SlideShare a Scribd company logo
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 Encryption algorithm: The encryption algorithm performs various
substitutions and transformations on the plaintext.
 Secret key: The secret key is also input to the encryption algorithm.
The key is a value independent of the plaintext and of the algorithm.
The algorithm will produce a different output depending on the
specific key being used at the time.
Classical Encryption Techniques 1
 Ciphertext: This is the scrambled message produced as output. It
depends on the plaintext and the secret key.
 Decryption algorithm: This is essentially the encryption algorithm run
in reverse. It takes the ciphertext and the secret key and produces
the original plaintext.
Classical Encryption Techniques 1
 Symmetric-key algorithms are algorithms for cryptography that use
the same cryptographic keys for both encryption of plaintext and
decryption of ciphertext.
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Cipherered text
3
IODQN HDVW
DWWDFN DW GDZQ
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The clear text message would be
encoded using a key of 3.
1
FLANK EAST
ATTACK AT DAWN
Shift the top
scroll over by
three characters
(key of 3), an A
becomes D, B
becomes E, and
so on.
2
The clear text message would
be encrypted as follows using a
key of 3.
Clear text
Classical Encryption Techniques 1
 Caesar Cipher
 Monoalphabetic Ciphers
 Playfair Cipher
 Hill Cipher
 Polyalphabetic Ciphers
 Vigenère Cipher
 Autokey Cipher
 Vernam Cipher
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
Caesar Cipher is one of the simplest and most
widely known encryption techniques.
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 PlainText = dcodex
 K=3
1) P=d
2) P=3
3) C=P+K mod 26=3+3 mod 26=6 mod 26 =6
4) C=g
Classical Encryption Techniques 1
 PlainText = dcodex
 K=3
1) P=x
2) P=23
3) C=P+K mod 26=23+3 mod 26=26 mod 26= 0
4) C=a
Classical Encryption Techniques 1
 P= dcodex
 C= gfrgha
 K=3
Classical Encryption Techniques 1
 CipherText = gfrgha
 K=3
1) C=g
2) C=6
3) P=C-K mod 26=6-3 mod 26=3
4) P=d
Classical Encryption Techniques 1
 CipherText = gfrgha
 K=3
1) C=a
2) C=0
3) P=C-K mod 26=0-3 mod 26=-3 mod 26 =23
4) P=x
Classical Encryption Techniques 1
 C= gfrgha
 P= dcodex
 K=3
Classical Encryption Techniques 1
 Three important characteristics of this problem enabled us to use a
bruteforce cryptanalysis:
The encryption and decryption algorithms are known.
There are only 25 keys to try.
The language of the plaintext is known and easily
recognizable.
Classical Encryption Techniques 1
Classical Encryption Techniques 1
How to implement Caesar Cipher
technique on Arabic letters?
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
A monoalphabetic cipher uses fixed substitution over
the entire message
Random Key
Classical Encryption Techniques 1
 Example:
Plaintext alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY
 P= ITEMS
 Encoding
 C= FQAIP
 Decoding
 P= ITEMS
Classical Encryption Techniques 1
 Relative Frequency of
Letters in English Text
Classical Encryption Techniques 1
 C=
Classical Encryption Techniques 1
 cipher letters P and Z are the equivalents of plain letters e and t
Classical Encryption Techniques 1
 Finally, The complete plaintext
Classical Encryption Techniques 1
How to implement Monoalphabetic
Cipher technique on Arabic letters?
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
 The Playfair system was invented by Charles Wheatstone, who first
described it in 1854.
 Used by many countries during wartime
 The Playfair algorithm is based on the use of a 5 x 5 matrix of
letters constructed using a keyword.
Classical Encryption Techniques 1
 In this case, the keyword is monarchy.
Classical Encryption Techniques 1
 4 Rules:
1) If both letters are the same (or only one letter is left),
add an "X" after the first letter.
2) If the letters appear on the same row of your table,
replace them with the letters to their immediate right
respectively
Classical Encryption Techniques 1
 4 Rules:
3) If the letters appear on the same column of your table,
replace them with the letters immediately below
respectively
4) If the letters are not on the same row or column, replace
them with the letters on the same row respectively but at
the other pair of corners of the rectangle defined by the
original pair.
Classical Encryption Techniques 1
 P=Hide the gold in the tree stump (note the null "X" used to separate
the repeated "E"s)
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
 K= playfair example
Classical Encryption Techniques 1
 How to build 5x5 Matrix (assuming that I and J are
interchangeable), the table becomes (omitted letters in red):
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
 P= HI DE TH EG OL DI NT HE TR EX ES TU MP
Classical Encryption Techniques 1
C= BM OD ZB XD NA BE KU DM UI XM MO UV IF
the message "Hide the gold in the tree stump" becomes
"BMODZ BXDNA BEKUD MUIXM MOUVI F"
Classical Encryption Techniques 1
Using Playfair Cipher how to decrepit the
following cipher text:
C= “BMODZ BXDNA BEKUD MUIXM MOUVI F”
K= playfair example
Classical Encryption Techniques 1
Symmetric Encryption
Substitution Techniques
Caesar Cipher
Monoalphabetic Cipher
Playfair Cipher
Hill Cipher
Classical Encryption Techniques 1
 The Hill Cipher was invented by Lester S. Hill in 1929
 The Hill Cipher based on linear algebra
 Encryption
 2 x 2 Matrix Encryption
 3 x 3 Matrix Encryption
Classical Encryption Techniques 1
 square matrix 𝑀 by the equation 𝑀𝑀−1
= 𝑀−1
𝑀= 𝐼, where 𝐼 is the
identity matrix.
 C = P*K mod 26
Classical Encryption Techniques 1
Classical Encryption Techniques 1
 Example of Key 2 x 2
 𝐾 =
𝐻 𝐼
𝐿 𝐿
=
7 8
11 11
 plaintext message "short example“
 𝑃= short example
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
 𝐶 = 𝐾 ∗ 𝑃 𝑚𝑜𝑑 26

𝑘0 𝑘1
𝑘2 𝑘3
∗
𝑝0
𝑝1
=
𝑘0 ∗ 𝑝0 + 𝑘1 ∗ 𝑝1
𝑘2 ∗ 𝑝0 + 𝑘3 ∗ 𝑝1

7 8
11 11
∗
18
7
=
7 ∗ 18 + 8 ∗ 7
11 ∗ 18 + 11 ∗ 7
=
182
275
 𝐶 =
182
275
𝑚𝑜𝑑 26 =
0
15
=
𝑎
𝑝
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝑃 =
𝑆
ℎ
𝑜
𝑟
𝑡
𝑒
𝑥
𝑎
𝑚
𝑝
𝑙
𝑒
=
18
7
14
17
19
4
23
0
12
15
11
4
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
 This gives us a final ciphertext of "APADJ TFTWLFJ"
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
 This gives us a final ciphertext of "APADJ TFTWLFJ“
 𝐾 =
𝐻 𝐼
𝐿 𝐿
=
7 8
11 11
 We want to find 𝐾−1
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 1 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡
𝐷 𝐾 = 7 ∗ 11 − 8 ∗ 11 = −11 𝑚𝑜𝑑 26 = 15
𝐷𝐷−1
= 1 𝑚𝑜𝑑 26 = 15 ∗ 𝐷−1
15 ∗ 𝐷−1
𝑚𝑜𝑑 26 = 1
Try and Test 1 𝑚𝑜𝑑 26 = 105
105 mod 26 =1
𝐷−1
= 7
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 2 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥 𝑜𝑓 𝐾𝑒𝑦
𝑎𝑑𝑗
𝑎 𝑏
𝑐 𝑑
=
𝑑 −𝑏
−𝑐 𝑎
𝑎𝑑𝑗
7 8
11 11
=
11 −8
−11 7
mod 26 =
11 18
15 7
Classical Encryption Techniques 1
 𝑆𝑡𝑒𝑝 3 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑦 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡
𝑏𝑦 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥
 7 ∗
11 18
15 7
=
77 126
105 49
𝑚𝑜𝑑 26 =
25 22
1 23
= 𝐾−1
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
 𝐶 =
𝑎
𝑝
𝑎
𝑑
𝑗
𝑡
𝑓
𝑡
𝑤
𝑙
𝑓
𝑗
=
0
15
0
3
9
19
5
19
22
11
5
9
Classical Encryption Techniques 1
Using Hill Cipher how to implement 3x3 matrix
encryption ? The key for a hill cipher is a matrix
e.g. 𝒌 =
2 4 5
9 2 1
3 17 7
and message= ATTACK AT DAWN
Classical Encryption Techniques 1
 Use MS Word
 Send me mail to mloey@live.com with email subject “
Classical Encryption Techniques 1 “
 Put your name on Arabic with department and section on word and
email body
 Finally, press Send
 Deadline Next Lecture
Classical Encryption Techniques 1
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
Classical Encryption Techniques 1
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

More Related Content

What's hot (20)

symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
Sou Jana
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Hash Function
Hash Function Hash Function
Hash Function
ssuserdfb2da
 
Aes
AesAes
Aes
Muhammad Asif
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
RAMPRAKASHT1
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
Sam Bowne
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
ArthyR3
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
Sou Jana
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
RAMPRAKASHT1
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
Sam Bowne
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
ArthyR3
 

Viewers also liked (20)

Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Mohamed Loey
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
Mohamed Loey
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
dmc5abdulla
 
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
Venkat Sandeep Manthi
 
Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12
Dr Mariann Hardey
 
Tx 3 hill shuman_oliver
Tx 3 hill shuman_oliverTx 3 hill shuman_oliver
Tx 3 hill shuman_oliver
OPUNITE
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
Sina Manavi
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
Aashirwad Kashyap
 
Crypto tools
Crypto toolsCrypto tools
Crypto tools
Naga Srimanyu Timmaraju
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
Robert Talbert
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
Noctorous Jamal
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
zapp0
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
Stephen Lahanas
 
Excel Lecture
Excel LectureExcel Lecture
Excel Lecture
deborah canning
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
Noctorous Jamal
 
Decoding QR codes
Decoding QR codesDecoding QR codes
Decoding QR codes
Maria Vassilopoulou
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
Prabhat Goel
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
ClientSide
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Mohamed Loey
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
Mohamed Loey
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
dmc5abdulla
 
Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12
Dr Mariann Hardey
 
Tx 3 hill shuman_oliver
Tx 3 hill shuman_oliverTx 3 hill shuman_oliver
Tx 3 hill shuman_oliver
OPUNITE
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
Sina Manavi
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
Aashirwad Kashyap
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
Robert Talbert
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
Noctorous Jamal
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
zapp0
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
Stephen Lahanas
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
Prabhat Goel
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
ClientSide
 
Ad

Similar to Computer Security Lecture 2: Classical Encryption Techniques 1 (20)

Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniques
Jay Nagar
 
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
maniv2769
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
Infinity Tech Solutions
 
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptxSYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
ajajkhan16
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
JeevananthamArumugam
 
Mod1 basics cryptography first module vtu
Mod1 basics cryptography first module vtuMod1 basics cryptography first module vtu
Mod1 basics cryptography first module vtu
MonaReddy12
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S
 
algorithms so d6yeudh yedghd eg edej.pdf
algorithms so d6yeudh yedghd eg edej.pdfalgorithms so d6yeudh yedghd eg edej.pdf
algorithms so d6yeudh yedghd eg edej.pdf
nothma
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
ramya marichamy
 
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptxMODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
Shivakumar M
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
dhivyakesavan3
 
Classical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptxClassical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptx
MohammadRafsunIslam
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
rajirajesh8
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ShilpaShettyA1
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
ch02 cryptograpghy in network security.ppt
ch02 cryptograpghy in network security.pptch02 cryptograpghy in network security.ppt
ch02 cryptograpghy in network security.ppt
ubaidullah75790
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
ShailendraPardeshi4
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
Prachi Gulihar
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniques
Jay Nagar
 
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
maniv2769
 
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptxSYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
ajajkhan16
 
Mod1 basics cryptography first module vtu
Mod1 basics cryptography first module vtuMod1 basics cryptography first module vtu
Mod1 basics cryptography first module vtu
MonaReddy12
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S
 
algorithms so d6yeudh yedghd eg edej.pdf
algorithms so d6yeudh yedghd eg edej.pdfalgorithms so d6yeudh yedghd eg edej.pdf
algorithms so d6yeudh yedghd eg edej.pdf
nothma
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
ramya marichamy
 
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptxMODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
Shivakumar M
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
dhivyakesavan3
 
Classical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptxClassical_Encryption_techniquescryp.pptx
Classical_Encryption_techniquescryp.pptx
MohammadRafsunIslam
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
rajirajesh8
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
ch02 cryptograpghy in network security.ppt
ch02 cryptograpghy in network security.pptch02 cryptograpghy in network security.ppt
ch02 cryptograpghy in network security.ppt
ubaidullah75790
 
Ad

More from Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
Mohamed Loey
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
Mohamed Loey
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
Mohamed Loey
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
Mohamed Loey
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
Mohamed Loey
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
Mohamed Loey
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
Mohamed Loey
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
Mohamed Loey
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
Mohamed Loey
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
Mohamed Loey
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
Mohamed Loey
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
Mohamed Loey
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
Mohamed Loey
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
Mohamed Loey
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
Mohamed Loey
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
Mohamed Loey
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
Mohamed Loey
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
Mohamed Loey
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
Mohamed Loey
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
Mohamed Loey
 
Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
Mohamed Loey
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
Mohamed Loey
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
Mohamed Loey
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
Mohamed Loey
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
Mohamed Loey
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
Mohamed Loey
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
Mohamed Loey
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
Mohamed Loey
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
Mohamed Loey
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
Mohamed Loey
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
Mohamed Loey
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
Mohamed Loey
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
Mohamed Loey
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
Mohamed Loey
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
Mohamed Loey
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
Mohamed Loey
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
Mohamed Loey
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
Mohamed Loey
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
Mohamed Loey
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
Mohamed Loey
 

Recently uploaded (20)

IDF 30min presentation - December 2, 2024.pptx
IDF 30min presentation - December 2, 2024.pptxIDF 30min presentation - December 2, 2024.pptx
IDF 30min presentation - December 2, 2024.pptx
ArneeAgligar
 
Allomorps and word formation.pptx - Google Slides.pdf
Allomorps and word formation.pptx - Google Slides.pdfAllomorps and word formation.pptx - Google Slides.pdf
Allomorps and word formation.pptx - Google Slides.pdf
Abha Pandey
 
How to Create a Rainbow Man Effect in Odoo 18
How to Create a Rainbow Man Effect in Odoo 18How to Create a Rainbow Man Effect in Odoo 18
How to Create a Rainbow Man Effect in Odoo 18
Celine George
 
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
National Information Standards Organization (NISO)
 
LDMMIA Free Reiki Yoga S9 Grad Level Intuition II
LDMMIA Free Reiki Yoga S9 Grad Level Intuition IILDMMIA Free Reiki Yoga S9 Grad Level Intuition II
LDMMIA Free Reiki Yoga S9 Grad Level Intuition II
LDM & Mia eStudios
 
What are the benefits that dance brings?
What are the benefits that dance brings?What are the benefits that dance brings?
What are the benefits that dance brings?
memi27
 
Basic English for Communication - Dr Hj Euis Eti Rohaeti Mpd
Basic English for Communication - Dr Hj Euis Eti Rohaeti MpdBasic English for Communication - Dr Hj Euis Eti Rohaeti Mpd
Basic English for Communication - Dr Hj Euis Eti Rohaeti Mpd
Restu Bias Primandhika
 
SEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptx
SEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptxSEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptx
SEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptx
PoojaSen20
 
Capitol Doctoral Presentation -June 2025.pptx
Capitol Doctoral Presentation -June 2025.pptxCapitol Doctoral Presentation -June 2025.pptx
Capitol Doctoral Presentation -June 2025.pptx
CapitolTechU
 
Black and White Illustrative Group Project Presentation.pdf (1).pdf
Black and White Illustrative Group Project Presentation.pdf (1).pdfBlack and White Illustrative Group Project Presentation.pdf (1).pdf
Black and White Illustrative Group Project Presentation.pdf (1).pdf
AnnasofiaUrsini
 
Ray Dalio How Countries go Broke the Big Cycle
Ray Dalio How Countries go Broke the Big CycleRay Dalio How Countries go Broke the Big Cycle
Ray Dalio How Countries go Broke the Big Cycle
Dadang Solihin
 
Different pricelists for different shops in odoo Point of Sale in Odoo 17
Different pricelists for different shops in odoo Point of Sale in Odoo 17Different pricelists for different shops in odoo Point of Sale in Odoo 17
Different pricelists for different shops in odoo Point of Sale in Odoo 17
Celine George
 
Parenting Teens: Supporting Trust, resilience and independence
Parenting Teens: Supporting Trust, resilience and independenceParenting Teens: Supporting Trust, resilience and independence
Parenting Teens: Supporting Trust, resilience and independence
Pooky Knightsmith
 
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdfFEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
ChristinaFortunova
 
How to Manage & Create a New Department in Odoo 18 Employee
How to Manage & Create a New Department in Odoo 18 EmployeeHow to Manage & Create a New Department in Odoo 18 Employee
How to Manage & Create a New Department in Odoo 18 Employee
Celine George
 
Optimization technique in pharmaceutical product development.pptx
Optimization technique in pharmaceutical product development.pptxOptimization technique in pharmaceutical product development.pptx
Optimization technique in pharmaceutical product development.pptx
UrmiPrajapati3
 
How to Manage Upselling of Subscriptions in Odoo 18
How to Manage Upselling of Subscriptions in Odoo 18How to Manage Upselling of Subscriptions in Odoo 18
How to Manage Upselling of Subscriptions in Odoo 18
Celine George
 
Hemiptera & Neuroptera: Insect Diversity.pptx
Hemiptera & Neuroptera: Insect Diversity.pptxHemiptera & Neuroptera: Insect Diversity.pptx
Hemiptera & Neuroptera: Insect Diversity.pptx
Arshad Shaikh
 
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition OecdEnergy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
razelitouali
 
Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...
Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...
Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...
GeorgeDiamandis11
 
IDF 30min presentation - December 2, 2024.pptx
IDF 30min presentation - December 2, 2024.pptxIDF 30min presentation - December 2, 2024.pptx
IDF 30min presentation - December 2, 2024.pptx
ArneeAgligar
 
Allomorps and word formation.pptx - Google Slides.pdf
Allomorps and word formation.pptx - Google Slides.pdfAllomorps and word formation.pptx - Google Slides.pdf
Allomorps and word formation.pptx - Google Slides.pdf
Abha Pandey
 
How to Create a Rainbow Man Effect in Odoo 18
How to Create a Rainbow Man Effect in Odoo 18How to Create a Rainbow Man Effect in Odoo 18
How to Create a Rainbow Man Effect in Odoo 18
Celine George
 
LDMMIA Free Reiki Yoga S9 Grad Level Intuition II
LDMMIA Free Reiki Yoga S9 Grad Level Intuition IILDMMIA Free Reiki Yoga S9 Grad Level Intuition II
LDMMIA Free Reiki Yoga S9 Grad Level Intuition II
LDM & Mia eStudios
 
What are the benefits that dance brings?
What are the benefits that dance brings?What are the benefits that dance brings?
What are the benefits that dance brings?
memi27
 
Basic English for Communication - Dr Hj Euis Eti Rohaeti Mpd
Basic English for Communication - Dr Hj Euis Eti Rohaeti MpdBasic English for Communication - Dr Hj Euis Eti Rohaeti Mpd
Basic English for Communication - Dr Hj Euis Eti Rohaeti Mpd
Restu Bias Primandhika
 
SEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptx
SEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptxSEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptx
SEXUALITY , UNWANTED PREGANCY AND SEXUAL ASSAULT .pptx
PoojaSen20
 
Capitol Doctoral Presentation -June 2025.pptx
Capitol Doctoral Presentation -June 2025.pptxCapitol Doctoral Presentation -June 2025.pptx
Capitol Doctoral Presentation -June 2025.pptx
CapitolTechU
 
Black and White Illustrative Group Project Presentation.pdf (1).pdf
Black and White Illustrative Group Project Presentation.pdf (1).pdfBlack and White Illustrative Group Project Presentation.pdf (1).pdf
Black and White Illustrative Group Project Presentation.pdf (1).pdf
AnnasofiaUrsini
 
Ray Dalio How Countries go Broke the Big Cycle
Ray Dalio How Countries go Broke the Big CycleRay Dalio How Countries go Broke the Big Cycle
Ray Dalio How Countries go Broke the Big Cycle
Dadang Solihin
 
Different pricelists for different shops in odoo Point of Sale in Odoo 17
Different pricelists for different shops in odoo Point of Sale in Odoo 17Different pricelists for different shops in odoo Point of Sale in Odoo 17
Different pricelists for different shops in odoo Point of Sale in Odoo 17
Celine George
 
Parenting Teens: Supporting Trust, resilience and independence
Parenting Teens: Supporting Trust, resilience and independenceParenting Teens: Supporting Trust, resilience and independence
Parenting Teens: Supporting Trust, resilience and independence
Pooky Knightsmith
 
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdfFEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
ChristinaFortunova
 
How to Manage & Create a New Department in Odoo 18 Employee
How to Manage & Create a New Department in Odoo 18 EmployeeHow to Manage & Create a New Department in Odoo 18 Employee
How to Manage & Create a New Department in Odoo 18 Employee
Celine George
 
Optimization technique in pharmaceutical product development.pptx
Optimization technique in pharmaceutical product development.pptxOptimization technique in pharmaceutical product development.pptx
Optimization technique in pharmaceutical product development.pptx
UrmiPrajapati3
 
How to Manage Upselling of Subscriptions in Odoo 18
How to Manage Upselling of Subscriptions in Odoo 18How to Manage Upselling of Subscriptions in Odoo 18
How to Manage Upselling of Subscriptions in Odoo 18
Celine George
 
Hemiptera & Neuroptera: Insect Diversity.pptx
Hemiptera & Neuroptera: Insect Diversity.pptxHemiptera & Neuroptera: Insect Diversity.pptx
Hemiptera & Neuroptera: Insect Diversity.pptx
Arshad Shaikh
 
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition OecdEnergy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
razelitouali
 
Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...
Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...
Module 4 Presentation - Enhancing Competencies and Engagement Strategies in Y...
GeorgeDiamandis11
 

Computer Security Lecture 2: Classical Encryption Techniques 1

  • 1. Classical Encryption Techniques 1 Classical Encryption Techniques 1
  • 2. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 3. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 5. Classical Encryption Techniques 1  Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext.  Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time.
  • 6. Classical Encryption Techniques 1  Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the secret key.  Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the ciphertext and the secret key and produces the original plaintext.
  • 7. Classical Encryption Techniques 1  Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
  • 8. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 9. Classical Encryption Techniques 1 Cipherered text 3 IODQN HDVW DWWDFN DW GDZQ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The clear text message would be encoded using a key of 3. 1 FLANK EAST ATTACK AT DAWN Shift the top scroll over by three characters (key of 3), an A becomes D, B becomes E, and so on. 2 The clear text message would be encrypted as follows using a key of 3. Clear text
  • 10. Classical Encryption Techniques 1  Caesar Cipher  Monoalphabetic Ciphers  Playfair Cipher  Hill Cipher  Polyalphabetic Ciphers  Vigenère Cipher  Autokey Cipher  Vernam Cipher
  • 11. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 12. Classical Encryption Techniques 1 Caesar Cipher is one of the simplest and most widely known encryption techniques.
  • 16. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=d 2) P=3 3) C=P+K mod 26=3+3 mod 26=6 mod 26 =6 4) C=g
  • 17. Classical Encryption Techniques 1  PlainText = dcodex  K=3 1) P=x 2) P=23 3) C=P+K mod 26=23+3 mod 26=26 mod 26= 0 4) C=a
  • 18. Classical Encryption Techniques 1  P= dcodex  C= gfrgha  K=3
  • 19. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=g 2) C=6 3) P=C-K mod 26=6-3 mod 26=3 4) P=d
  • 20. Classical Encryption Techniques 1  CipherText = gfrgha  K=3 1) C=a 2) C=0 3) P=C-K mod 26=0-3 mod 26=-3 mod 26 =23 4) P=x
  • 21. Classical Encryption Techniques 1  C= gfrgha  P= dcodex  K=3
  • 22. Classical Encryption Techniques 1  Three important characteristics of this problem enabled us to use a bruteforce cryptanalysis: The encryption and decryption algorithms are known. There are only 25 keys to try. The language of the plaintext is known and easily recognizable.
  • 24. Classical Encryption Techniques 1 How to implement Caesar Cipher technique on Arabic letters?
  • 25. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 26. Classical Encryption Techniques 1 A monoalphabetic cipher uses fixed substitution over the entire message Random Key
  • 27. Classical Encryption Techniques 1  Example: Plaintext alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY  P= ITEMS  Encoding  C= FQAIP  Decoding  P= ITEMS
  • 28. Classical Encryption Techniques 1  Relative Frequency of Letters in English Text
  • 30. Classical Encryption Techniques 1  cipher letters P and Z are the equivalents of plain letters e and t
  • 31. Classical Encryption Techniques 1  Finally, The complete plaintext
  • 32. Classical Encryption Techniques 1 How to implement Monoalphabetic Cipher technique on Arabic letters?
  • 33. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 34. Classical Encryption Techniques 1  The Playfair system was invented by Charles Wheatstone, who first described it in 1854.  Used by many countries during wartime  The Playfair algorithm is based on the use of a 5 x 5 matrix of letters constructed using a keyword.
  • 35. Classical Encryption Techniques 1  In this case, the keyword is monarchy.
  • 36. Classical Encryption Techniques 1  4 Rules: 1) If both letters are the same (or only one letter is left), add an "X" after the first letter. 2) If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively
  • 37. Classical Encryption Techniques 1  4 Rules: 3) If the letters appear on the same column of your table, replace them with the letters immediately below respectively 4) If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair.
  • 38. Classical Encryption Techniques 1  P=Hide the gold in the tree stump (note the null "X" used to separate the repeated "E"s)  P= HI DE TH EG OL DI NT HE TR EX ES TU MP  K= playfair example
  • 39. Classical Encryption Techniques 1  How to build 5x5 Matrix (assuming that I and J are interchangeable), the table becomes (omitted letters in red):
  • 40. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 41. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 42. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 43. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 44. Classical Encryption Techniques 1  P= HI DE TH EG OL DI NT HE TR EX ES TU MP
  • 45. Classical Encryption Techniques 1 C= BM OD ZB XD NA BE KU DM UI XM MO UV IF the message "Hide the gold in the tree stump" becomes "BMODZ BXDNA BEKUD MUIXM MOUVI F"
  • 46. Classical Encryption Techniques 1 Using Playfair Cipher how to decrepit the following cipher text: C= “BMODZ BXDNA BEKUD MUIXM MOUVI F” K= playfair example
  • 47. Classical Encryption Techniques 1 Symmetric Encryption Substitution Techniques Caesar Cipher Monoalphabetic Cipher Playfair Cipher Hill Cipher
  • 48. Classical Encryption Techniques 1  The Hill Cipher was invented by Lester S. Hill in 1929  The Hill Cipher based on linear algebra  Encryption  2 x 2 Matrix Encryption  3 x 3 Matrix Encryption
  • 49. Classical Encryption Techniques 1  square matrix 𝑀 by the equation 𝑀𝑀−1 = 𝑀−1 𝑀= 𝐼, where 𝐼 is the identity matrix.  C = P*K mod 26
  • 51. Classical Encryption Techniques 1  Example of Key 2 x 2  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  plaintext message "short example“  𝑃= short example  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 52. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4  𝐶 = 𝐾 ∗ 𝑃 𝑚𝑜𝑑 26  𝑘0 𝑘1 𝑘2 𝑘3 ∗ 𝑝0 𝑝1 = 𝑘0 ∗ 𝑝0 + 𝑘1 ∗ 𝑝1 𝑘2 ∗ 𝑝0 + 𝑘3 ∗ 𝑝1  7 8 11 11 ∗ 18 7 = 7 ∗ 18 + 8 ∗ 7 11 ∗ 18 + 11 ∗ 7 = 182 275  𝐶 = 182 275 𝑚𝑜𝑑 26 = 0 15 = 𝑎 𝑝
  • 53. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 54. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 55. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 56. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 57. Classical Encryption Techniques 1  𝑃 = 𝑆 ℎ 𝑜 𝑟 𝑡 𝑒 𝑥 𝑎 𝑚 𝑝 𝑙 𝑒 = 18 7 14 17 19 4 23 0 12 15 11 4
  • 58. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ"
  • 59. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗  This gives us a final ciphertext of "APADJ TFTWLFJ“  𝐾 = 𝐻 𝐼 𝐿 𝐿 = 7 8 11 11  We want to find 𝐾−1
  • 60. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 1 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝐷 𝐾 = 7 ∗ 11 − 8 ∗ 11 = −11 𝑚𝑜𝑑 26 = 15 𝐷𝐷−1 = 1 𝑚𝑜𝑑 26 = 15 ∗ 𝐷−1 15 ∗ 𝐷−1 𝑚𝑜𝑑 26 = 1 Try and Test 1 𝑚𝑜𝑑 26 = 105 105 mod 26 =1 𝐷−1 = 7
  • 61. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 2 − 𝐹𝑖𝑛𝑑 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥 𝑜𝑓 𝐾𝑒𝑦 𝑎𝑑𝑗 𝑎 𝑏 𝑐 𝑑 = 𝑑 −𝑏 −𝑐 𝑎 𝑎𝑑𝑗 7 8 11 11 = 11 −8 −11 7 mod 26 = 11 18 15 7
  • 62. Classical Encryption Techniques 1  𝑆𝑡𝑒𝑝 3 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑦 𝑡ℎ𝑒 𝑀𝑢𝑙𝑡𝑖𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑣𝑒 𝐼𝑛𝑣𝑒𝑟𝑠𝑒 𝑜𝑓 𝑡ℎ𝑒 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑛𝑡 𝑏𝑦 𝑡ℎ𝑒 𝐴𝑑𝑗𝑢𝑔𝑎𝑡𝑒 𝑀𝑎𝑡𝑟𝑖𝑥  7 ∗ 11 18 15 7 = 77 126 105 49 𝑚𝑜𝑑 26 = 25 22 1 23 = 𝐾−1
  • 63. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 64. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 65. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 66. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 67. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 68. Classical Encryption Techniques 1  𝐶 = 𝑎 𝑝 𝑎 𝑑 𝑗 𝑡 𝑓 𝑡 𝑤 𝑙 𝑓 𝑗 = 0 15 0 3 9 19 5 19 22 11 5 9
  • 69. Classical Encryption Techniques 1 Using Hill Cipher how to implement 3x3 matrix encryption ? The key for a hill cipher is a matrix e.g. 𝒌 = 2 4 5 9 2 1 3 17 7 and message= ATTACK AT DAWN
  • 70. Classical Encryption Techniques 1  Use MS Word  Send me mail to [email protected] with email subject “ Classical Encryption Techniques 1 “  Put your name on Arabic with department and section on word and email body  Finally, press Send  Deadline Next Lecture
  • 71. Classical Encryption Techniques 1 facebook.com/mloey [email protected] twitter.com/mloey linkedin.com/in/mloey [email protected] mloey.github.io
  • 72. Classical Encryption Techniques 1 www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME