logo

Cryptographic Techniques Case Study 2022

   

Added on  2022-09-21

5 Pages1074 Words17 Views
Running head: CRYPTOGRAPHIC TECHNIQUES
SUBSTITUTION CIPHER AND CRYTOGRAPHY TECHNIQUE
[Enter Name of Student:]
[Enter Name of University:]
[Author Note:]

CRYPTOGRAPHIC TECHNIQUES1
Week1 discussion 1:
Techniques to break the substitute cipher –
Cryptography is the study and analysis of encoded texts and messages using various
techniques and algorithms. Substitution technique in the cryptography is one of the several
techniques to encode a text. Substitution cipher can be termed as the process of encrypting a
single text or message and replacing the text with cipher text (Katz and Lindell 2014). Caesar
cipher is an example of the substitution cipher where the alphabets are substituted either by
shifting the sequence or by reversing the sequence with the cipher texts. These substitution
ciphers can be decoded by the process of continuous search of single letter words and also
counting of the each symbols appearing in the puzzle should be counted. The symbols such as
apostrophes should be looked after and in the encoded message segment such apostrophes must
be found out. The cipher text also contains certain repetitive letters which helps in the decoding
of the cipher blocks which contains two or three words at a time (Goyal and Kinger 2013). The
double letters in the cipher text is also to be followed and these techniques combined together
helps in the breaking of substitution ciphers. The black chamber is also an application which can
be used as a predefined platform for decoding or breaking a substitution cipher.
Secure cipher design using substitution ciphers –
The designing of cipher using substitution ciphers is done by the application of several
techniques of forward and reverse substitution of the cipher blocks. The cipher texts are mainly
plain texts which are encoded using algorithms into cipher texts which are considered to be
secure ciphers as because certain keys are required in order to break or decode the cipher texts to
get the plain text. The substitution method can be termed a secured as because the retracing of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Algorithm Assignment
|6
|1103
|186

Cyber Security and Traffic
|18
|4523
|64