Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
33 views

CS-304 Cryptography and Network Security: Lecturer 3

The document discusses symmetric cipher models and classical encryption techniques. It covers two requirements for symmetric encryption: a strong algorithm and a secret key. It also describes two basic building blocks - substitution and transposition techniques. Specific techniques covered include the Caesar cipher, monoalphabetic cipher, and Playfair cipher. The Caesar cipher replaces each letter by a fixed number of positions in the alphabet. The monoalphabetic cipher randomly shuffles the alphabet letters. The Playfair cipher uses a 5x5 grid with a keyword to encrypt letters in pairs.

Uploaded by

Clash Clan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

CS-304 Cryptography and Network Security: Lecturer 3

The document discusses symmetric cipher models and classical encryption techniques. It covers two requirements for symmetric encryption: a strong algorithm and a secret key. It also describes two basic building blocks - substitution and transposition techniques. Specific techniques covered include the Caesar cipher, monoalphabetic cipher, and Playfair cipher. The Caesar cipher replaces each letter by a fixed number of positions in the alphabet. The monoalphabetic cipher randomly shuffles the alphabet letters. The Playfair cipher uses a 5x5 grid with a keyword to encrypt letters in pairs.

Uploaded by

Clash Clan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CS-304 Cryptography And Network Security

Lecturer 3
Symmetric Cipher Model
Requirements Of Symmetric Cipher Model

● Two requirements for secure use of symmetric encryption:-


1. A strong encryption algorithm
2. A secret key known only to sender / receiver
● Mathematically we have:
● Y = E(K, X)
● X = D(K, Y)
● Assume encryption algorithm is known and it implies a secure
channel to distribute key
Classical Encryption Techniques

● We have two basic building blocks are available for all the
encryption techniques:-
● Substitution technique:-Substitution technique is one in which the
letters of the plaintext are replaced by other letters or by numbers or
symbols. Various ways are there to achieve substitution encryption for
the given text.
● Transposition technique:- In this technique mapping is achieved
by performing some sort of permutation on the plaintext
letter.Different methods are available for achieving transposition
ciphers.
Substitution Techniques

Substitution methods

Monoalphabetic Playfair Hill Cipher


Caesar Cipher
Cipher Cipher
Caesar Cipher

● Earliest known substitution cipher


● Given by Julius Caesar
● First attested use in military affairs
● Replaces each letter by 3rd letter on
● example:
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
Caesar Cipher

● Can define transformation as:


a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
● Mathematically give each letter a number
a b c d e f g h i j k l m n o p q r s t u
v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
21 22 23 24 25
● Then have Caesar cipher as:
c = E(k, p) = (p + k) mod (26)
p = D(k, c) = (c – k) mod (26)
Monoalphabetic Cipher

● Rather than just shifting the alphabet


● Could shuffle (jumble) the letters arbitrarily
● Each plaintext letter maps to a different random ciphertext letter
hence key is 26 letters long

Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN

Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Monoalphabetic Cipher

● Rather than just shifting the alphabet


● Could shuffle (jumble) the letters arbitrarily
● Each plaintext letter maps to a different random ciphertext letter
hence key is 26 letters long

Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN

Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Playfair Key Matrix
● A 5X5 matrix of letters based on a keyword.
● Fill in letters of keyword (sans duplicates)
● Fill rest of matrix with other letters
Eg. using the keyword MONARCHY
M O N A R
C H Y B D

E F G I/J K

L P Q S T

U V W X Z
Encrypting and Decrypting
● Plaintext is encrypted two letters or we can say in a pair at a
time
1. If a pair is a repeated letter, insert filler like 'X’
2. If both letters fall in the same row, replace each with letter to
right (wrapping back to start from end)
3. If both letters fall in the same column, replace each with the
letter below it (wrapping to top from bottom)
4. Otherwise each letter is replaced by the letter in the same row
and in the column of the other letter of the pair.

You might also like