Top Banner
Cryptography L03- Old Encryption algorithms
14

Information Security Cryptography ( L03- Old Cryptography Algorithms )

Aug 12, 2015

Download

Technology

Anas Rock
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Cryptography L03- Old Encryption algorithms

Page 2: Information Security Cryptography ( L03- Old Cryptography Algorithms )

outline

Old Encryption algorithms OR Classical Method

● Replacement Algorithms

● Caesar Cipher

● Full vigenere cipher

● Atbash Cipher

● Affine Cipher

● THE JEFFERSON CYLINDER

2

Page 3: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Replacement Algorithms

This algorithm is deployed in the Middle Ages and this algorithm based

on replacing each character of the alphabet with another character

in a particular order.

The number of attempts needed to break this algorithm is 26! ,and it is

equal to almost 10264.

To be breached depending on the frequency of the original language characters ,Where are calculated by testing a large number of texts.

3

Page 4: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Replacement Algorithms

4

Page 5: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Caesar Cipher

Julius Caesar has to find a way that they named after him in 58 BC.

This method is based on a comparison between each letter of the alphabet with a letter last, depending on the value of rotation.

We do not need a lot of effort to prove the weakness of this simple algorithm where they depend on the rotation and therefore the value of knowing the value of the rotation loosen the entire encrypted message.

And calculates the number of possibilities for the value of rotation in the English language, we find that it is a small value of 26 field easily break through the algorithm and the discovery of the original message.

5

Page 6: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Caesar Cipher

Example : Word “SECRET” the encryption of this "VHFUHW“

where the rotation key is 3

6

Page 7: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Full vigenere cipher

The Leon Battista Albert develop this algorithm in 1467 AD.

The code is used to switch between the appropriate disk letters.

The working principle of this algorithm depends on the encryption table.

7

Page 8: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Table of Full vigenere cipher

Example : the text “helloGreenDay” and key is “ForumForumFor”

The text after encryotion

became “Mscfalvyzlop”

8

Page 9: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Atbash Cipher

This Cipher of the simplest types of Cipher which was originally the

Hebrew language.

But it can be used in other languages.

Mode of operation as follows :

To make the first letter in the language is the last letter and the second

character is the last before etc...

9

Page 10: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Atbash Cipher

AZ

B Y

Etc >>>

10

Page 11: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

Affine Cipher

Encryption is a way Affine Cipher confusion between the two types of

encryption ,the first type, a Caesar Cipher and the second is the

product Cipher.

Caesar be in encryption mathematical relation :

C = p + key MOD n

Product Cipher be in encryption relation :

C = p * key MOD n

Affine code brought together the two previous two relationships :

C = m*p + key MOD n

11

Page 12: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

THE JEFFERSON CYLINDER

is one of the strongest encryption used in devices where the Cipher

generated strong can be broken easily never except in the case of the

theft of the entire device.

Name Jefferson back to its inventor THOMAS JEFFERSON Name.

This disc consists of some 36 wheel beside a row and 26, meaning that each row by 36 character.

12

Page 13: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Classical Method Cryptography

THE JEFFERSON CYLINDER

13

Page 14: Information Security Cryptography ( L03- Old Cryptography Algorithms )

Thanks for watching

14