Classical Encryption Techniques

1,272 views 26 slides Sep 11, 2022
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

Cryptography and Network Security - Classical Encryption Techniques


Slide Content

CS8792 – Cryptography and Network Security ~ S. Janani , AP/CSE KCET Classical Encryption Techniques

Contents Basic Terminology Symmetric Encryption model Classical Encryption Techniques Substitution Cipher Transposition Cipher Steganography Rotar Machines

Basic Terminology Plaintext – The original message Ciphertext – Coded message Enciphering/Encryption – Process of converting from PT to CT Deciphering/Decryption – Process of converting from CT to PT Cryptography – Study of encryption Cryptanalysis – Techniques used to decrypt a message without any knowledge of encrypting details Cryptology – Cryptography + Cryptanalysis

Symmetric Encryption Model Conventional or single key encryption system Was the only type of encryption in prior to public key encryption in 1970’s

Model of Symmetric Crypto system

3 Dimensions of Cryptographic System

Types of Attacks

Bruteforce attack

Substitution Techniques Letters of plain texts are replaced by the other letters or by numbers or symbols

1. Caesar Cipher

2. Monoalphabetic cipher

3. Polyalphabetic cipher Uses number of substitutions at different positions of a message

Playfair Cipher

Hill Cipher Developed by the Mathematician Lester Hill in1929 Strength is that it completely hides single-letter frequencies The use of a larger matrix hides mode frequency information A 3X3 Hill cipher hides not only single-letter but also two-letter frequency information Strong against a ciphertext -only attack but easily broken with a know plaintext attack

Vigenere Cipher

Vernam Cipher

Transposition Cipher

Row Columnar Transposition