Cryptography Lecture 1: Chantilly Academy - PowerPoint PPT Presentation

About This Presentation
Title:

Cryptography Lecture 1: Chantilly Academy

Description:

Cryptography Lecture 1: Chantilly Academy. Poorvi Vora. Department of Computer Science ... Crypto Lecture 1: Spring 07. 8. Decrypt your messages ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 16
Provided by: poo69
Category:

less

Transcript and Presenter's Notes

Title: Cryptography Lecture 1: Chantilly Academy


1
Classical Ciphers
  • Cryptography Lecture 1 Chantilly Academy
  • Poorvi Vora
  • Department of Computer Science
  • George Washington University

2
Cryptography
  • Why might one need cryptography?

3
What is a cryptosystem?
  • A cryptosystem consists of
  • All messages called plaintext
  • All encrypted messages called ciphertext
  • A set of all keys
  • A procedure for encryption
  • A procedure for decryption

4
(No Transcript)
5
Caesar Cipher
A B C D E F G H I J K
d e f g h i j k l m n
AN EYE FOR AN EYE dq hbh iru dq hbh Trivial to
break
6
Shift Cipher
Key A B C D E F
0 a b c d e f
1 b c d e f g
2 c d e f g h
3 d e f g h i
4 e f g h i j




7
Encrypt your own messages
  • Choose a key
  • Choose a short message for the person to your
    right.
  • Use the scratch paper to encrypt the message
    using the table and the key
  • Write the encrypted message on one side of an
    index card. Write the key you used on the other.
  • Give it to the person.

8
Decrypt your messages
  • If you got a message, decrypt it, using the key
    and the table
  • If not, decrypt
  • rfym nx httq
  • using key 5

9
Vigenère Cipher
  • The key used for each symbol is different.
  • For example
  • AN EYE FOR AN EYE
  • BA BA BLACK SHEEP
  • (Here A0, B1, C2, etc.)
  • bn fyf qot k.

10
Vigenère Cipher on bits
  • 010111011101 message

11
Encrypt with Vigenère Cipher
  • Use a coin to generate the bits of the key.
  • Encrypt the following string
  • 01001011
  • Encrypted message on index card, key on back,
    pass it to person next to you

12
Decrypt
  • Decrypt the message given to you using the key on
    the back of the card

13
HW Assignment
  • Decrypt the following texts
  • etarq tqemu encrypted using the shift cipher
  • hjko me rtds encrypted using the Vigenère Cipher
  • One is impossible to break without knowing the
    key. Which one? Why?

14
Permutation Cipher
x 1 2 3 4 5
?(x) 3 2 5 1 4
x 1 2 3 4 5
?-1(x)
Encrypt canwegohomenow
15
Special Permutation Cipherperhaps the oldest
known cipher
  • classisboringtoday
  • ciidlsnaabgysotrsrox
  • What was the permutation?
  • History
Write a Comment
User Comments (0)
About PowerShow.com