SlideShare une entreprise Scribd logo
1  sur  15
Prof. Neeraj Bhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System
Sciences
MDS University Ajmer, Rajasthan
 There are two basic building blocks of all
Encryption Techniques:
1. SUBSTITUTION
2. TRANSPOSITION.
CLASSICAL
ENCRYPTION
SUBSTITUTION
TRANSPOSTION
PRODUCT CIPHER
A Substitution Technique is one in
which the letters of plaintext are
replaced by other letters or by
numbers or symbols. If the plaintext is
viewed as a sequence of bits, then
substitution involves replacing
plaintext bit patterns with cipher text
bit patterns.
 The earliest known use of a substitution cipher and the
simplest was by Julius Caesar. The Caesar cipher involves
replacing each letter of the alphabet with the letter standing 3
places further down the alphabet.
 For each plaintext letter p, substitute the cipher text letter c
such that:
C = E(P) = (P+3) mod 26
 A shift may be any amount, so that general Caesar algorithm is
:
C = E (P) = (P+K) mod 26
 Where k takes on a value in the range 1 to 25.
 The decryption algorithm is simply
P = D(C) = (C-K) mod 26
 PLAIN TEXT :
PAY MORE MONEY
 CIPHER TEXT:
SDB PRUH PRQHB
 Note that the alphabet is wrapped
around, so that letter following „Z‟ is „A‟.
 The best known multiple letter encryption cipher is
the playfair, which treats digrams in the plaintext as
single units and translates these units into cipher
text digrams. The playfair algorithm is based on the
use of 5x5 matrix of letters constructed using a
keyword.
 Let the keyword be” MONARCHY “
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
 The matrix is constructed by filling in the
letters of the keyword (minus duplicates)
from left to right and from top to bottom,
and then filling in the remainder of the
matrix with the remaining letters in
alphabetical order.
 The letter “i‟ and “j‟ count as one letter.
Plaintext is encrypted two letters at a
time
 Repeating plaintext letters that would fall in the
same pair are separated with a Filler letter such as
„x‟.
 Plaintext letters that fall in the same row of the
matrix are each replaced by the letter to the right,
with the first element of the row following the last.
 Plaintext letters that fall in the same column are
replaced by the letter beneath, with the top element
of the column following the last.
 Otherwise, each plaintext letter is replaced by the
letter that lies in its own row And the column
occupied by the other plaintext letter.
It is another way to improve on the simple
monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds
through the plaintext message and this
approach is polyalphabetic cipher.
All the techniques
have the following features in common.
 A set of related monoalphabetic substitution
rules are used
 A key determines which particular rule is
chosen for a given transformation.
 In this scheme, the set of related monoalphabetic
substitution rules consisting of 26 Caesar Ciphers
with shifts of 0 through 25.
 Each cipher is denoted by a key letter.
 Each of the 26 ciphers is laid out horizontally, with
the key letter for each cipher to its left.
 A normal alphabet for the plaintext runs across the
top.
PLAIN TEXT
K a b c d e f g h i j k … x y z
E a A B C D E F G H I J K … X Y Z
Y b B C D E F G H I J K L … Y Z A
c C D E F G H I J K L M … Z A B
L d D E F G H I J K L M N … A B C
E e E F G H I J K L M N O … B C D
T f F G H I J K L M N O P … C D E
T g G H I J K L M N O P Q … D E F
E : : : : : : : : : : : : … : : :
R : : : : : : : : : : : : : : :
S x X Y Z A B C D E F G H … W
y Y Z A B C D E F G H I … X
z Z A B C D E F G H I J … Y
Encryption
 Given a key letter X and a plaintext letter y, the cipher text is at the
intersection of the row labelled x and the column labelled y; in this
case, the cipher text is V.
 To encrypt a message, a key is needed that is as long as the
message. Usually, the key is a repeating keyword.
Example:
 KEY= “d e c e p t i v e d e c e p t i v e d e c e p t i v e”
 PLAINTEXT = “w e a r e d i s c o v e r e d s a v e y o u r s e l f”
 CIPHER TEXT = “ZICVTWQNGRZGVTWAVZHCQYGLMGJ”
Decryption
 Decryption is equally simple. The key letter again identifies the row.
The position of the cipher text letter in that row determines the
column, and the plaintext letter is at the top of that column.
Q1.Create a cipher text using VIGENERE
cipher :
 KEY= “India”
 PLAINTEXT = “Rajasthan”

Contenu connexe

Tendances

Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 

Tendances (20)

RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Hash function
Hash function Hash function
Hash function
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 

Similaire à Monoalphabetic Substitution Cipher

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf
Meera357768
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
keyurbz
 

Similaire à Monoalphabetic Substitution Cipher (20)

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptx
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Crypto
CryptoCrypto
Crypto
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Caesar Cipher.pptx Information Security ppt
Caesar Cipher.pptx Information Security pptCaesar Cipher.pptx Information Security ppt
Caesar Cipher.pptx Information Security ppt
 

Plus de SHUBHA CHATURVEDI

Plus de SHUBHA CHATURVEDI (20)

Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
 
Unix and its Components
Unix and its ComponentsUnix and its Components
Unix and its Components
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
 
Linux Features
Linux FeaturesLinux Features
Linux Features
 
Architecture of Linux
 Architecture of Linux Architecture of Linux
Architecture of Linux
 
Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Stream Ciphers
Stream CiphersStream Ciphers
Stream Ciphers
 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
 
Homophonic Substitution Cipher
Homophonic Substitution CipherHomophonic Substitution Cipher
Homophonic Substitution Cipher
 
Classical encryption techniques
Classical encryption  techniquesClassical encryption  techniques
Classical encryption techniques
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
SECURITY SERVICES
SECURITY SERVICESSECURITY SERVICES
SECURITY SERVICES
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Monoalphabetic Substitution Cipher

  • 1. Prof. Neeraj Bhargava Mrs. Shubha Chaturvedi Department of Computer Science, School of Engineering & System Sciences MDS University Ajmer, Rajasthan
  • 2.  There are two basic building blocks of all Encryption Techniques: 1. SUBSTITUTION 2. TRANSPOSITION.
  • 4.
  • 5. A Substitution Technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols. If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with cipher text bit patterns.
  • 6.  The earliest known use of a substitution cipher and the simplest was by Julius Caesar. The Caesar cipher involves replacing each letter of the alphabet with the letter standing 3 places further down the alphabet.  For each plaintext letter p, substitute the cipher text letter c such that: C = E(P) = (P+3) mod 26  A shift may be any amount, so that general Caesar algorithm is : C = E (P) = (P+K) mod 26  Where k takes on a value in the range 1 to 25.  The decryption algorithm is simply P = D(C) = (C-K) mod 26
  • 7.  PLAIN TEXT : PAY MORE MONEY  CIPHER TEXT: SDB PRUH PRQHB  Note that the alphabet is wrapped around, so that letter following „Z‟ is „A‟.
  • 8.  The best known multiple letter encryption cipher is the playfair, which treats digrams in the plaintext as single units and translates these units into cipher text digrams. The playfair algorithm is based on the use of 5x5 matrix of letters constructed using a keyword.  Let the keyword be” MONARCHY “ M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z
  • 9.  The matrix is constructed by filling in the letters of the keyword (minus duplicates) from left to right and from top to bottom, and then filling in the remainder of the matrix with the remaining letters in alphabetical order.  The letter “i‟ and “j‟ count as one letter. Plaintext is encrypted two letters at a time
  • 10.  Repeating plaintext letters that would fall in the same pair are separated with a Filler letter such as „x‟.  Plaintext letters that fall in the same row of the matrix are each replaced by the letter to the right, with the first element of the row following the last.  Plaintext letters that fall in the same column are replaced by the letter beneath, with the top element of the column following the last.  Otherwise, each plaintext letter is replaced by the letter that lies in its own row And the column occupied by the other plaintext letter.
  • 11. It is another way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message and this approach is polyalphabetic cipher. All the techniques have the following features in common.  A set of related monoalphabetic substitution rules are used  A key determines which particular rule is chosen for a given transformation.
  • 12.  In this scheme, the set of related monoalphabetic substitution rules consisting of 26 Caesar Ciphers with shifts of 0 through 25.  Each cipher is denoted by a key letter.  Each of the 26 ciphers is laid out horizontally, with the key letter for each cipher to its left.  A normal alphabet for the plaintext runs across the top.
  • 13. PLAIN TEXT K a b c d e f g h i j k … x y z E a A B C D E F G H I J K … X Y Z Y b B C D E F G H I J K L … Y Z A c C D E F G H I J K L M … Z A B L d D E F G H I J K L M N … A B C E e E F G H I J K L M N O … B C D T f F G H I J K L M N O P … C D E T g G H I J K L M N O P Q … D E F E : : : : : : : : : : : : … : : : R : : : : : : : : : : : : : : : S x X Y Z A B C D E F G H … W y Y Z A B C D E F G H I … X z Z A B C D E F G H I J … Y
  • 14. Encryption  Given a key letter X and a plaintext letter y, the cipher text is at the intersection of the row labelled x and the column labelled y; in this case, the cipher text is V.  To encrypt a message, a key is needed that is as long as the message. Usually, the key is a repeating keyword. Example:  KEY= “d e c e p t i v e d e c e p t i v e d e c e p t i v e”  PLAINTEXT = “w e a r e d i s c o v e r e d s a v e y o u r s e l f”  CIPHER TEXT = “ZICVTWQNGRZGVTWAVZHCQYGLMGJ” Decryption  Decryption is equally simple. The key letter again identifies the row. The position of the cipher text letter in that row determines the column, and the plaintext letter is at the top of that column.
  • 15. Q1.Create a cipher text using VIGENERE cipher :  KEY= “India”  PLAINTEXT = “Rajasthan”