CS-304 Cryptography and Network Security: Lecturer 3
CS-304 Cryptography and Network Security: Lecturer 3
Lecturer 3
Symmetric Cipher Model
Requirements Of Symmetric Cipher Model
● We have two basic building blocks are available for all the
encryption techniques:-
● Substitution technique:-Substitution technique is one in which the
letters of the plaintext are replaced by other letters or by numbers or
symbols. Various ways are there to achieve substitution encryption for
the given text.
● Transposition technique:- In this technique mapping is achieved
by performing some sort of permutation on the plaintext
letter.Different methods are available for achieving transposition
ciphers.
Substitution Techniques
Substitution methods
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Monoalphabetic Cipher
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Playfair Key Matrix
● A 5X5 matrix of letters based on a keyword.
● Fill in letters of keyword (sans duplicates)
● Fill rest of matrix with other letters
Eg. using the keyword MONARCHY
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Encrypting and Decrypting
● Plaintext is encrypted two letters or we can say in a pair at a
time
1. If a pair is a repeated letter, insert filler like 'X’
2. If both letters fall in the same row, replace each with letter to
right (wrapping back to start from end)
3. If both letters fall in the same column, replace each with the
letter below it (wrapping to top from bottom)
4. Otherwise each letter is replaced by the letter in the same row
and in the column of the other letter of the pair.