1 / 11

Introduction to Cryptography

Introduction to Cryptography. Lecture 6. Substitution Cipher.

robyn
Download Presentation

Introduction to Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Cryptography Lecture 6

  2. Substitution Cipher Definition: A monoalphabetic or simple substitution cipher is one where correspondents agree on a rearrangement (permutation) of the alphabet in which messages will be written. The sender encrypts a message by replacing each letter in it with the corresponding letter in the cipher alphabet.

  3. Substitution Cipher Shift Cipher Decimation Cipher Affine Cipher

  4. Mixed Alphabet with the Key Words Definition: Decide on the key words. To construct a substitution cipher using the key words first write the key worlds in order they appear (without repetitions), then write the rest of alphabet in original order (without repetition).

  5. Mixed Alphabet with the Key Words Examples: Let the key worlds be: honors seminar. Than the table is: Encryption of STOP will be QTJK.

  6. Mixed Alphabet with the Key Words Problem: Many letters encrypted to themselves Need to be careful when choose the key words

  7. Keyword Columnar Transposition Substitution Definition: Decide on the key words. To construct a substitution cipher using key words first write the key worlds in order they appear (without repetitions) in one line, then put the rest of alphabet in the original order (without repetition) on successive lines beneath. Then write the letters of this array column by column.

  8. Keyword Columnar Transposition Substitution Examples: Let the key worlds be: honors seminar. Than the table is: Now we build an encryption table using the columns of the table above.

  9. Keyword Columnar Transposition Substitution We get the table: Encryption of STOP will be MKWE.

  10. Probabilities of Occurrence of the English Letters

  11. Homework • Read pg.83-91. • Exercises: 1, 2, 5 on pg.92- 93. • Those questions will be a part of your collected homework.

More Related