0% found this document useful (0 votes)
5 views11 pages

SC 2

The document outlines various encryption and decryption techniques, including rail transposition and DES (Data Encryption Standard). It explains the processes for both encrypting and decrypting messages using these methods, highlighting their advantages and disadvantages. Additionally, it discusses the fundamental attributes of DES and its key generation process.

Uploaded by

Varshini 06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views11 pages

SC 2

The document outlines various encryption and decryption techniques, including rail transposition and DES (Data Encryption Standard). It explains the processes for both encrypting and decrypting messages using these methods, highlighting their advantages and disadvantages. Additionally, it discusses the fundamental attributes of DES and its key generation process.

Uploaded by

Varshini 06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Entngption -

1. Choose he numbex of rails:


This is the key to he chiper
text in zig tag patten.
This plain Text is wviten jn diagonal
lines acrosS tha chosen numbes of
trails.
3. Flaten Ihe zi'g Zag .
Read each Yail lineasly to produce
tho ciphar te sct 11

Ehaplei - plain Text .:- Trans posibion


keg :

t
n
Ps
eT PHEK 7EX1, TASOI IN RNPS7D
n

|CI PHER TEX7Ts IN RNPSTo


Deoryption -
Ex cipher Ioxt'- TASo lIN RNPSTo
key !- 2
T A

plain lezl :- TANS po S| TION


Detryptron.- Rail (eoa cphe
1. De temine the pa ttern
zrg Za9
Based on the number of rails and

aip her te zt lengtt


Ell io the zig Zag
Fil| the vails rous by row n the

Zig Zag order


3 Re consth ct the plain Te zt
Read Ehe rails io the Zig Zag palen
to econ gtnuct lke orcginal Mess age
Ad vantage' -
Easy to implemen t se curity
slbective for short s law-
mecsages
D0sa dvatage:
3 vulnerable to frequny and
Pa Hern analysls
(i5 (te key (number of rails is small)
’Easy to breat nsing brate force.
Since the key space is linited
) Bleck Transpos tion ciphey
(er)
&ingle columnar 7vans pocition
Cipher
Iransposition ciphes
columnat
is writen inlo a
plaintext
grid (Tabu) row by
The cipher de xt s genevated by
Ehe olunns based
aman ging 1 leading
sprcifie key
Entnyption Protecs,
1. choose a key
tie key word to determine
the olumn prder.
to the lefterr of
AssIgn numbexs
the keyword bas ed their alphake tiial
order.

9. Wri'te plain Text


he o Rpws
Fill tAhe grld r by row wits
the plain text.
text leng% doe not erferté
AilI empty cell
fit the gnd ,
with chaater ("x")
a
the ky
3. Rrarang e The columns based on
Reorder Itie accodir,to the
columns
numbers asslgped to Ithe keyword key.
4. Read the columns in order of the
con cate nate tthe le ttexs colum) by columo
uphetezt.
Pain Teyt-ve bave dis lovered a new

algor ithm
key word.- zeba
5olubton.' -
Step1 Assign Dumbor to keey
2 -5

Table by gs iag key and


SHep 2 Form
plain Text.
E R
(5) (3)
A V

R
V
w
D
R
L
H M
the number
Sep 3.- Baled pon TEaranging
Lorite he Chiper Tezt
HTEN nH EDVÐLT
ciphes Tex!iVcEWRX
wEDDAT
ASREOM
Decyptlen and colume
1. Drtemine le number of rows
lengtt of cipher teet 4 key
the
the cifhes text column by dumn
kJrite
. ino grtd based key order
columos back to thalr
3. Rearange hu
aslng a kay.
Drgin al pcitlons to
row by
4. Read the grd plain Tewt
Re tonstmtt the

VCEWRX HIEN ED VAL


ciple A SREbM wEoD9T

2 4 |
kay- ZEBRA 5 3

B R

5 3 2
V
W
E

A E
R

T X
DIS COVER ED
HAVE
Plain TEX 1. - WE AL40e)THM
NEN
Double columnar ranspositfon ciphe
Tt enhan tee the
Lolumnar transparitr'oo by
transpecilion protess twite,
ppy ing the
either Lame
key/ two d1feurt

keyt. makee
Ddder layeo ef conplarby
jt more r/stant to eyp toaoalysis.
Ent ypten proces -
7. choos e one /Two keys
either Leme key/ oliljecnt
kay for trantpacttlon.
d. Frst Trans paribi'oo
hrite ltu plaintext in rous 2 rearrange
Hhe coum basc-on tirst
3. Seloo d Trans poition!.
write he Reault from the
Frst Trans pos itiorn ins heus grtde
and Arange the column agaln
based DO Aane key lseiond key
4. 6yenerale the ciphe ert.
Read the column based ordes
Fampk
plain ext !- we bare distove red a neus olgoiho

Ent hyption 2! fom Tabu I


B RA pecgptfon'
key:- zebra
V
wrte a Jeter io
W ous wlse orcey
E ) WE HD VE
DIStoVE RCD
E R
NEw
D A AL boR I7H^7
Plain feyi ).
H M

Cipher et vcE WRX HIEN 67 H EDVALT


ASREON WEO AT
Entnypten 2:- wrfte characte io o
Row wlse @rder Deenptlon
kefa :- Puto.
P o oite a angwer
In ro ) ise orda
3 5 4 2
VCE WRX
V CE W RHTEN G7H
ED VALT

D V WEoDA T
CPpm t cuble 2
R E
E
chifco Text- HHLEO RNVSWI VXG9RE
WE DA MA EIE TOD
Deta Ennyptioo slandad
Tt is tke Syrn metrie-key algoithng
Entnypten f Digital bate
5b bt Key lengts
DES s Block cipher with 5b B
key lengl5 and oed io Data Se urnby
data io Blocks at
It Encnypt the
64 - bitc, which neans b4 bitpala Text
DES produce k4 biEs of iphes Tet.
Basilally it has
key value . io aittal stage
pro uss tasts
Be fore DES
key is oiscardled
eey t6 bit of e
Comes like 56 blt keey froo
the oHgis al b4-bit key.
8,l6,d4,3 2, 4D, 4e bb, b4 b7
cae dislarded.
Fandamental atHbutes.
. Substitution C onfusion)
2. Trans potillon (diffslon)
DES hare l6 steps, cach step
is talled pund.
Bioad evel sps,- in DES.

64 bit
Iþ lan ext
Loiti'al |Right plain
blalo Jext pemutat'vr Text
(2PT) (IP) |(&PT)

key l16 Rounds |lB Rouods k key


Fipal
Permutatioo
(FP)

plah
Text
Cipher Text
Gfeneral stuclcee
Tntial
Pernouta Hoo
roand
k1 Round
Rund2 key
61enerator ciphor
4 bit

Final permutatron

b4 bit chphe Te t
key genevalion
key with party brtsS

Poaity dop
56 LIts

Shit lyE

Comprsioo
P bo

Shift left Shift left

28
28
2
Comprtccion

28
Pond

Diffuc lon- Tt change sing le bit in


plain xt, then sta trtica ly hat
tre bibs In ciphe te et shDuld change
Confuslon, Each Binany digrt
The cíphe text de pend se veral pasts of
’ To conple to Ihe ciphes tet
the
)
DES Clo bit plaro Text
lo-bit
plain Text

|P-to
JLejtshiJt
key 1 P-8
Funetion keys<
Left shigt
Swappig
key 2

Functls key

Ip-)

8 bit cpher

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy