0% found this document useful (0 votes)
14 views251 pages

Group 1 Group 4 Net Ad Reports

Uploaded by

Franken Stein
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views251 pages

Group 1 Group 4 Net Ad Reports

Uploaded by

Franken Stein
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 251

1

SUMMARY

• Cellphone addiction is one of a major issue nowadays, with 80% of children checking their
phones every five minutes. It is estimated that 1.5 billion people in China, 24 million of them
are suspected to be addicted to technology, and parents are putting their children to detoxify
them of technology. The main reason for this addiction is social media, mobile games etc. The
most important details in this text are, people are spending more time on their devices than
talking to the people in front of them. Additionally, people are using their devices for alarm
clocks or sleep apps to help them get sleep, and that affects the release of melatonin in the
brain, leading to high energy before bed hopping that is why we get lack of sleep sometimes.
Your phone beside your bed has side effects like digital eye strains, increase illnesses and
even car accidents due to lack of sleeps.
CONVENTIONAL
ENCRYPTION
MODEL
Group 1
AGENDA
In this reporting we should be able to
know the definition of conventional
encryption model. The difference of
encryption and decryption and its
algorithms.
5

CONVENTIONAL
ENCRYPTION

also known as symmetric encryption, is a


cryptographic system that uses the same key to
encrypt and decrypt data. This type of
encryption is the most common and is used for a
variety of applications, including data protection,
secure communication, and digital signatures.
6

Encryption – Is the process of converting data into a


scrambled form cannot be read by anyone who does
not have the key to decrypt it.

Decryption – Is the proves of converting encrypted


data back into its original form. It is the reverse
process of encryption. Decryption requires the use
of key, which is a piece of data that is used to
encrypt and decrypt the data.
The conventional encryption model consists of the
following components:
• Plaintext: The original, unencrypted data.
• Encryption algorithm: : A mathematical function that transforms
the plaintext into ciphertext.
• Secret Key: A piece of data that is used to encrypt and
decrypt the plaintext.
• Cipher Text: The encrypted data.
• Decryption algorithm: A mathematical function that transforms
the ciphertext back into plaintext.
ENCRYPT AND DECRYPT
Some of the most common algorithms include:

• Data Encryption Standard (DES):


• Triple DES (3DES):
• Advanced Encryption Standard (AES):
DATA ENCRYPTION STANDARD (DES)

The Data Encryption Standard (DES) is a symmetric-key


block cipher that was adopted by the U.S. National Bureau
of Standards (NBS) in 1977. DES is a block cipher, which
means that it encrypts data in blocks of 64 bits at a time.
DES uses a key of 56 bits to encrypt the data. The key is
used to generate a series of permutations and substitutions
that are applied to the data. The result of this process is the
ciphertext, which is the encrypted data.
Here are some of the key features of DES:

First widely adopted symmetric encryption algorithm


A block cipher that encrypts data in a key length of 64-bit blocks
Has a 16 subkeys
Has subkey size of 48 bit
It is a symmetric-key block cipher.
It is vulnerable to brute-force attacks.
It is no longer considered to be secure for most applications.

DES has been influential in the advancement of cryptography. It was the


first widely adopted block cipher, and it helped to lay the foundation for
more secure block ciphers. DES is still used in some legacy systems, but it
is no longer considered to be secure for most applications.
ENCRYPTION PROCESS
64-bit 64-bit key
plaintext
Initial Permutation Permuted Choice 1
56
48
Round 1 Permuted Choice 56
Left Circular Shift
2
56
48
Round 2 Permuted Choice 56
Left Circular Shift
2
48
Round 16 Permuted Choice 56
Left Circular Shift
2

32-bit swap Final Permutation 64-bit


cipher
FEISTEL CIPHERS
TRIPLE DES (3DES)

Triple DES (3DES) is a symmetric-key block cipher


that applies the Data Encryption Standard (DES)
cipher algorithm three times to each data block. 3DES
was developed as a more secure alternative to DES
because of DES's small key length. In 3DES, the DES
algorithm is run through three times with three keys;
however, it is only considered secure if three separate
keys are used.
Here are some of the key features of
3DES:

It is a symmetric-key block cipher.


It uses a 168-bit key. (56-bits per key)
It is more secure than DES.
It is slower than DES.
It is still considered to be secure for
most applications.
ENCRYPTION PROCESS

Plaintext K1 K2 K3

Encryption Decryption Encryption

Ciphertex
t
All 3 Keys are the same = 56-bit
2 keys are the same, the other one is different = 112
-bit
All 3 keys are different = 168-bit
ADVANCED ENCRYPTION STANDARD (AES)

The Advanced Encryption Standard (AES) is a symmetric


-key block cipher that was adopted by the U.S. National
Institute of Standards and Technology (NIST) in 2001.
AES is a block cipher, which means that it encrypts data
in blocks of 128 bits at a time. AES uses a key of 128,
192, or 256 bits to encrypt the data. The key is used to
generate a series of permutations and substitutions that
are applied to the data. The result of this process is the
ciphertext, which is the encrypted data.
Here are some of the key features of
AES:

It is a symmetric-key block cipher.


It uses keys of 128, 192, or 256 bits.
It is considered to be one of the most
secure block ciphers in the world.
It is widely used in a variety of
applications.
ENCRYPTION PROCESS
Plaintext
Add Round Key K0 – [W0, W1, W2, W3]

Substitute R
bytes O Substitute R
U O
Shift Row bytes
N U
Shift Row N
Mix Columns D
# D
Add Round Key
Add Round Key 1 #
K10 – [W40, W41, W42, 10
K1 – [W4, W5, W6, W7] W43]
The process will repeat
until Round 10 Ciphertex
t
Conventional encryption is a
very common way to protect
data. It is used in a variety of
applications, including:
• Email
• File encryption
• Network Security
22

SUMMARY
The conventional encryption model is a secure way to
protect data from unauthorized access. However, it is
important to note that the secret key must be kept
secure. If the secret key is compromised, then an
attacker can decrypt the ciphertext and access the
plaintext.
CRYPTOGRAPHY
24

CRYPTOGRAPHY
is the practice and study of techniques for
secure communication in the presence of third
parties or the public. Cryptography
encompasses two main areas: encryption and
decryption. Encryption is the process of
converting plaintext into ciphertext, which is a
scrambled form of the original message that
cannot be read by anyone who does not have
the key to decrypt it. Decryption is the process of
converting ciphertext back into plaintext.
25

CRYPTOGRAPHY
Cryptography is used in a wide variety of
applications, including:

Data protection: Cryptography is used to


protect data from unauthorized access. For
example, it is used to encrypt files, emails,
and other sensitive information.
Secure communication: Cryptography is used
to secure communication between two
parties. For example, it is used to encrypt
phone calls, emails, and other forms of online
communication.
26

CRYPTOGRAPHY
Digital signatures: Cryptography is used to
create digital signatures, which are used to
verify the authenticity of a message or
document.
Non-repudiation: Cryptography is used to
provide non-repudiation, which is a guarantee
that the sender of a message cannot deny
having sent it.
27

CRYPTOGRAPHY
Cryptography is a complex and ever-evolving field.
New techniques are constantly being developed to
improve the security of cryptographic systems.
However, no cryptographic system is completely
unbreakable. As new techniques are developed,
attackers also develop new techniques to break
them. This is why it is important to keep up with the
latest security developments and to use strong
cryptographic algorithms.
28

HERE ARE SOME OF THE MOST


COMMON TYPES OF CRYPTOGRAPHY
Symmetric encryption: Symmetric encryption uses the same key to
encrypt and decrypt data. This type of encryption is the most
common and is used for a variety of applications, including data
protection, secure communication, and digital signatures.
Asymmetric encryption: Asymmetric encryption uses two different
keys, a public key and a private key. The public key is used to
encrypt data, while the private key is used to decrypt it. This type of
encryption is used for applications that require strong security, such
as digital signatures and non-repudiation.
Hashing: Hashing is a process of converting data into a fixed-
length value. This value is called a hash. Hashes are used for a
variety of applications, including verifying the integrity of data,
creating digital signatures, and storing passwords.
29

HERE ARE SOME OF THE MOST


COMMON TYPES OF CRYPTOGRAPHY
Block ciphers: Block ciphers are a type of symmetric
encryption algorithm that encrypts data in blocks.
Block ciphers are the most common type of
symmetric encryption algorithm.
Stream ciphers: Stream ciphers are a type of
symmetric encryption algorithm that encrypts data
one bit at a time. Stream ciphers are often used in
applications where real-time encryption is required,
such as voice and video communication.
30

SUMMARY
Cryptography is a powerful tool that can be used to
protect data from unauthorized access. However, using
cryptography correctly and keeping up with the latest
security developments is important. By following these
guidelines, you can help to ensure that your data is
protected.
STEGANOGRAPHY
32

STEGANOGRAPHY
is the practice of hiding secret messages within
other messages or objects. The hidden
message is called the stegotext, and the carrier
of the hidden message is called the stegocarrier.
Steganography is often used to send
confidential information over insecure channels,
such as the internet.
33

TWO MAIN TYPES


OF STEGANOGRAPHY

• Digital steganography and;

• Analog steganography
34

DIGITAL STEGANOGRAPHY

- is used to hide secret messages within digital files,


such as images, audio files, and video files.

- Let’s take an image as an example. From the


computer’s point of view, it is a collection of
hundreds of thousands of pixels. Each pixel has a
“description” — information about its color.
35

DIGITAL STEGANOGRAPHY
36

ANALOG STEGANOGRAPHY
- steganography is used to hide secret messages
within analog media, such as paper, photographs,
and audio recordings.
37

STEGANOGRAPHY
Steganography is a complex and ever-evolving
field. New techniques are constantly being
developed to improve the security of
steganographic systems. However, no
steganographic system is completely
unbreakable. As new techniques are developed,
attackers also develop new techniques to break
them. This is why it is important to keep up with
the latest security developments and to use
strong steganographic algorithms.
38

COMMON TYPES
OF STEGANOGRAPHY

• Least Significant Bit (LSB) steganography

• Watermarking
39

LEAST SIGNIFICANT BITS


STEGANOGRAPHY
- is the most common type of digital steganography.
It works by hiding the secret message in the least
significant bits of the stegocarrier. The least
significant bits are the least important bits, and
they are often not noticeable to the human eye or
ear.
- hides the message by inserting the message at
the lower or rightmost bits in the cover work file as
a medium to hide the message.
40

WATERMARK
- is a type of steganography that is used to mark ownership
of digital media. A watermark is a small, invisible mark that
is embedded in the digital media.
-- The watermark can be used to identify the owner of
the digital media and to prevent copyright infringement.
41
42

SUMMARY
Steganography is a powerful tool that can
be used to hide confidential information.
However, it is important to use
steganography correctly and to keep up
with the latest security developments. By
following these guidelines, you can help
to ensure that your information is
protected.
Carrie Green
Programming your
mind for success
Classical Encryption
Techniques
Encryption

Encryption is the process of converting


information into a code to protect it from
unauthorized access. It is used to protect
sensitive information, such as passwords,
credit card numbers, and medical records.
Why Encryption is
important?
Encryption is important because it ensures
the confidentiality and privacy of sensitive
information, protects data from unauthorized
access and tampering, verifies data
authenticity and integrity, complies with
legal requirements, secures communication
channels, safeguards intellectual property,
and builds trust among users.
Encryption
There are two main types of encryption:
symmetric and asymmetric.
Symmetric encryption uses the same key to
encrypt and decrypt data. This type of encryption
is relatively fast and easy to implement. However,
it is also relatively easy to break if the key is
compromised.
Encryption
There are two main types of encryption:
symmetric and asymmetric.
Asymmetric encryption uses two keys, a public key
and a private key. The public key can be used to
encrypt data, but only the private key can be used to
decrypt it. This makes asymmetric encryption more
secure than symmetric encryption, but it is also
slower and more difficult to implement.
Classical Encryption
Techniques
Classical encryption techniques were used
before the advent of computers and rely on
mathematical transformations and simple
substitution rules to convert plaintext into
ciphertext. In classical encryption, the same
key is used for both encryption and
decryption, making it symmetrical
encryption.
Examples of Classical
Encryption Techniques

Substitution ciphers replace each letter in


the plaintext with a different letter, number,
or symbol.
Classical Substitution Ciphers:
1. Caesar Cipher: Shifting letters
2. Atbash Cipher: Reversing letters
3. Playfair Cipher: Substituting pairs of letters
4. Vigenère Cipher: Shifting based on a keyword
5. ROT13 Cipher: simple letter substitution
cipher where each letter is shifted by 13
places in the alphabet
Monoalphabetic
Cipher
A monoalphabetic cipher uses a single fixed
substitution alphabet to encrypt the
plaintext. Each letter in the plaintext is
replaced by a corresponding letter or
symbol in the ciphertext.
Examples of Classical
Encryption Techniques
The Caesar cipher is a simple encryption
technique that was used by Julius Caesar
to send secret messages. It works by
shifting each letter in the plaintext by a
fixed number of positions.
Examples of Classical
Encryption Techniques

The Caesar cipher is a symmetric encryption


method. This means that the same key is
used to encrypt and decrypt the message.
Examples of Classical
Encryption Techniques
For example, with a shift of -3, D would be
replaced by A, E would become B, and so
on. The Caesar cipher is relatively easy to
break, but it can be useful for simple
encryption tasks.
Examples of Classical
Encryption Techniques

Caesar Cipher
Plaintext : Hello
Shift/Key : +3
Cipher text: Khoor
Examples of Classical
Encryption Techniques

Caesar Cipher
Plaintext : Yellow
Shift/Key : +8
Cipher text: Gmttwe
Examples of Classical
Encryption Techniques

Caesar Cipher
Plaintext : Banana
Shift/Key : -2
Cipher text: Zylyly
Examples of Classical
Encryption Techniques

Caesar Cipher
Plaintext : Lemon
Shift/Key : -5
Cipher text: Gzhji
ROT13 cipher
(“rotate by 13 places”)

is a special case of the Ceasar cipher in which the shift is


always 13.
ROT13 cipher
The ROT13 cipher is a substitution cipher with a specific
key where the letters of the alphabet are offset 13 places.
I.e. all 'A's are replaced with 'N's, all 'B's are replaced with
'O's, and so on. It can also be thought of as a Caesar cipher
with a shift of 13.
ROT13 cipher
The ROT13 cipher is essentially a substitution cipher with a fixed key, if you know
the cipher is ROT13, then no additional information is needed to decrypt the
message. The substitution key is:
ROT13 Cipher
Plaintext : ATTACK AT
DAWN
Cipher text: NGGNPX NG
QNJA
ROT13 Cipher
Plaintext : yes master uwu
Cipher text: lrf znfgre hjh
ROT13 cipher
ROT13 was designed for use in Usenet newsgroups as a way to
hide the content of postings. For example, a person could use
ROT13 to encode an article he thinks may be offensive to some.
That way, those who would be offended can pass the message
over without having to see it, while others can use their ROT13
decoders (built into most newsreaders) to read the post.
Another way ROT13 has been used is scrambling email
addresses in the contents of news articles, making it difficult
for Internet spammers to steal the addresses.
ROT13 cipher
The ROT13 cipher offers almost no security, and can be
broken very easily. Even if an adversary doesn't know a
piece of ciphertext has been enciphered with the ROT13
cipher, they can still break it by assuming it is a
substitution cipher and determining the key using hill-
climbing. The ROT13 cipher is also an Caesar cipher with a
key of 13, so breaking it as a Caesar cipher also works.
Examples of Classical
Encryption Techniques

ATBASH Cipher
ATBASH (Aleph-Taw-Bet-Shin) is a monoalphabetic
substitution cipher originally used to encrypt the
hebrew alphabet it can be modified for use by any
known writing system with a standard collating order.
ATBASH Cipher
ATBASH cipher is a particular type of monoalphabetic
cipher formed by taking the alphabet and mapping it
to its reverse, so that the first letter becomes the last
letter, the second letter becomes the second to the
last letter, and so on
ATBASH Cipher
Due to the fact that there is only one way to perform
this, the Atbash cipher provides no communications
security, as it lacks any sort of key. If multiple
collating orders are available, which one was used in
encryption can be used as a key, but this does not
provide significantly more security, considering that
only a few letters can give away which one was used.
ATBASH Cipher
was made in Israel.
The original: Aleph-Taw-Bet-Shin
Different variant of ATBASH cipher:
BATGASH Aleph-Taw-Gimel-Shin
ASHBAR Aleph-Taw-Bet-Reish
ATBASH Cipher
Here is the example of ATBASH cipher:

Encryption: Decryption:
plain text: Divine Fury Cipher: WRERMV UFIB
Cipher: WRERMV UFIB plain text: Divine Fury
Polyalphabetic
Ciphers
Polyalphabetic ciphers are more secure
than monoalphabetic ciphers because they
use multiple substitution alphabets during
the encryption process. This makes it more
difficult for attackers to break the cipher by
using frequency analysis or other
cryptographic attacks.
Examples of Classical
Encryption Techniques

Vigenère cipher
First described by Giovan Battista Bellaso in 1553 but
was misattributed to Blaise de Vigenère, the cipher is
easy to understand and implement, but it resisted all
attempts to break it until 1863, This earned it the
description le chiffrage indéchiffrable (French for 'the
indecipherable cipher').
Examples of Classical
Encryption Techniques

Vigenère cipher
The Vigenère cipher is a method of encrypting
alphabetic text where each letter of the plaintext is
encoded with a different Caesar cipher, whose
increment is determined by the corresponding letter
of another text, the key.
Vigenère cipher
In order to encrypt and decrypt using Vigenere Cipher,
there are two important things to do this.
First one, we must be given a "key" which is a word that
would be used as basis for the increment encryption and
decryption.
Second, knowledge on the Caesar cipher mod 26.
Vigenère cipher
Encryption process:
Ciphertext = (Plaintext + key) Using mod 26(0-25 caesar cipher)

for example: lets say the word we want to encrypt is


saveme and the key given to us is cab
in order to
encrypt "saveme" we will add the value of saveme in
caesar's cipher and the key "cab"'s value in caesar cipher.
Vigenère cipher
Encryption process:
Ciphertext = (Plaintext + key) Using mod 26(0-25 caesar cipher)

Also, in order to fill in the missing letters, we repeat the "key" which is
cab until it has the same amount of letters as saveme.
so saveme 18(s) + 2(c) = 20(U)
+ cabcab 0(a)+0(a)=0(a) we end with
21(v)+1(b) = 22(w) uawgmf
4(e)+ 2(c)= (G)
12(m)+ 0(a) = 12(m)
4(e) + 1(b) = 5(f)
Vigenère cipher
Decryption Process:
Plaintext = (Ciphertext - Key) Using mod 26(0-25 caesar cipher)

uawgmf - 20(u)-2(c) = 18(S)


cabcab 0(a) - 0(a)= 0(a)
22(w) - 1(b) = 21(v)
g(6) - 2(c) = 4(e)
m(12) - 0(a) = 12(m)
5(f) - 1(b) = 4(e)
Playfair Cipher
The Playfair cipher or Playfair square or Wheatstone-
Playfair cipher is a manual symmetric encryption
technique and was the first literal digram substitution
cipher. The scheme was invented in 1854 by Charles
Wheatstone, but bears the name of Lord Playfair for
promoting its use. The technique encrypts pairs of
letters (bigrams or digrams).
Playfair Cipher
Restrictions:
- Only 25 alphabets are supported.
- Special characters like spaces, punctuation, numbers,
etc. are not allowed.
- There should be no repeated letters on the matrix.
Playfair Cipher
Rules of encryption: Playfair Cipher
1. Split the plaintext into digraph
2. If a pair contains repeated letters, we can use a filler letter such
as x.
3. If both the letters are in the same column, take the letter below
each one (going back to the top if at the bottom).
4. If both letters are in the same row, take the letter to the right of
each one (going back to the left if at the farthest right).
5. If neither of the preceding two rules are true, form a rectangle
with the two letters and take the letters on the horizontal
opposite corner of the rectangle.
Playfair Cipher

Example:
Plaintext: BALLOON
Key: ALMOST
Ciphertext: TLMWMSAR
Playfair Cipher
Applying the rules of encryption: Playfair Cipher
1. Split the plaintext into digraph
BA LL OO N
2. If a pair contains repeated letters, we can use a filler letter
such as x.
BA LX LO ON
Playfair Cipher
The first digraph is BA. The pair is visible in
several rows and columns. BA is encrypted
into TL using the Rule #5.

The second digraph is LX. The pair is visible


in several rows and columns. LX is encrypted
into MW using the Rule #5.
Playfair Cipher
The third digraph is LO. The pair is visible in
the same row. LO is encrypted into MS using
the Rule #4.

The fourth digraph is ON. The pair is visible in


several rows and columns. ON is encrypted
into MW using the Rule #5.
Conclusion
Classical encryption techniques and substitution
techniques have significantly influenced our modern lives
in terms of data security and privacy. These foundational
encryption methods have paved the way for the
development of sophisticated cryptographic systems used
today. By exploring mathematical transformations,
substitution rules, and the principles of encryption, we
gained a deeper understanding of how our sensitive
information is protected.
Caesar
Cipher
Group 3
WHAT'S IN THE PICTURE?
SCYTALE CIPHER
A type of paper or leather was wrapped
around a rod

Message was written on paper and


carried to the destination by messenger

The sender and destination had to have


a rod of the same diameter so that
each could read the message

Was used around 400 BC

Transposition cipher
Character become scrambled after
the paper is removed from the rod
R C I P H E R
C A E S A

FEAT U R E S
01. SUBSTITURION CIPHER
Caesar cipher is a type of monoalphabetic
substitution cipher, where each letter in the
plaintext is replaced by a letter some fixed number
of positions down the alphabet.

02. FIXED KEY


Uses a fixed key, which is the number of positions
by which the letters are shifted.

03. SYMMETRIC
ENCRYPTION
Caesar cipher is a symmetric encryption technique,
meaning that the same key is used for both
encryption and decryption.
04. LIMITED KEYSPACE
Has a very limited keyspace of only 26 possible
keys, as there are only 26 letters in the English
alphabet.

05. HISTORICAL CONTEXT


As one of the earliest known encryption methods,
the Caesar cipher is significant historically

06. EASY TO IMPLEMENT


Requires only simple arithmetic operations, making
it a popular choice for simple encryption tasks.
ENCRYPTION
& DECRYPTION
Caesar cipher is a simple method of
encoding messages. Caesar ciphers
use a substitution method where letters
in the alphabet are shifted by some
fixed number of spaces to yield an
encoding alphabet.
FORMULA
ENCRYPTION: E - the encryption
E(x) = (x + k) mod 26 D - the decryption

x - the letters' value


DECRYPTION k - key/shift value
D(x) = (x - k) mod 26
ENCRYPTION Start with the plaintext message.
In this case, it's "NET AD".
Let's say we want to encrypt
Choose a shift value. In this
the word "NET AD" using a example, it's 3.
Caesar cipher with shift of 3.
Here's how encryption work: Shift each letter in the plaintext
by the specified amount. In this
case, "N" becomes "Q", "E"
Encryption: becomes "H", "T" becomes "W", "A"
becomes "D", and “D” becomes
E(x) = (x + k) mod 26 “G”.

The encrypted message is the


result of the shifted letters. So,
"NET AD" becomes "QHW DG".
Plaintext Encryption Formula Ciphertext

N→ 13 E = (13 + 3) mod 26 16 →Q
E → 04 E = (04 + 3) mod 26 7→H

T → 19 E = (19 + 3) mod 26 22 → W

A → 00 E = (00 + 3) mod 26 03 → D

D → 03 E = (03 + 3) mod 26 06 → G

NETAD QHW DG
DECRYPTION
Start with the encrypted message.
In this case, it's "QHW DG".

Know the shift value used for


encryption. In this example, it's 3.

Decryption: Shift each letter in the encrypted


message backward by the
D(x) = (x - k) mod 26 specified amount. In this case,
"Q" becomes "N", "H" becomes "E",
"W" becomes "T", "D" becomes "A",
and "G" becomes "D".

The decrypted message is the


result of the shifted letters. So,
"QHW DG" becomes "NET AD".
Ciphertext Decryption Formula Plaintext

Q → 16 D = (16 - 3) mod 26 13→N


H→7 D = (07 - 3) mod 26 04 → E

W → 22 D = (22 - 3) mod 26 19 → T

D→3 D = (3 - 3) mod 26 0→A

G → 06 D = (06 - 3) mod 26 03 → D

QHW DG NETAD
EXAMPLE
E(x) = (x + k) mod 26
D(x) = (x - k) mod 26

Plaintext: Sadness Key(k): 9 Ciphertext: Bjmwnbb

PLAINTEXT ALPHABET
A, B, C, D, E, F, G, H, I, J,
K, L, M, N, O, P, Q, R, S, T,
U, V, W, X, Y, Z
Plaintext Encryption Formula Ciphertext

S→ 18 E = (18 + 9) mod 26 1→B


A → 00 E = (00 + 9) mod 26 9→J

D → 03 E = (03 + 9) mod 26 12 → M

N → 13 E = (13 + 9) mod 26 22 → w

E → 04 E = (04 + 9) mod 26 13 → N

S → 18 E = (18 + 9) mod 26 1→ B

S → 18 E = (18 + 9) mod 26 1→ B

SADNESS BJMWNBB
Ciphertext Decryption Formula Plaintext

B→1 E = (1 - 9) mod 26 18→S


J→9 E = (9 - 9) mod 26 00 → A

M → 12 E = (12 - 9) mod 26 03 → D

W → 22 E = (22 - 9) mod 26 13 → N

N → 13 E = (13 - 9) mod 26 04 → E

B →1 E = (1 - 9) mod 26 18 → S

B →1 E = (1 - 9) mod 26 18 → S

BJMWNBB SADNESS
EXAMPLE
E(x) = (x + k) mod 26

Plaintext(x): Sir Dom Key(k): 10 Ciphertext: ?

PLAINTEXT ALPHABET
A, B, C, D, E, F, G, H, I, J,
K, L, M, N, O, P, Q, R, S, T,
U, V, W, X, Y, Z
Plaintext Encryption Formula Ciphertext

S→ 18 E = (18 + 10) mod 26 2→C


I → 08 E = (08 + 10) mod 26 18 → S

R → 17 E = (17 + 10) mod 26 1→B

D → 03 E = (03 + 10) mod 26 13 → N

O → 14 E = (14 + 10) mod 26 24 → Y

M → 12 E = (12 + 10) mod 26 22 → W

SIR DOM CSB NYW


EXAMPLE
D(x) = (x - k) mod 26

Ciphertext(x): Hgjotm qg Key(k): 6 Plaintext: ?


Ciphertext Decryption Formula Plaintext

H→ 07 E = (7 - 6) mod 26 1→B
G → 06 E = (6- 6) mod 26 00 → A

J → 09 E = (9 - 6) mod 26 03 → D

O → 14 E = (14 - 6) mod 26 8→I

T → 19 E = (19 - 6) mod 26 13 → N

M → 12 E = (12- 6) mod 26 6→G

Q → 16 E = (16 - 6) mod 26 10 → K

G → 09 E = (6 - 6) mod 26 0→A

HGJOTM QG BADING KA

happy pride month mga accla!! <333333


CRYPTANALYSIS
METHODS TO BREAK
DOWN CAESAR CIPHER

Brute Force Known plaintext


attack
This is the simplest
method. Simply try This method takes
every possible key advantage of the fact
until the ciphertext is that sometimes the
decrypted. ciphertext may contain
known plaintext, such as a
name or a date. This can
be used to narrow down
the possible keys.
BRUTE FORCE
There are three (3) requirements needed for a brute force attack
to be successful:

• We know the encryption and decryption

• The number of possible keys is small

• The plain text language is known, and we can easily recognize


it.
So, let’s try a brute force attack on the encrypted
message: UVACLYFZLJBYL
KNOWN PLAINTEXT ATTACK
Let's say we have the following known plaintext and ciphertext pair:

Plaintext: ATTACK Ciphertext: DWWDFN

The key for this Caesar cipher is a shift of 3.


PROS & CONS
PROS CONS
Vulnerable to Brute
Simplicity
Force Attacks
Conceptual
Lack of Security
Understanding
Limited Key Space
Encoding Non-
Inability to Handle
sensitive
Numbers and
Information
Special Characters

Not very versatile


END OF
REPORT

Gaius Julius Caesar


12 July 100 BC – 15 March 44 BC




Leon Battista Alberti


February 14, 1404 – April 25, 1472








Blaise de Vigenère
April 5, 1523 - February 19, 1596


PLAINTEXT

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A

C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B

D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D

F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E

G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F

H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G

I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H

J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I

K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J

L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
KEY
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L

N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M

O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N

P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O

Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P

R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q

S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R

T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S

U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T

V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U

W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V

X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X

Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
PLAINTEXT

A B C D E F G H I J K L M N O P Q R

A A B C D E F G H I J K L M N O P Q R

B B C D E F G H I J K L M N O P Q R S

C C D E F G H I J K L M N O P Q R S T

D D E F G H I J K L M N O P Q R S T U

E E F G H I J K L M N O P Q R S T U V

F F G H I J K L M N O P Q R S T U V W

G G H I J K L M N O P Q R S T U V W X

H H I J K L M N O P Q R S T U V W X Y

I I J K L M N O P Q R S T U V W X Y Z

J J K L M N O P Q R S T U V W X Y Z A

K K L M N O P Q R S T U V W X Y Z A B
K L L M N O P Q R S T U V W X Y Z A B C
E
Y M M N O P Q R S T U V W X Y Z A B C D

N N O P Q R S T U V W X Y Z A B C D E

O O P Q R S T U V W X Y Z A B C D E F

P P Q R S T U V W X Y Z A B C D E F G

Q Q R S T U V W X Y Z A B C D E F G H

R R S T U V W X Y Z A B C D E F G H I
PLAINTEXT

A B C D E F G H I J K L M N O P Q R

A A B C D E F G H I J K L M N O P Q R

B B C D E F G H I J K L M N O P Q R S

C C D E F G H I J K L M N O P Q R S T

D D E F G H I J K L M N O P Q R S T U

E E F G H I J K L M N O P Q R S T U V

F F G H I J K L M N O P Q R S T U V W

G G H I J K L M N O P Q R S T U V W X

H H I J K L M N O P Q R S T U V W X Y

I I J K L M N O P Q R S T U V W X Y Z

J J K L M N O P Q R S T U V W X Y Z A

K K L M N O P Q R S T U V W X Y Z A B
K L L M N O P Q R S T U V W X Y Z A B C
E
Y M M N O P Q R S T U V W X Y Z A B C D

N N O P Q R S T U V W X Y Z A B C D E

O O P Q R S T U V W X Y Z A B C D E F

N P Q R S T U V W X Y Z A B C D E F G

Q Q R S T U V W X Y Z A B C D E F G H

R R S T U V W X Y Z A B C D E F G H I

Sir Francis Beaufort


May 27, 1774 – December 17, 1857





























You might also like