SEDUCTION
 Decrypt the message below if it was encrypted using
a shift cipher with shift 9

BNW MVX WNH


SEN DMO NEY
SEND MONEY
 Decrypt the message below if it was encrypted using
a shift cipher with shift 20

QIL EMG ULN HIN QIL EBU LXU


WOR KSM ART NOT WOR KHA RDA
WORK SMART NOT WORK HARD
In a cipher disk, the inner wheel
could be turned to change the
cipher shift.
The larger one is called Stabilis
(stationary or fixed), the smaller
one is called Mobilis (movable).
 The security of a cryptographic method is very
important to the person relying on their message being
kept secret. The security depends on two factors:
1. The security of the method being used
2. The security of the encryption key used
In the case of a shift cipher, the method is “a shift cipher
is used”. The encryption key is the “specific amount of
shift” used.
 The security of any encryption method should
depend only on the encryption key being difficult to
discover. It is not safe to rely on the encryption
method (algorithm) being kept secret.
 Alphabetical shift cipher – 25 encryption keys
 Alphanumeric shift cipher – 35 encryption keys
 Suppose you intercept a message, and you know the sender
is using a Caesar cipher, but do not know the shift being
used. The messages begins EQZP. What is the message?
 A method for breaking encryption by trying ALL
encryption keys
 Alphabetical shift cipher – 25 encryption keys
 Alphanumeric shift cipher – 35 encryption keys
Decrypt the following messages:
1. YFNKFXVKRNRPNZKYDLIUVI
2. GYUTMULOIKGTJLOXK
3. MSRJYLBCP
4. COHONEMKDSYX
5. BDCTNWTXHI
Encrypt the message:
“When one door of happiness closes, another opens,
but often we look so long at the closed door that we do
not see the one that has been opened for us.”
Helen Keller
using:
a. alphabetical cipher of shift 9, and
b. alphanumeric cipher of shift 24.
Decrypt the message below if it was encrypted using
an alphabetical shift cipher.

LOG LZA FYK SJW AFX AFA LWL ZWM FAN WJK
WSF VZM ESF KLM HAV ALQ SFV AEF GLK MJW
STG MLL ZWM FAN WJK WHO.
 Substitution cipher
 Caesar/shift cipher
 Random mapping
 Transposition cipher
 Use the substitution mapping below to encrypt the message
I LOVE YOU 3000

D JL35 XLK 1YYY


DJL 35X LK1 YYY
 Use the substitution mapping below to decrypt the message
T5DHSDQT TD66J5S

HEINRICH HIMMLER
 Substitution cipher
 Caesar/shift cipher
 Random mapping
 Transposition cipher
 Encrypt:
“Horizontal Market Software” in rows of 5 characters each.
 Encrypt:
“Check Document Grinding” with the keyword: FORCED
 Decrypt:
CAIN FONN TAMD EECM LIRE with rows of 4 characters.
 Decrypt:
PGNNEW CRTRET OIIIMZ YHFGNA with the keyword: FLEX

You might also like