unit_2_symmetric_ciphers_notes
unit_2_symmetric_ciphers_notes
Symmetric cryptography is a form of encryption where the same key is used for both encryption and
decryption. This model is widely used due to its simplicity and efficiency, particularly for large
amounts of data.
- Encryption Algorithm: A method or mathematical function that converts plaintext into an unreadable
- Ciphertext: The encrypted form of the message that cannot be understood without decryption.
- Shared Key: A single secret key that is known to both the sender and the receiver. It must be kept
- Decryption Algorithm: A reverse function of the encryption algorithm that converts ciphertext back
- Plaintext: "HELLO"
- Ciphertext: "KHOOR"
This model forms the foundation for symmetric encryption systems like DES and AES.
2. Substitution Techniques:
Substitution techniques are a class of encryption methods where the characters of the plaintext are
replaced with other characters, symbols, or groups of symbols. It is one of the earliest forms of
encryption.
a. Caesar Cipher:
- The Caesar Cipher involves shifting each letter of the plaintext by a fixed number of positions in
the alphabet.
- Example:
Plaintext: "ATTACK"
Shift: 3
Ciphertext: "DWWDFN"
b. Monoalphabetic Cipher:
- Unlike the Caesar Cipher, which uses a fixed shift, a monoalphabetic cipher replaces each letter
- Example:
Plaintext: "HELLO"
Ciphertext: "ITSSG"
While more secure than the Caesar Cipher, the monoalphabetic cipher is still vulnerable to
frequency analysis since some letters appear more frequently in the English language (e.g., E, T, A).
c. Playfair Cipher:
- The Playfair Cipher encrypts pairs of letters instead of single letters, which makes it more secure
than simple substitution.
- Steps:
d. Vigenère Cipher:
- The Vigenère Cipher is a polyalphabetic substitution cipher that uses a keyword to determine
- Steps:
3. Shift each letter of the plaintext based on the corresponding letter of the keyword.
Example:
Plaintext: "HELLO"
Keyword: "KEY"
Ciphertext: "RIJVS"
3. Transposition Techniques:
Unlike substitution techniques, transposition techniques rearrange the positions of the characters in
- The text is written in a zigzag pattern across rows and then read row-by-row.
- Example:
Plaintext: "HELLO WORLD"
Zigzag Pattern:
H L O O L
ELOWRD
- The plaintext is written in rows under columns, and the columns are reordered based on a
keyword.
- Steps:
4. Steganography:
Steganography involves hiding the existence of a message rather than encrypting it. The goal is to
conceal the message in a way that it is not obvious that communication is taking place.
Examples:
In block ciphers, the plaintext is divided into fixed-size blocks, and each block is encrypted
separately.
Steps:
- Each block undergoes rounds of encryption, which involve substitution, permutation, and XOR
operations.
Block ciphers form the basis of algorithms like DES and AES.
The Data Encryption Standard (DES) is a symmetric-key block cipher developed in the 1970s.
Although now considered outdated, it played a key role in the evolution of cryptography.
Features of DES:
- Number of rounds: 16
Steps of DES:
2. 16 Rounds of Processing:
- Each round involves expansion, XOR with the key, substitution using S-boxes, and permutation.
Limitations:
Features of AES:
- Number of rounds:
Steps of AES:
Applications of AES:
Conclusion:
This unit covered both classical encryption techniques and modern symmetric ciphers. Classical
techniques like substitution and transposition ciphers laid the groundwork for more advanced
methods like DES and AES, which are widely used today for securing data.