0% found this document useful (0 votes)
43 views63 pages

Cryptology

The document explains the concept of cryptology and cryptography, detailing the shift cipher method, also known as Caesar cipher, which involves encrypting messages by shifting letters a fixed number of places. It outlines the process of encryption and decryption, provides examples, and introduces key terms such as plain text, ciphertext, and key. Additionally, it includes exercises for encrypting and decrypting messages using specified shifts and the modulo operator.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views63 pages

Cryptology

The document explains the concept of cryptology and cryptography, detailing the shift cipher method, also known as Caesar cipher, which involves encrypting messages by shifting letters a fixed number of places. It outlines the process of encryption and decryption, provides examples, and introduces key terms such as plain text, ciphertext, and key. Additionally, it includes exercises for encrypting and decrypting messages using specified shifts and the modulo operator.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 63

Shift Cipher

Cryptology
What do you mean by the message

KXZYTLEO?
Who uses Cryptology?

 Banks
 Army or Military
 Insurance
 Social media
 Businesses
Cryptography

 Originated from the Greek works


KRYPTO which means hidden and
GRAPHENE means writing.
 Is a method of making and breaking
of secret codes.
Process of Cryptography

CRYPTOGRAPHY
Process of Cryptography

CRYPTOGRAPHY
Process of Cryptograhy

CRYPTOGRAPHY

ENCRYPTION
Process of Cryptography

CRYPTOGRAPY

ENCRYPTION
DECRYPTION
Process of Cryptography

CRYPTOGRAPHY

ENCRYPTION
KEY DECRYPTION
ILLUSTRATION:

(Message : Plain text ) Maths is fun


ILLUSTRATION:

(Message : Plain text ) Maths is fun


ILLUSTRATION:

(Message : Plain text ) Maths is fun

(Message : Coded Form) PDWKV LV


IXQ
TERMS:

1. PLAIN TEXT = refers to the original


message
2. CIPHERTEXT = refers to the coded
message
3. KEY = refers to the strings of
information that is used to reveal
the encrypted message into
readable form.
Simple Methods of
Cryptography
 Shift Cipher
- it is called Ceasar Cipher
- it is the simple type of substitution of
cipher.
- It is the method of cryptology where in the
message is encrypted using a fixed number
of shift (move) in order the have the
equivalent character in a form of
ciphertext.
- The number of shift can be any number
from 0 - 25
Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.

PROCEDURE:
- Place the sliding ruler to the first letter of the alphabet of the
plain text to the right using the indicated shift.
How to make Key

English Alphabet
How to make Key

English Alphabet
How to make Key

English Alphabet

Cipher Alphabet
Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.


Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.


Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.


Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.


Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.


Method of Shift Cipher

1. Shift to either left or right

Example: Shift of 3 to the right.


Method of Shift Cipher

Example : Using a shift of 5 to the


left.
Method of Shift Cipher

Example : Using a shift of 5 to the


left.
Method of Shift Cipher

Example : Using a shift of 5 to the


left.
Method of Shift Cipher

Example : Using a shift of 5 to the


left.
Method of Shift Cipher

Example : Using a shift of 5 to the


left.
Method of Shift Cipher

Example : Using a shift of 5 to the


left.
Example :

 Using the key of shift of 3 to the


right, encrypt the Word “
CRYPTOGRAPHY”
Answer:

 CRYPTOGRAPHY =
FUBSWRJUDSKB

Key:
Example

 Decrypt the cipher text, “BJY DN


BJJY”, using the key of 5-shifts to
the left.
Answer :

 “BJY DN BJJY”= God is good.

Key:
Example:

3. Encrypt the word “ Our Lady of


Fatima University” using 2 shift to
the left.
ANSWER:

Key:

“Our Lady of Fatima University”


MSP JYBW MD DYRGKY
SLGTCPQGRW
EXAMPLE:

 Decryt
the ciphertext “ G YK
GLRCJJGECLR” using 2-shift to the
left.
ANSWER:

Key:

“ G YK GLRCJJGECLR”
I AM INTELLIGENT
BONUS POINTS: ( 10 –
POINTS)
Encrypt the word “Philippines”, using
6-shift to the right.
Answer to the bonus point

Key:

PHILIPPINES
VNOROVVOTKY
BONUS POINTS: 10 PTS

Decrypt the word “ SGZNKSGZOIY”,


using 6-shift to the right.
Answer to the bonus point

Key:

SGZNKSGZOIY
MATHEMATICS
Method of Shift Cipher

 Usingthe Modulo operator


= The sender of the message uses
the key K to encrypt and to decrypt
the secret message. The key K may
have any integer value from 0 – 25
and this will be shared to the
person/s who will be receiving the
secret message.
Using the Modulo
Operator
To encrypt the message:
 1. Express the letters of the alphabet
into an integer from 0 to 25, that
matches its order, for example A = 0, B
= 1, C = 2 ….., then label them as E
 2. Calculate C = (E+ K) mod 26 , for
every letter of the message.
 3. Convert the number C into a letter
following the order of the letter of the
alphabet.
M = 12 , W = 22, I = 8, S = 18, F = 5, U = 20, N = 13, T = 19, O = 14, L = 11,
E = 4, A = 0, R = 17

Example:

1. : Encrypt the message “MMW is fun


to learn”
Let K = 5
M = 12 , W = 22, I = 8, S = 18, F = 5, U = 20, N = 13, T = 19, O = 14, L = 11,
E = 4, A = 0, R = 17

Example:

E= MMW IS FUN TO LEARN


12 12 22 8 18 5 20 13 19 14 11 4 0 17 13

+K = 5

(17 17 27 13 23 10 25 18 24 19 16 9 5 22
18 ) MOD 26

C = 17 17 1 13 23 10 25 18 24 19 16 9 5 22
18
Answer :

MMW is fun to learn

RRB NX KZS YT QJFWS


Example:

 Encrypt
the words “ MEDICAL LAB
SCIENCE” using the key k = 17
Example:

 Encrypt
the words “ BSACC
COMSCIENCE” using the key k = 17
How to decrypt..

To Decrypt the Message:


1. Express the letters of the CIPHER
alphabet into an integer from 0 to 25, that
matches its order, for example A = 0, B =
1, C = 2 ….., then label them as C
2. Calculate E = (C - K) mod 26 , for every
letter of the decrypted message.
3. Convert the number E into a letter
following the order of the letter of the
alphabet.
Example:

Decrypt the RRB NX KZS YT


QJFWS
Example:

Decrypt the RRB NX KZS YT


QJFWS
Example:

 Decryptthe cipher text “IYE KBO


KWKJSXQ”, using modulo arithmetic
with key k = 10.
Answer :

You are Amazing


Example # 2

 Encryptthe word text “FATIMA”


using the Modulo Operator, given k
= 20
Answer :

ZUNCGU
ASSIGNMENT:

1. Encrypt the word “I LOVE YOU” ,


using the arithmetic modulo
operator and the K= 18.

2. Encrypt the word “I LOVE YOU” ,


using the shift of 8 to the right.

You might also like