Classical Cryptography
Classical Cryptography
• secret (crypto-) writing (-graphy)
• concerned with developing algorithms which may be used to:
– conceal the context of some message from all except the sender and recipient
(privacy or secrecy), and/or
– verify the correctness of a message to the recipient (authentication)
Key: some critical information used by the cipher, known only to the
sender & receiver
ciphertext only
• only have access to some enciphered messages
• use statistical attacks only
known plaintext
• know (or strongly suspect) some plaintext-ciphertext pairs
• use this knowledge in attacking cipher
chosen plaintext
• can select plaintext and obtain corresponding ciphertext
• use knowledge of algorithm structure in attack
chosen plaintext-ciphertext
• can select plaintext and obtain corresponding ciphertext, or select ciphertext and obtai
n plaintext
• allows further knowledge of algorithm structure to be used
Symmetric Cryptography
In the symmetric cryptography a single key is used for encrypting and decrypti
on the data. This encryption key is private key. This is the limitation of this encr
yption technique that this private key must be distributed only among the auth
orized sender and receiver.
Classical Cryptography
Transposition Ciphers
In Cryptography, a transposition cipher is a method of encryption by which the positio
ns held by units of plaintext (which are commonly characters or groups of characters) a
re shifted according to a regular system, so that the ciphertext constitutes a permutation
of the plaintext
That is, the order of the units is changed (the plaintext is reordered). Mathematically, a
bijective function is used on the characters’ positions to encrypt and an inverse functio
n to decrypt.
Classical Cryptography
Substitution Cipher
according to a fixed system; the “units” may be single letters (the most comm
on), pairs of letters, triplets of letters, mixtures of the above, and so forth.
Substitution Cipher
Caesar Cipher:
Caesar cipher algorithm is as follows:
• Read each alphabet of plain text
• Replace each alphabet by 3 places down.
• Repeat the process for all alphabet in the plain text.
Monoalphabetic Cipher:
In simple words, if the alphabet ‘p’ in the plain text is replaced by the
cipher alphabet ‘d’. Then in the entire plain text wherever alphabet ‘p’ is
Step 3: In this step, we will convert plain text into ciphertext. For that, take the
first pair of plain text and check for cipher alphabets for the corresponding in the
matrix. To find cipher alphabets follow the rules below.
Pair: me et me to mo rx ro wz
Cipher Text: kn ku kn kz ks ta kc yo
This is how a plain text converts to ciphertext using Playfair cipher. When
compared with monoalphabetic cipher Playfair cipher is much more advanced.
But still, it is easy to break.
Substitution Cipher
Hill Cipher:
Hill cipher is a polyalphabetic cipher introduced by Lester Hill in 1929. Let us
discuss the technique of hill cipher.
Plain text: Binary
Key: HILL
Choose the key in such a way that it always forms a square matrix. With HILL
as the key, we can form a 2×2 matrix.
The general equation to find cipher text using hill cipher is as follow:
C = KP mod 26
Substitution Cipher
Polyalphabetic Cipher:
But polyalphabetic cipher, each time replaces the plain text with
the different ciphertext.
Modern Cryptography
Stream Cipher
Symmetric or secret-key encryption algorithm that encrypts a single bit at a ti
me. With a Stream Cipher, the same plaintext bit or byte will encrypt to a differ
ent bit or byte every time it is encrypted.
Modern Cryptography
Block Cipher
An encryption method that applies a deterministic algorithm along with a sym
metric key to encrypt a block of text, rather than encrypting one bit at a time a
s in stream ciphers.
Advantages of Classical Cryptography:
While employing the one-time pad, it is unbreakable.