Transposition Techniques PDF

Title Transposition Techniques
Author Rutvi Christian
Course Cryptography and Network Security
Institution Gujarat Technological University
Pages 4
File Size 155.2 KB
File Type PDF
Total Downloads 100
Total Views 137

Summary

This notes leads you to gain knowledge of Transposition Techniques used for Encryption Algorithm with some examples....


Description

TRANSPOSITION TECHNIQUES ● Transposition technique is a cryptographic technique that converts the plain text to cipher text by performing permutations on the plain text i.e change the position of each character of plain text for each round. eg: ABC ---> ABC, ACB,BCA,BAC,CBA,CAB

● There are two types of Transposition techniques: 1. Rail Fence Cipher 2. Row Transposition

RAIL FENCE CIPHER ● In a transposition cipher, the order of the alphabets is rearranged to obtain the cipher-text. ● In the rail fence cipher, the plain-text is written downwards and diagonally on successive rails of an imaginary fence. ● When we reach the bottom rail, we traverse upwards moving diagonally, after reaching the top rail, the direction is changed again. Thus the alphabets of the message are written in a zig-zag manner. After each alphabet has been written, the individual rows are combined to obtain the cipher-text. EXAMPLE -1:: Plaintext : BITSEDU B

T I

E S

U D

Cipher Text: BTEUISD EXAMPLE-2 :: Original Message: HELLO WORLD Key: 3

H

O E

R

L

O

L

L

W

D

Encrypted Message : HOREL OLLWD

EXAMPLE - 3 :: Plain Text: T H I S I S A S E C R E T M E S S A G E key=3

T

I H

S

E S

I

S

T C

A

S

E

M

R

S

A

E

E G

Encrypted Messae: T I E T S H S S S C E M S A E I A R E G

EXAMPLE- 4 :: Plain Text: M E E T M E I N T H E C L A S S Key=2

M

E E

M T

I E

T N

E H

Encrypted Message: M E M I T E L S E T E N H C A S

L C

S A

S

ROW TRANSPOSITION TECHNIQUE ● A more complex scheme is to write the message in a rectangle, row by row, and read the message off, column by column, but permute the order of the columns. The order of the columns then becomes the key to the algorithm.

Encryption : Key CRYPTO ( unique digits from 0 to 9)

C

R

Y

P

T

O

1

4

6

3

5

2

EXAMPLE-1 : key 4 3 1 2 5 6 7 Plain Text : attackpostponeduntiltwoam 4

3

1

2

5

6

7

a

t

t

a

c

k

p

o

s

t

p

o

n

e

d

u

n

t

i

l

t

w

o

a

m

x

y

z

Cipher Text: (Writting in order) 1 2 3 ttna aptm tsuo

4 aodw

5 coix

Cipher Text: ttnaaptmtsuoaodwcoixknlypetz

6 knly

7 petz

❏ Double Transposition:

4

3

1

2

5

6

7

t

t

n

a

a

p

t

m

t

s

u

o

a

o

d

w

c

o

i

x

k

n

l

y

p

e

t

z

Cipher Text: nscyauopttwltmdnaoiepaxttokz...


Similar Free PDFs