The University of Babylon Department of Software LECTURE NOTES ON Classical Cryptographic Techniques By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher_hussein@yahoo.com Classical Cryptographic Techniques have two basic components of classical ciphers : Substitution and Transposition Classical Ciphers Transposition Substitution Fig 1. Classical cipher Methods In Transposition Ciphers the letters are arranged in a different order, such as the word message in the following: Rotate text EGASSEM Rotate every two letters EMSSGAE MESSAGE Rotate every three letters SEMGASE Rotate every four letters SSEMEGA In Substitution Ciphers letters are replaced by other letters , such as the word message in the following: PHVVDJH TLZZHNL KEY=7 HZNNVBZ KEY=21 KEY=3 MESSAGE KEY=12 YQEEMSQ Dr. Samaher Hussein Ali Notes of Lecture 2 Transposition Ciphers Transposition or Permutation ciphers hide the message contents by rearranging the order of the letters according to the following procedures 1. Message Reversal This procedure requires that the plain text to be written backwards to produce a cipher text. Plain text: MEET ME MONDAY MORNING Cipher text: GININGROM YADNOM EM TEEM This procedure is straightforward and easy to decipher a message ,simply reverse it 2. Geometric Patterns The normal writing of a message follows a pattern from left to right, one line at a time . Message then form a geometrical pattern in the shape of a rectangular ,or any other geometrical pattern would disguise the message from a single horizontal line. It can be transposed into rectangular shapes of: 2.1. The Columns of Equal Length This method base on dived the message to number of line have the columns of equal length (i.e., each line have number of letters change dynamic base on key)by writing the plaintext vertically: Example: let , the plain text: THE SIMPLE STOPS SIBLE TANSPOSITIONS X X and Key : 4 1 5 3 2 T H E S I M P L E S T P O S S I B L E T R A N S P O S I T I O N S X X S T I E H E M S L P S T S O P E I T L B S R P N A T O I I S X O X S N Cipher text: STIEH EMSLP STSOP EITLB SRPNA TOIIS Dr. Samaher Hussein Ali Notes of Lecture 2 Transposition Ciphers 2.2. The Rows of Equal Length This method base on dived the message to number of line have the rows of equal length (i.e., each line have number of letters change dynamic base on key)by writing the plaintext horizontely: Example: let , the plain text: THE SIMPLE STOPS SIBLE TANSPOSITIONS X X and Key : 4 7 1 6 2 3 5 T H E S I I B L E T M P L E S O N S X X T P O S S T H E S I I B L E T E O S I T I R A N S P M P L E S O S I T I T P O S S O N S X X R A N S P Cipher text: I B L E T O N S X X T H E S I E O S I T I M P L E S T P O S S R A N S P This procedure produce a very limited degree of message security, however, geometrical patterns are useful an intermediate step for another encryption procedure ,route transposition 3. Route transposition : It is providing a way of further scrambling geometrically shaped message . Example: Let, the plain text: SEND HELP SOON the cipher text: SE ND HE LP SO ON The cipher text message is easily understood. The procedure provides very little security. We can increase the scrambling if we make use of the rectangle (2*6)as intermediate step. Then the cipher text become: the cipher text: SNHLSO EDEPON Dr. Samaher Hussein Ali Notes of Lecture 2 Transposition Ciphers 4. Zig Zag Transposition In this method, The plaintext divided into fixed lengths. one length contains every even positioned letter of the message. The transposing process follow this type of pattern(zig zag) Example: Let, the plain text: SEND HELP SOON, and depth=2 find cipher text: the cipher text: SNHLSO EDEPON * Reversed Zig Zag Transposition The enciphering starts with the last letter of the plain text and continues back to the beginning of the message first the odd positioned letters are taken and then even positioned “ ones Example: Let, the plain text: SEND HELP SOON the cipher text: NOPEDEOSLHNS 5. Route variations Route transpositions can go in many different directions: Horizontal Vertical Diagonal Clockwise Counter clockwise If we use the message in (3*4) geometric shapes, several of these route transpositions can be illustrated: Dr. Samaher Hussein Ali Notes of Lecture 2 Transposition Ciphers 5.1. Horizontal Route SEND NOOS HELP PLEH SOON DNES 5.2. Vertical Routes SDLO NSEN EHPO OPHE NESN OLDS 5.3. Digonal Routes S E D L N O S E N H P O O P H N E S O N L D E S 5.4. Clockwise SEND OONH SPLE 1 S E N D O O N H S P L E L E 2 3 5.5. Counter Clockwise SPLE OONH SEND S P O O N H S E N D 2 1 Dr. Samaher Hussein Ali Notes of Lecture 2 Classical Cryptographic Techniques As a result classical ciphers : substitution and transposition Classical Cipher Methods Message Reversal Horizontal Transposition Substitution Methods Methods Geometric Patterns Route variations Vertical Diagonal Zig Zag Transposition Clockwise Route transposition Next Lecture Counter Clockwise Fig 2. Expending of Classical cipher Methods Dr. Samaher Hussein Ali Notes of Lecture 2