cap cryptographic analysis program n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
CAP Cryptographic Analysis Program PowerPoint Presentation
Download Presentation
CAP Cryptographic Analysis Program

Loading in 2 Seconds...

play fullscreen
1 / 7

CAP Cryptographic Analysis Program - PowerPoint PPT Presentation


  • 142 Views
  • Uploaded on

CAP Cryptographic Analysis Program. ADFGVX Help Presentation. Press Enter or click on your mouse button to continue. The ADFGVX Cipher System. This cipher involves to operations A substitution Followed by a transposition

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

CAP Cryptographic Analysis Program


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
cap cryptographic analysis program

CAPCryptographic Analysis Program

ADFGVX Help Presentation

Press Enter or click on your mouse button to continue

the adfgvx cipher system
The ADFGVX Cipher System
  • This cipher involves to operations
    • A substitution
    • Followed by a transposition
  • The substitution involves a 6 x 6 square where the rows and columns are labeled by the letters ADFGVX
    • These letters were selected because they are easy to distinguish as Morse code
  • The transposition is a simple column transposition based on a key word
matrix
Matrix
  • 26 letters and 10 digits are entered into a 6 x 6 matrix using a keyword

A D F G V X

A

D

F

G

V

X

Keyword: when2go93

w h e n 2 g

Enter the keyword and thenfill in the rest of the matrixusing the unused letters andnumbers in order

O 9 3 a b c

d f i j k l

m p q r s t

u v x y z 0

1 4 5 6 7 8

substitution

A D F G V X

A

D

F

G

V

X

w h e n 2 g

O 9 3 a b c

d f i j k l

m p q r s t

u v x y z 0

1 4 5 6 7 8

Substitution
  • Each letter and number in the plaintext is replaced by the letters on the column and row headings of the matrix

Plaintext: n e x tCiphertext: AG AF VF GX

transposition
Transposition
  • Using a column transposition with a keyword, the ciphertext is written in rows and then read in columns in a specified order

1 2 3 4 5 6

A F A G G V

X G F X D X

V A A D X X

F G D G X G

A F G A V G

Read down columns in order

3 – 6 - 1- 2 – 5 - 4

AFADG VXXGG AXVFAFGAGF GDXXV GXDGA

column key
Column Key
  • The key for a column transposition is the number of columns and the order in which they are selected both of which are determined by a keyword
  • For example, the keyword “general” defines a column transposition with 7 columns because it has 7 letters
  • To define the order of columns assign each letter a number based on its order in the alphabet

g e n e r a l

4

2

6

3

1

5

7

using cap
Using CAP
  • Select ADFGVX cipher from the cipher menu

First keyword sets up the matrix

Second keyword sets up column transformation