Cloud Security Lecture 3
Cloud Security Lecture 3
Cloud Security Lecture 3
Mohamed Loey
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets.
2) P= sec uri ty
3) C= VJJ XWP WD
Then We set Key as Rules: (reverse)
2) C= VJJ XWP WD
3) C= SEC URI TY
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
The Vigenère cipher, was invented by a Frenchman, Blaise de Vigenère in the 16th
century.
𝑃𝑖 = 𝐶𝑖 − 𝐾 𝑚𝑜𝑑 26
Repeating key
𝐾=deceptive
𝐾 = {𝑘1 , 𝑝1 , 𝑝2 , 𝑝3 , … , 𝑝𝑛−1 }
𝐶 = {𝑐1 , 𝑐2 , 𝑐3 , … , 𝑐𝑛 }
𝐶𝑖 = 𝑃𝑖 + 𝐾𝑖 𝑚𝑜𝑑 26
𝑃𝑖 = 𝐶𝑖 − 𝐾𝑖 𝑚𝑜𝑑 26
𝑲=m
𝑷=attack is today
Plaintext a t t a c k i s t o d a y
P Value 0 19 19 0 2 10 8 18 19 14 3 0 24
Key 12 0 19 19 0 2 10 8 18 19 14 3 0
C Value 12 19 12 19 2 12 18 0 11 7 17 3 24
Ciphertext m t m t c m s a l h r d y
𝑲=m
𝑪=mtmtcmsalhrdy
Ciphertext m t m t c m s a l h r d y
C Value 12 19 12 19 2 12 18 0 11 7 17 3 24
Key 12 0 19 19 0 2 10 8 18 19 14 3 0
P Value 0 19 19 0 2 10 8 18 19 14 3 0 24
Plaintext a t t a c k i s t o d a y
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
Vernam Cipher was introduced by an AT&T engineer named Gilbert Vernam in 1918.
The ultimate defense against such a cryptanalysis is to choose a keyword that is as long as the plaintext and
has no statistical relationship to it.
Encryption
𝐶 = 𝑃 𝑋𝑂𝑅 𝐾
Decryption
𝑃 = 𝐶 𝑋𝑂𝑅 𝐾
P=11100011101010101101
K=1001010101
P=11100011101010101101
K=10010101011001010101
C=01110110110011111000
C=01110110110011111000
K=10010101011001010101
P=11100011101010101101
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
1
FLANK EAST The clear text message would be
ATTACK AT DAWN
encoded using a key of 3.
Clear Text
2
F...K...T...T...A...W.
.L.N.E.S.A.T.A.K.T.A.N Use a rail fence cipher and a
..A...A...T...C...D... key of 3.
3 FKTTAW
LNESATAKTAN
The clear text message would
AATCD appear as follows.
Ciphered Text
Transposition Techniques performing some sort of permutation on the plaintext
letters (reorder the position of letters in plaintext).
Types:
K=2
𝑚 𝑒 𝑚𝑎 𝑡 𝑟 ℎ 𝑡 𝑔 𝑝 𝑟 𝑦
1) 𝑝 =
𝑒 𝑡 𝑒𝑓 𝑒 𝑡 𝑒 𝑜 𝑎 𝑎 𝑡
2) C=mematrhtgpryetefeteoaat
C=mematrhtgpryetefeteoaat
K=2
𝑚 𝑒 𝑚𝑎 𝑡 𝑟 ℎ 𝑡 𝑔 𝑝 𝑟 𝑦
1) 𝐶 =
𝑒 𝑡 𝑒𝑓 𝑒 𝑡 𝑒 𝑜 𝑎 𝑎 𝑡
2) P= meetmeafterthetogaparty
Polyalphabetic Ciphers
Vigenère Cipher
Autokey Cipher
Vernam Cipher
Transposition Techniques
Rail Fence Cipher
Row Transposition Cipher
P= attack postponed until two am
K= 4312567
4 3 1 2 5 6 7
𝑎 𝑡 𝑡 𝑎 𝑐 𝑘 𝑝
𝐶= 𝑜 𝑠 𝑡 𝑝 𝑜 𝑛 𝑒 = 𝑡𝑡𝑛𝑎𝑎𝑝𝑡𝑚𝑡𝑠𝑢𝑜𝑎𝑜𝑑𝑤𝑐𝑜𝑖𝑥𝑘𝑛𝑙𝑥𝑝𝑒𝑡𝑥
𝑑 𝑢 𝑛 𝑡 𝑖 𝑙 𝑡
𝑤 𝑜 𝑎 𝑚 𝑥 𝑥 𝑥
C= 𝑡𝑡𝑛𝑎𝑎𝑝𝑡𝑚𝑡𝑠𝑢𝑜𝑎𝑜𝑑𝑤𝑐𝑜𝑖𝑥𝑘𝑛𝑙𝑥𝑝𝑒𝑡𝑥 = Len(C)=28
K= 4312567
4 3 1 2 5 6 7
𝑎 𝑡 𝑡 𝑎 𝑐 𝑘 𝑝
𝑃= 𝑜 𝑠 𝑡 𝑝 𝑜 𝑛 𝑒 = 𝑎𝑡𝑡𝑎𝑐𝑘𝑝𝑜𝑠𝑡𝑝𝑜𝑛𝑒𝑑𝑢𝑛𝑡𝑖𝑙𝑡𝑤𝑜𝑎𝑚𝑥𝑥𝑥
𝑑 𝑢 𝑛 𝑡 𝑖 𝑙 𝑡
𝑤 𝑜 𝑎 𝑚 𝑥 𝑥 𝑥