Title | Transposition Techniques |
---|---|
Author | Rutvi Christian |
Course | Cryptography and Network Security |
Institution | Gujarat Technological University |
Pages | 4 |
File Size | 155.2 KB |
File Type | |
Total Downloads | 100 |
Total Views | 137 |
This notes leads you to gain knowledge of Transposition Techniques used for Encryption Algorithm with some examples....
TRANSPOSITION TECHNIQUES ● Transposition technique is a cryptographic technique that converts the plain text to cipher text by performing permutations on the plain text i.e change the position of each character of plain text for each round. eg: ABC ---> ABC, ACB,BCA,BAC,CBA,CAB
● There are two types of Transposition techniques: 1. Rail Fence Cipher 2. Row Transposition
RAIL FENCE CIPHER ● In a transposition cipher, the order of the alphabets is rearranged to obtain the cipher-text. ● In the rail fence cipher, the plain-text is written downwards and diagonally on successive rails of an imaginary fence. ● When we reach the bottom rail, we traverse upwards moving diagonally, after reaching the top rail, the direction is changed again. Thus the alphabets of the message are written in a zig-zag manner. After each alphabet has been written, the individual rows are combined to obtain the cipher-text. EXAMPLE -1:: Plaintext : BITSEDU B
T I
E S
U D
Cipher Text: BTEUISD EXAMPLE-2 :: Original Message: HELLO WORLD Key: 3
H
O E
R
L
O
L
L
W
D
Encrypted Message : HOREL OLLWD
EXAMPLE - 3 :: Plain Text: T H I S I S A S E C R E T M E S S A G E key=3
T
I H
S
E S
I
S
T C
A
S
E
M
R
S
A
E
E G
Encrypted Messae: T I E T S H S S S C E M S A E I A R E G
EXAMPLE- 4 :: Plain Text: M E E T M E I N T H E C L A S S Key=2
M
E E
M T
I E
T N
E H
Encrypted Message: M E M I T E L S E T E N H C A S
L C
S A
S
ROW TRANSPOSITION TECHNIQUE ● A more complex scheme is to write the message in a rectangle, row by row, and read the message off, column by column, but permute the order of the columns. The order of the columns then becomes the key to the algorithm.
Encryption : Key CRYPTO ( unique digits from 0 to 9)
C
R
Y
P
T
O
1
4
6
3
5
2
EXAMPLE-1 : key 4 3 1 2 5 6 7 Plain Text : attackpostponeduntiltwoam 4
3
1
2
5
6
7
a
t
t
a
c
k
p
o
s
t
p
o
n
e
d
u
n
t
i
l
t
w
o
a
m
x
y
z
Cipher Text: (Writting in order) 1 2 3 ttna aptm tsuo
4 aodw
5 coix
Cipher Text: ttnaaptmtsuoaodwcoixknlypetz
6 knly
7 petz
❏ Double Transposition:
4
3
1
2
5
6
7
t
t
n
a
a
p
t
m
t
s
u
o
a
o
d
w
c
o
i
x
k
n
l
y
p
e
t
z
Cipher Text: nscyauopttwltmdnaoiepaxttokz...