You are on page 1of 6

ID NO: VU4S1718069

EXPERIMENT NO :1

AIM: CASE STUDY ON DIFFERENT TYPES OF CIPHERS

DEFINITION:
1) In cryptography, ciphertext is the result of encryption performed on plaintext
using an algorithm, called a cipher.
2) Ciphertext is also known as encrypted or encoded information because it contains
a form of the original plaintext that is unreadable by a human or computer without the
proper cipher to decrypt it.
3) Decryption the inverse of encryption, is the process of turning ciphertext into
readable plaintext. Ciphertext is not to be confused with codetext because the latter is
a result of a code not a cipher.

TYPES OF CIPHERS:
There are a variety of different types of encryption. Algorithms used earlier in
the history of cryptography are substantially different from modern methods,
and modern ciphers can be classified according to how they operate and
whether they use one or two keys.

1) CAESAR CIPHER: It is a mono-alphabetic cipher wherein each letter of the


plaintext is substituted by another letter to form the ciphertext. It is a simplest form of
substitution cipher scheme.
This cryptosystem is generally referred to as the Shift Cipher. The concept is to
replace each alphabet by another alphabet which is ‘shifted’ by some fixed number
between 0 and 25.
For this type of scheme, both sender and receiver agree on a ‘secret shift number’ for
shifting the alphabet. This number which is between 0 and 25 becomes the key of
encryption.
The name ‘Caesar Cipher’ is occasionally used to describe the Shift Cipher when the
‘shift of three’ is used.
Here is a jumbled Ciphertext alphabet, where the order of the ciphertext letters is a
key.
2) MONOALPHABATIC & POLYALPHABATIC CIPHER:
Monoalphabetic cipher is a substitution cipher in which for a given key, the cipher
alphabet for each plain alphabet is fixed throughout the encryption process. For
example, if ‘A’ is encrypted as ‘D’, for any number of occurrence in that plaintext, ‘A’
will always get encrypted to ‘D’.
All of the substitution ciphers we have discussed earlier in this chapter are
monoalphabetic; these ciphers are highly susceptible to cryptanalysis.
Polyalphabetic Cipher is a substitution cipher in which the cipher alphabet for the
plain alphabet may be different at different places during the encryption process. The
next two examples, playfair and Vigenere Cipher are polyalphabetic ciphers.

3) PLAYFARE CIPHER: In this scheme, pairs of letters are encrypted, instead of


single letters as in the case of simple substitution cipher.
In playfair cipher, initially a key table is created. The key table is a 5×5 grid of
alphabets that acts as the key for encrypting the plaintext. Each of the 25 alphabets
must be unique and one letter of the alphabet (usually J) is omitted from the table as
we need only 25 alphabets instead of 26. If the plaintext contains J, then it is replaced
by I.
4) VIGENERE CIPHER: The Vigenère cipher uses a 26×26 table with A to Z as
the row heading and column heading This table is usually referred to as the Vigenère
Tableau, Vigenère Table or Vigenère Square. We shall use Vigenère Table. The first
row of this table has the 26 English letters. Starting with the second row, each row
has the letters shifted to the left one position in a cyclic way. For example, when B is
shifted to the first position on the second row, the letter A moves to the end.
In addition to the plaintext, the Vigenère cipher also requires a keyword, which is
repeated so that the total length is equal to that of the plaintext. For example, suppose
the plaintext is MICHIGAN TECHNOLOGICAL UNIVERSITY and the keyword is
HOUGHTON. Then, the keyword must be repeated as follows
MICHIGAN TECHNOLOGICAL UNIVERSITY
HOUGHTON HOUGHTONHOUGH TONHOUGNTO

We follow the tradition by removing all spaces and punctuation, converting all letters
to upper case, and dividing the result into 5-letter blocks. As a result, the above
plaintext and keyword become the following:

MICHI GANTE CHNOL OGICA LUNIV ERSIT Y


HOUGH TONHO UGHTO NHOUG HTONH OUGHT O

CIPHER TEXT:
TWWNP ZOAAS WNUHZ BNWWG SNBVC SLYPM M
4) TRANSPOSITION CIPHER: It is another type of cipher where the order of
the alphabets in the plaintext is rearranged to create the ciphertext. The actual
plaintext alphabets are not replaced.
A transposition cipher does not substitute one symbol for another (as in substitution
cipher), but changes the location of these symbols.

 It reorders (jumbles) the given plain-text to give the cipher-text.

 They are of two types: Keyed and Keyless Transposition Cipher.

Keyless Transposition Cipher:


 In this cipher technique, the message is converted to ciphertext by either of two
permutation techniques:
a. Text is written into a table column-by-column and is then transmitted row-by-row.
b. Text is written into a table row-by-row and is then transmitted column-by-column

 The first method (a) is also popularly known as Rail-fence cipher

 E.g. We need to send the message “DEFENDTHEEASTWALL”. Arranging into


tables we get :

Now, the message is sent row-by-row. So Ciphertext is


“DFNTEATALEEDHESWL”(Note: the no. of rows is 2 by default, unless
specified)Now, the message is sent row-by-row. So Ciphertext is
“DFNTEATALEEDHESWL”(Note: the no. of rows is 2 by default, unless specified)

 Similarly for the (b) method, we can arrange the same above message into tables
with four columns.

 The Data is then transmitted column-by-column as


“DNETLEDEWFTAAEHSL”The Data is then transmitted column-by-column
as “DNETLEDEWFTAAEHSL”

Keyed Transposition Cipher:


Keyed transposition cipher uses keys to encrypt and decrypt the messages. It shares the same secret
key among the senders and the receivers. Key is used as position finder for the cipher text. We can
illustrate this by giving a nice example as-
Suppose given plaintext is- “prob hatd euri goth erek”. And lets the key is=3201. Then the cipher
text will be-(Here I assumed starting from 0)
Here for encryption p is placed at 3th position, r is at 2nd, o is at 0th and b is at 1 to get the cipher
text from the given key. And for the next words the same is applied. For decryption p is placed at 0th
position, r is placed at 1st, b is placed at 3rd and o is placed at 2nd. The same is applied for the next.

CONCLUSION: thus we have completed the case study on different types of


ciphers

You might also like