Introduction to Codes and Ciphers 2
Introduction to Codes and Ciphers 2
AND CIPHERS
Retrangle
Write : Row by Row
Read : Column by
Column
Key : Order of the
Column
III. CLASSICAL
CIPHERS -
TRANSPOSITION
CIPHER
Retrangle
Write : Row by Row
Read : Column by
Column
Key : Order of the
Column
III. CLASSICAL
CIPHERS -
TRANSPOSITION
CIPHER
Retrangle
Write : Row by Row
Read : Column by
Column
Key : Order of the
Column
III. CLASSICAL
CIPHERS -
TRANSPOSITION
CIPHER
Retrangle
Write : Row by Row
Read : Column by
Column
Key : Order of the
Column
III. CLASSICAL
CIPHERS -
TRANSPOSITION
CIPHER
Retrangle
Write : Row by Row
Read : Column by
Column
Key : Order of the
Column
III. CLASSICAL
CIPHERS -
TRANSPOSITION
CIPHER
Retrangle
Write : Row by Row
Read : Column by
Column
Key : Order of the
Column
III. CLASSICAL
CIPHERS -
TRANSPOSITION
CIPHER
Retrangle
Write : Row by Row
Read : Column by
Column
Key : Order of the
Column
III. CLASSICAL CIPHERS -
TRANSPOSITION CIPHER
Explanation: Rearranges letters in a message without altering
them.
Example: ‘MEET ME AT MIDNIGHT' rearranged as
EATITNIHMEXNETMGMEDT'.
III. CLASSICAL CIPHERS - VIGENÈRE
CIPHER
Explanation: Uses a keyword to create varying shifts for each
letter.
The Vigenère cipher uses a 26×26 table with A to Z as the row
heading and column heading
This table is usually referred to as the Vigenère Table or Vigenère
Square.
The first row of this table has the 26 English letters.
Starting with the second row, each row has the letters shifted to
the left one position in a cyclic way.
For example, when B is shifted to the first position on the second
row, the letter A moves to the end.
III. CLASSICAL CIPHERS - VIGENÈRE
CIPHER
III. CLASSICAL CIPHERS - VIGENÈRE
CIPHER
In addition to the plaintext, the Vigenère cipher also requires a
keyword, which is repeated so that the total length is equal to that
of the plaintext.
For example, suppose the plaintext is MICHIGAN TECHNOLOGICAL
UNIVERSITY and the keyword is HOUGHTON.
Then, the keyword must be repeated as follows:
III. CLASSICAL CIPHERS - VIGENÈRE
CIPHER
We follow the tradition by removing all spaces and punctuation,
converting all letters to upper case, and dividing the result into 5-
letter blocks.
As a result, the above plaintext and keyword become the
following:
- Uses pseudorandom
key streams for
encryption.
HOW STREAM CIPHERS WORK
- RC4: Used in WEP, early - ChaCha20: Modern, secure - XOR Example: Plaintext
TLS (vulnerable to key stream cipher (used in TLS). 1011 XOR Key Stream 1100
reuse). = Ciphertext 0111.
BLOCK CIPHERS
- Block Ciphers:
- Stream Ciphers: Secure
Real-time data, messaging (e.g.,
video streaming, WhatsApp uses
IoT encryption. AES), file
encryption.
SUMMARY