5 Lec
5 Lec
Cryptography: Part II
Week 04 – Security in Computing
Revision
• Analyzed the underlying concepts of cryptography such as symmetric and asymmetric encryption and their
components.
• Understood the three independent dimensions of cryptographic systems.
• Understood the concepts of unconditional and computational security.
• Analyzed the working principle of the Caesar substitution cipher.
Rule 01. Repeating letters of the plaintext which are in the same pair E F G I/J K
are separated with a filler letter such as “X”. L P Q S T
So that, BALLOON would be treated as BA LX LO ON. U V W X Z
Rule 02. Plain text letters in the same row are replaced by letters to
the right (ar -> rm). 5 X 5 matrix
Rule 03. Plain text letters in the same column are replaced by the
letters below (mu -> cm).
Rule 04. Else, each plaintext letter in a pair is replaced by the letter
that lies in its own row and column occupied by other plain text letter (hs
-> bp).
M E M A T R H T G P R Y
E T E F E T E O A A T
Matrix: 2 x 23
• Hence, cipher text: TTNA APTM TSUO AODW COIX KNLY PETZ