Substitution ciphers
This presentation is the property of its rightful owner.
Sponsored Links
1 / 5

Substitution Ciphers PowerPoint PPT Presentation


  • 80 Views
  • Uploaded on
  • Presentation posted in: General

Substitution Ciphers. Reference Matt Bishop, Computer Security , Addison Wesley, 2003. Substitution Ciphers (p.2). Substitution Cipher Changes characters in the plaintext to produce the ciphertext. Examples Caesar Cipher Vigenere Cipher One Time Pad. Substitution Ciphers (p.3).

Download Presentation

Substitution Ciphers

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Substitution ciphers

Substitution Ciphers

  • Reference

    • Matt Bishop, Computer Security, Addison Wesley, 2003.


Substitution ciphers p 2

Substitution Ciphers (p.2)

  • Substitution Cipher

    • Changes characters in the plaintext to produce the ciphertext.

  • Examples

    • Caesar Cipher

    • Vigenere Cipher

    • One Time Pad


Substitution ciphers p 3

Substitution Ciphers (p.3)

  • Caesar Cipher

    • Consider the plaintext to be the letters A,B,C,...,Z.

    • Now shift the sequence, say, by 3 to get D,E,F,...Z,A,B,C.

    • Then the cipher text becomes D for A, E for B, and so on.

    • If each letter is represented by integers 0,1,...,25, we can describe this process as C=(M + K) mod 26, where the key is K=3.


Substitution ciphers p 4

Substitution Ciphers (p.4)

  • Vigenère Cipher

    • The Vigenère cipher chooses a sequence of keys, represented by a string.

    • Key letters are applied to successive plaintext.

    • When the end of the key sequence is reached, the key starts over again.

    • The length of the key is called the period of the cipher.


Substitution ciphers p 5

Substitution Ciphers (p.5)

  • One-Time Pad

    • A variant of the Vigenère cipher.

    • The key is chosen at random.

    • The length of the key is at least as long as that of the message, and so it does not repeat.


  • Login