What are substitution and transposition ciphers?
Web
www.tech-faq.com
FAQs
Tutorials
Web Tools
Reference
Blog
Free SMS
Cell Phone Reviews
What are substitution and transposition ciphers?
Substitution and Transposition Ciphers are two categories of ciphers
used in classical cryptography. Substitution and Transposition differ
in how chunks of the message are handled by the encryption process.
Substitution ciphers
Substition ciphers encrypt plaintext by changing the plaintext one piece at a time.
The Ceasar Cipher was an early substitution cipher. In the Caesar
Cipher, each character is shifted three places up. Therefore, A becomes
D and B becomes E, etc...
This table shows "VOYAGER" being encrypted with the Caesar substution cipher:
PlaintextVOYAGER
Key+3+3+3+3+3+3+3
CiphertextYRBDJHU
A more complex substitution cipher would be created if, instead of
incrementing each character by three, we used a more complex key. This
table shows a simple substitution cipher with a key of "123".
PlaintextVOYAGER
Key+1+2+3+1+2+3+1
CiphertextWQBBIHS
An even more complex substitution cipher can be made by having each
character of the alphabet correspond to a different letter of the
alphabet, without a set pattern.
Plaintext
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Key
T
O
E
U
N
Z
I
A
G
X
P
Q
Y
R
H
V
S
M
D
F
C
J
W
B
K
L
Using this substitution cipher to encrypt VOYAGER would give us these results:
PlaintextVOYAGER
CiphertextJHKTXNM
The Vernam Cipher, or one time pad, is a simple substitution cipher where the key length equals the message length.
ROT-13 is a simple substitution cipher used to encode messages on Usenet.
Transposition ciphers
Transposition ciphers encrypt plaintext by moving small pieces of
the message around. Anagrams are a primitive transposition cipher.
This table shows "VOYAGER" being encrypted with a primitive
transposition cipher where every two letters are switched with each
other:
VOYAGER
OVAYEGR
Substitution and transposition ciphers in modern times
Modern cryptanalysis makes simple substitution and transposition ciphers obsolete.
However, these techniques remain useful for understanding cryptography and the workings of more complex modern ciphers.
Purchase these excellent books on cryptology at Amazon.com
Bookmark What are substitution and transposition ciphers?
Latest Blog Posts
Repair WinSockWindows Vista’s New Applications and FeaturesFlash MP3 PlayersWindows Vista UpgradesUser Risks Created by DRMWhat's New in Windows Vista?Windows Vista - Strengths and WeaknessesDell SupportDFI LAN Party UT nF4 SLI-DR Expert MotherboardBuffalo TeraStation HS
Enter your search terms
Submit search form
Web
www.tech-faq.com
Translation Engine #1:
Translation Engine #2:
Social bookmark this page
Free Emoticons
var dc_UnitID = 14;
var dc_PublisherID = 2988;
var dc_AdLinkColor = 'blue';
var dc_adprod='ADL';
Cryptology FAQs
What is cryptology?
What is cryptography?
What is cryptanalysis?
What are plaintext and ciphertext?
What are symmetric and asymmetric ciphers?
What are block and stream ciphers?
What are substitution and transposition ciphers?
What is a chosen plaintext attack?
What is a known plaintext attack?
What is a known ciphertext attack?
What is a dictionary attack?
What is a brute force attack?
What is rubber hose cryptology?
What is a message digest?
What is PKI?
What are the PKI authorities?
What is a digital certificate?
What is a PKI certificate?
What is a certificate authority?
What is x.509?
What is a root certificate?
What is a root certificate update?
What is a digital signature?
What is MD5?
What is PGP?
What is GPG?
How can I encrypt an entire disk?
What are cryptographic algorithms?
What is ROT-13?
What is XOR encryption?
What is a one-time pad?
What is DES?
What is RC4?
What is RSA?
What is Diffie-Hellman?
What is AES (Rijndael)?
What are cryptographic libraries?
What is steganography?
What is a wordlist?
What is S/MIME?
Main Menu
Networking
Physical Networking
Data Link Networking
Network Layer Networking
Network Security
Wireless Networks
VoIP
Telephony
Mobile Telephony
Radio
Television
Cryptology
Passwords
Magnetic and Smart Cards
Privacy
Malware
Software Vulnerabilities
Unix
Microsoft Windows
The Web
E-mail
Instant Messaging
Databases
Computer Hardware
CPU's
Memory
Storage
Audio
Satellite
Java
Miscellaneous
Site Map
Wyszukiwarka
Podobne podstrony:
Transposition CiphersCryptography Tutorial Transposition CiphersTransposition cipher Wikipedia, the free encyclopediaAGH Sed 4 sed transport & deposition EN ver2 HANDOUTFs 1 (tusługa za transport)[W] Badania Operacyjne Zagadnienia transportowe (2009 04 19)CipherInputStreamTRiBO Transport 0214 shtml6 6 Zagadnienie transportowe algorytm transportowy przykład 2about shtmlaitips foldertabs shtmlindex shtml (2)ABC UE Wspólna polityka transportowa Unii Europejskiej (2002)mk wyklady transport sem 1GW CW03 A Transportwięcej podobnych podstron