SlideShare a Scribd company logo
Basic Encryption and Decryption
• Encryption: a process of encoding a message
so that its meaning is not obvious
• Decryption: the reverse process
Encode(encipher) vs.
Decode(decipher)
• Encoding: the process of translating entire
words or phrases to other words or phrases
• Enciphering: translating letters or symbols
individually
• Encryption: the group term that covers both
encoding and enciphering
Basic operations
• plaintext to ciphertext: encryption
C = E(P)
• ciphertext to plaintext: decryption:
P = D(C)
requirement: P = D(E(P))
Classical Encryption
Techniques
• Symmetric key encryption
• Asymmetric key encryption
Symmetric Key Encryption
• Sender and recipient share a common key
• Was the only type of cryptography, prior to
invention of public-key in 1970’s
• All traditional schemes are symmetric / single
key / private-key encryption algorithms, with
a single key, used for both encryption and
decryption, since both sender and receiver are
equivalent, either can encrypt or decrypt
messages using that common key.
Symmetric Cipher Model
Requirements
• Two requirements for secure use of symmetric
encryption:
– a strong encryption algorithm
– a secret key known only to sender / receiver
Y = EK(X)
X = DK(Y)
Here, plaintext X, ciphertext Y, key K, encryption
algorithm Ek, decryption algorithm Dk.
• Assume encryption algorithm is known
• Implies a secure channel to distribute key
Types of Ciphers
• Substitution ciphers
• Permutation (or transposition) ciphers
Classical Substitution Ciphers
• A substitution cipher replaces one
symbol with another.
• Substitution ciphers can be categorized
as either monoalphabetic ciphers or
polyalphabetic ciphers.
Monoalphabetic Ciphers
• In monoalphabetic substitution, the
relationship between a symbol in the
plaintext to a symbol in the ciphertext is
always one-to-one.
• The simplest monoalphabetic cipher is
the additive cipher. This cipher is
sometimes called a shift cipher and
sometimes a Caesar cipher
Caesar Cipher
• Earliest known substitution cipher
• First attested use in military affairs
• Replaces each letter by 3rd letter on
• example:
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
• Note: when letters are involved, the following
conventions are used in this course: Plaintext
is always in lowercase; ciphertext is in
uppercase
• can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
• mathematically give each letter a number
• then have Caesar cipher as:
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
When the cipher is additive, the plaintext, ciphertext, and key are integers
in Z26
• This mathematical description uses modulo
arithmetic (ie clock arithmetic). Here, when
you reach Z you go back to A and start again.
Mod 26 implies that when you reach 26, you
use 0 instead (ie the letter after Z, or 25 + 1
goes to A or 0).
• Example: howdy (7,14,22,3,24) encrypted
using key f (5) is MTBID
Example
• Use the additive cipher with key = 15 to
encrypt the message “hello”.
• Use the additive cipher with key = 15 to
decrypt the message “WTAAD”.
Cryptanalysis of Caesar Cipher
• only have 26 possible keys, of which only 25
are of any use, since mapping A to A etc
doesn't really obscure the message.
• Advantage : easy to use
• Disadvantage: simple structure and easy to
break
Polyalphabetic Ciphers
• another approach to improving security is to
use multiple cipher alphabets
• called polyalphabetic substitution ciphers
• makes cryptanalysis harder with more
alphabets to guess and flatter frequency
distribution
• use a key to select which alphabet is used for
each letter of the message
Vigenere Cipher
• Vigenere key stream does not depend
on the plaintext characters; it depends
only on the position of the character in
the plaintext
 basic encryption and decryption
Example
• encrypt the message She is listening using the
6-character keyword “PASCAL”.
• The initial key stream is (15, 0, 18, 2, 0, 11).
The key stream is the repetition of this initial
key stream (as many times as needed
TRANSPOSITION CIPHERS
TRANSPOSITION CIPHERS
• A transposition cipher does not
substitute one symbol for another,
instead it changes the location of the
symbols.
Keyless Transposition Ciphers
• Simple transposition ciphers, which were
used in the past, are keyless.
• Text is written into a table column by
column and then is transmitted row by
row.
• Text is written into a table and row by row,
then is transmitted column by column.
Example: Rail fence cipher.
• The ciphertext is created reading the
pattern row by row.
• For example, to send the message “Meet
me at the park” to Bob, Alice writes
She then creates the ciphertext
“MEMATEAKETETHPR
Example
• Alice and Bob can agree on the number
of columns and use the second method.
Alice writes the same plaintext, row by
row, in a table of four columns.
She then creates the ciphertext
“MMTAEEHREAEKTTP”.
Keyed Transposition Ciphers
• Divide the plaintext into groups of
predetermined size, called blocks, and
then use a key to permute the characters
in each block separately.
Steganography
• an alternative to encryption
• hides existence of message
– using only a subset of letters/words in a longer
message marked in some way
– using invisible ink
– hiding in LSB in graphic image or sound file
• has drawbacks
– high overhead to hide relatively few info bits
CONVENTIONAL ENCRYPTION
ALGORITHMS
CONVENTIONAL ENCRYPTION ALGORITHMS
• Triple DES
• International Data Encryption Algorithm (IDEA)
• Blowfish
• RC5
• CAST-128
• RC2
• Characteristics of Advanced Symmetric Block
Ciphers

More Related Content

PPT
Ch01
n C
 
PPTX
Cryptography.ppt
Uday Meena
 
PPT
block ciphers
Asad Ali
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PPTX
Introduction to Cryptography
Md. Afif Al Mamun
 
PPTX
Cryptography - 101
n|u - The Open Security Community
 
PPTX
Encryption & Decryption
JayantBhatt6
 
PPT
overview of cryptographic techniques
Shubham Jain
 
Ch01
n C
 
Cryptography.ppt
Uday Meena
 
block ciphers
Asad Ali
 
Cryptography and Network Security
Pa Van Tanku
 
Introduction to Cryptography
Md. Afif Al Mamun
 
Encryption & Decryption
JayantBhatt6
 
overview of cryptographic techniques
Shubham Jain
 

What's hot (20)

PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPTX
RSA Algorithm
Srinadh Muvva
 
PDF
Introduction to Cryptography
Seema Goel
 
PDF
Cs8792 cns - unit iv
ArthyR3
 
PDF
Encryption and Key Distribution Methods
Gulcin Yildirim Jelinek
 
PPTX
Password cracking and brute force
vishalgohel12195
 
PPTX
Key Management and Distribution
Syed Bahadur Shah
 
PPTX
IPsec
abdullah roomi
 
PDF
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
PPT
Data encryption standard
Vasuki Ramasamy
 
PPTX
Cryptanalysis 101
rahat ali
 
PPT
6. cryptography
7wounders
 
PPTX
Symmetric encryption and message confidentiality
CAS
 
PPTX
Cryptography
Sidharth Mohapatra
 
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
PPTX
Information and network security 13 playfair cipher
Vaibhav Khanna
 
PPTX
Advanced encryption standard (aes)
farazvirk554
 
PPT
Cryptography
gueste4c97e
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
RSA Algorithm
Srinadh Muvva
 
Introduction to Cryptography
Seema Goel
 
Cs8792 cns - unit iv
ArthyR3
 
Encryption and Key Distribution Methods
Gulcin Yildirim Jelinek
 
Password cracking and brute force
vishalgohel12195
 
Key Management and Distribution
Syed Bahadur Shah
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
Data encryption standard
Vasuki Ramasamy
 
Cryptanalysis 101
rahat ali
 
6. cryptography
7wounders
 
Symmetric encryption and message confidentiality
CAS
 
Cryptography
Sidharth Mohapatra
 
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Advanced encryption standard (aes)
farazvirk554
 
Cryptography
gueste4c97e
 
Ad

Similar to basic encryption and decryption (20)

PDF
Classical encryption techniques
Dr.Florence Dayana
 
PPTX
IANSunit 1_cryptography_2.pptxv xvxvxvxv
zmulani8
 
PPTX
cryptographyyy .pptx
iamayesha2526
 
PPT
Elementary cryptography
Prachi Gulihar
 
PPTX
Cryptography cryptography CryptographyCryptography
rohanbawadkar
 
PPTX
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
nagwaAboElenein
 
PPTX
Week 5 lec 5 Cryptography.pptx
MuhammadAbdullah201796
 
PPTX
Cryptography .pptx
abhinandpk2405
 
PPT
Cryptography - Symmetric Encryption Ciphers
sambatmatta
 
PPTX
Information system security Unit 2.pptx
Dr. Pallawi Bulakh
 
PPT
UNIT 2.ppt
Manoj R. Kharde
 
PPT
CNS Subject ppt - Unit 1 covers about cryptography and network security subject
BALARAMANN
 
PPT
ch02.ppt
ssuser4198c4
 
PPTX
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
PDF
Classical Encryption Techniques.pdf
DevangShukla10
 
PPT
cryptography.ppt
AkshayaPriyaJanartha
 
PDF
Cipher techniques
saqib1611
 
PPT
Ch02
ssusere796b3
 
PPT
Computer systems security 7-cryptography.ppt
stephen972973
 
PPT
encryptcryptographyyyyyyyyyyyyyyyyyy.ppt
SnehaPavithran6
 
Classical encryption techniques
Dr.Florence Dayana
 
IANSunit 1_cryptography_2.pptxv xvxvxvxv
zmulani8
 
cryptographyyy .pptx
iamayesha2526
 
Elementary cryptography
Prachi Gulihar
 
Cryptography cryptography CryptographyCryptography
rohanbawadkar
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
nagwaAboElenein
 
Week 5 lec 5 Cryptography.pptx
MuhammadAbdullah201796
 
Cryptography .pptx
abhinandpk2405
 
Cryptography - Symmetric Encryption Ciphers
sambatmatta
 
Information system security Unit 2.pptx
Dr. Pallawi Bulakh
 
UNIT 2.ppt
Manoj R. Kharde
 
CNS Subject ppt - Unit 1 covers about cryptography and network security subject
BALARAMANN
 
ch02.ppt
ssuser4198c4
 
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
Classical Encryption Techniques.pdf
DevangShukla10
 
cryptography.ppt
AkshayaPriyaJanartha
 
Cipher techniques
saqib1611
 
Computer systems security 7-cryptography.ppt
stephen972973
 
encryptcryptographyyyyyyyyyyyyyyyyyy.ppt
SnehaPavithran6
 
Ad

Recently uploaded (20)

PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Information Retrieval and Extraction - Module 7
premSankar19
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
Zero Carbon Building Performance standard
BassemOsman1
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
Inventory management chapter in automation and robotics.
atisht0104
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Software Testing Tools - names and explanation
shruti533256
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 

basic encryption and decryption

  • 1. Basic Encryption and Decryption
  • 2. • Encryption: a process of encoding a message so that its meaning is not obvious • Decryption: the reverse process
  • 3. Encode(encipher) vs. Decode(decipher) • Encoding: the process of translating entire words or phrases to other words or phrases • Enciphering: translating letters or symbols individually • Encryption: the group term that covers both encoding and enciphering
  • 4. Basic operations • plaintext to ciphertext: encryption C = E(P) • ciphertext to plaintext: decryption: P = D(C) requirement: P = D(E(P))
  • 5. Classical Encryption Techniques • Symmetric key encryption • Asymmetric key encryption
  • 6. Symmetric Key Encryption • Sender and recipient share a common key • Was the only type of cryptography, prior to invention of public-key in 1970’s • All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption, since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key.
  • 8. Requirements • Two requirements for secure use of symmetric encryption: – a strong encryption algorithm – a secret key known only to sender / receiver Y = EK(X) X = DK(Y) Here, plaintext X, ciphertext Y, key K, encryption algorithm Ek, decryption algorithm Dk. • Assume encryption algorithm is known • Implies a secure channel to distribute key
  • 9. Types of Ciphers • Substitution ciphers • Permutation (or transposition) ciphers
  • 10. Classical Substitution Ciphers • A substitution cipher replaces one symbol with another. • Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers.
  • 11. Monoalphabetic Ciphers • In monoalphabetic substitution, the relationship between a symbol in the plaintext to a symbol in the ciphertext is always one-to-one.
  • 12. • The simplest monoalphabetic cipher is the additive cipher. This cipher is sometimes called a shift cipher and sometimes a Caesar cipher
  • 13. Caesar Cipher • Earliest known substitution cipher • First attested use in military affairs • Replaces each letter by 3rd letter on • example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB
  • 14. • Note: when letters are involved, the following conventions are used in this course: Plaintext is always in lowercase; ciphertext is in uppercase
  • 15. • can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C • mathematically give each letter a number • then have Caesar cipher as: C = E(p) = (p + k) mod (26) p = D(C) = (C – k) mod (26)
  • 16. When the cipher is additive, the plaintext, ciphertext, and key are integers in Z26
  • 17. • This mathematical description uses modulo arithmetic (ie clock arithmetic). Here, when you reach Z you go back to A and start again. Mod 26 implies that when you reach 26, you use 0 instead (ie the letter after Z, or 25 + 1 goes to A or 0). • Example: howdy (7,14,22,3,24) encrypted using key f (5) is MTBID
  • 18. Example • Use the additive cipher with key = 15 to encrypt the message “hello”.
  • 19. • Use the additive cipher with key = 15 to decrypt the message “WTAAD”.
  • 20. Cryptanalysis of Caesar Cipher • only have 26 possible keys, of which only 25 are of any use, since mapping A to A etc doesn't really obscure the message. • Advantage : easy to use • Disadvantage: simple structure and easy to break
  • 21. Polyalphabetic Ciphers • another approach to improving security is to use multiple cipher alphabets • called polyalphabetic substitution ciphers • makes cryptanalysis harder with more alphabets to guess and flatter frequency distribution • use a key to select which alphabet is used for each letter of the message
  • 22. Vigenere Cipher • Vigenere key stream does not depend on the plaintext characters; it depends only on the position of the character in the plaintext
  • 24. Example • encrypt the message She is listening using the 6-character keyword “PASCAL”. • The initial key stream is (15, 0, 18, 2, 0, 11). The key stream is the repetition of this initial key stream (as many times as needed
  • 26. TRANSPOSITION CIPHERS • A transposition cipher does not substitute one symbol for another, instead it changes the location of the symbols.
  • 27. Keyless Transposition Ciphers • Simple transposition ciphers, which were used in the past, are keyless. • Text is written into a table column by column and then is transmitted row by row. • Text is written into a table and row by row, then is transmitted column by column.
  • 28. Example: Rail fence cipher. • The ciphertext is created reading the pattern row by row. • For example, to send the message “Meet me at the park” to Bob, Alice writes She then creates the ciphertext “MEMATEAKETETHPR
  • 29. Example • Alice and Bob can agree on the number of columns and use the second method. Alice writes the same plaintext, row by row, in a table of four columns. She then creates the ciphertext “MMTAEEHREAEKTTP”.
  • 30. Keyed Transposition Ciphers • Divide the plaintext into groups of predetermined size, called blocks, and then use a key to permute the characters in each block separately.
  • 31. Steganography • an alternative to encryption • hides existence of message – using only a subset of letters/words in a longer message marked in some way – using invisible ink – hiding in LSB in graphic image or sound file • has drawbacks – high overhead to hide relatively few info bits
  • 33. CONVENTIONAL ENCRYPTION ALGORITHMS • Triple DES • International Data Encryption Algorithm (IDEA) • Blowfish • RC5 • CAST-128 • RC2 • Characteristics of Advanced Symmetric Block Ciphers