caesar cipher
play

Caesar Cipher If he had anything confidential to say, he wrote it in - PowerPoint PPT Presentation

Caesar Cipher If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he


  1. Caesar Cipher If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others. – Suetonius, Life of Julius Caesar Protocol Shift each letter of the plaintext forward in the alphabet by a given amount to encrypt. Example Shifted by 3, so that A becomes D, B becomes E, and so on. plaintext: IF VOTING CHANGED ANYTHING IT WOULD BE ILLEGAL ciphertext: LI YRWLPK FKDQKHG DQBWKLPK LW ZRXOG EH LOOHKDO

  2. Vigen` ere Cipher Protocol Given a word, shift the first letter of the ciphertext by an amount corresponding to the first letter of the word’s place in the alphabet, the second letter of the cipher according to the place of the second letter of the given word, and so on. When you have used all the letters of the given word up, start at the beginning of the word again. This table can be used to help translate the letters. Example Given the word ACT : xplaintext: RESPECT EXISTENCE OR EXPECT RESISTENCE ciphertext: RGLPGVT GQIUMEPVE QK EZIEEM RGLIUMAPVE

  3. Rail-fence Cipher Protocol The plain text is written downwards and diagonally on successive ”rails” of an imaginary fence, then moving up when we reach the bottom rail. When we reach the top rail, the message is written downwards again until the whole plaintext is written out. The message is then read off in rows. Example plaintext: ATONETIMEINTHEWORLDTHEREWEREWOODSTHATNOONEOWNED A N I I H O D E W E O T T O O E T E M N E R T R E W D H N N W D O T E T W L H E R O S A O E N ciphertext: ANIIHODEWEOTTOOETEMNERTREWDHNNWDOTETWLHEROSAOEN

  4. One-time pad Protocol Given a random sequence of letters (the “one-time pad”) as long as your plaintext, shift the k th letter of the plaintext by an amount in the alphabet corresponding to the k th letter of the one-time pad. A format of one-time pad used by the U.S. National Security Agency. The table on the right is an aid for converting between plaintext and ciphertext. Example Given the above-right pad: plaintext: ANOTHER WORLD IS POSSIBLE ciphertext: LSVAFDR DGSUU VP ZGQFNWVS

  5. Enigma Machine Protocol Start with an initial, given placement of each rotor. Before encoding each letter: 1. If the notch on either the left or middle rotor is at the rotor setting line, rotate all three rotors rotate up one position. 2. If only the rightmost rotor has its notch at the rotor setting line, then the middle and right rotors rotate up one position. 3. Otherwise, only the right rotor rotates up one position. Once the rotation is complete, find the desired letter on the Enigma machines did the INPUT/OUTPUT panel and follow the connected wires across encryption and decryption for you the 3 rotors, around the reflector, and back across the rotors to by typing in either the plaintext or the corresponding letter on the INPUT/OUTPUT panel. ciphertext. Example Using the paper Enigma model with rotors set LDO along the rotor setting line: plaintext: SLOW ciphertext: RANE

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend