Traditional Ciphers - Understanding Substitution Ciphers and Caesar Cipher

principles of cyber security n.w
1 / 8
Embed
Share

Explore the concept of Substitution Ciphers, focusing on the Caesar Cipher as a monoalphabetic encryption method where each letter is replaced by another fixed-distance letter in the alphabet. Learn about the key, keyspace size, encryption, decryption, and the breakability of simple substitution ciphers.

  • Cyber Security
  • Ciphers
  • Encryption
  • Decryption
  • Substitution Cipher

Uploaded on | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Principles of Cyber Security Lecture Lecture 10 10: : Traditional Traditional Ciphers_IV Ciphers_IV Dr. Dr. Muamer Muamer Mohammed Mohammed 1

  2. Objectives Describe Substitution Ciphers 10.1 algorithms (Caesar Cipher).

  3. Caesar Cipher The Caesar Cipher is a monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed distance away in the alphabet. For example, A is replaced by C, B by D, ..., Y by A, Z by B, etc. What is the key? What is the size of the keyspace? 3

  4. Substitution Ciphers Caesar Cipher This is an example of Caesar Cipher in which each letter in the alphabet is rotated by three letters as shown. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C 4

  5. Substitution Ciphers Caesar Cipher Let us try to encrypt the message **Attack at Dawn Assignment: Each student will exchange a secret message with his/her closest neighbor about some other person in the class and the neighbor will decipher it. 5

  6. Substitution Ciphers Caesar Cipher Encryption Plain Text Cipher Text Cipher: Message: Attack at Dawn Message: Dwwdfn Dw Gdyq Caesar Cipher Algorithm Key (3) Decryption Cipher Text Plain Text Cipher: Message: Dwwdfn Dw Gdyq Message: Attack at Dawn Caesar Cipher Algorithm Key (3) How many different keys are possible? 6

  7. Simple Substitution A simple substitution cipher is an injection (1-1 mapping) of the alphabet into itself or another alphabet. What is the key? A simple substitution is breakable; we could try all k! mappings from the plaintext to ciphertext alphabets. That s usually not necessary. Redundancies in the plaintext (letter frequencies, digrams, etc.) are reflected in the ciphertext. Not all substitution ciphers are simple substitution ciphers. 7

  8. Thank you 8

Related


More Related Content