2
Most read
3
Most read
4
Most read
M.SUJITHA,
II-M.SC(CS&IT),
Nadar Saraswathi College Of Arts And Science,
Theni
 A rotor machine is an electro-mechanical stream
cipher device used for encrypting and decrypting secret
messages.
 Rotor machines were the cryptographic state-of-the-art for a
prominent period of history; they were in widespread use in
the 1920s–1970s.
 The most famous example is the German Enigma machine,
whose messages were deciphered by the Allies during World
War II, producing intelligence code-named Ultra.
Rotor machine,subsitution technique
 Asubstitution cipher is a method of encrypting by which units of plaintext
are replaced with ciphertext,
 According to a fixed system; the "units" may be single letters pairs of
letters, triplets of letters.

More Related Content

PPT
Authentication Application in Network Security NS4
PPT
Block Cipher and its Design Principles
PPTX
Key management and distribution
PPTX
Security in distributed systems
PPT
Network Security and Cryptography
PPT
key distribution in network security
PDF
Web Security
PPTX
Hash Function
Authentication Application in Network Security NS4
Block Cipher and its Design Principles
Key management and distribution
Security in distributed systems
Network Security and Cryptography
key distribution in network security
Web Security
Hash Function

What's hot (20)

PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Authentication techniques
PPTX
Key management
PPT
Authentication Protocols
PPTX
Implementation levels of virtualization
DOCX
S/MIME
PPTX
Principles of public key cryptography and its Uses
PPTX
Pgp pretty good privacy
PPT
System models in distributed system
PDF
RSA ALGORITHM
PPTX
IP Security
PPTX
IoT Enabling Technologies
PDF
Classical encryption techniques
PDF
Network security - OSI Security Architecture
PPTX
Hash Function
PPTX
Substitution techniques
PPT
SSL & TLS Architecture short
PPTX
Public Key Cryptosystem
PPTX
Challenges of Conventional Systems.pptx
PPTX
Cryptography and Information Security
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Authentication techniques
Key management
Authentication Protocols
Implementation levels of virtualization
S/MIME
Principles of public key cryptography and its Uses
Pgp pretty good privacy
System models in distributed system
RSA ALGORITHM
IP Security
IoT Enabling Technologies
Classical encryption techniques
Network security - OSI Security Architecture
Hash Function
Substitution techniques
SSL & TLS Architecture short
Public Key Cryptosystem
Challenges of Conventional Systems.pptx
Cryptography and Information Security
Ad

More from kirupasuchi1996 (15)

DOCX
rotor machine
PPTX
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
PPTX
Cyper crime
PPTX
PPTX
Image compression standards
PPTX
Language and Processors for Requirements Specification
PPTX
Software Cost Factor
PPTX
GUI components in Java
PPTX
Designing Techniques in Software Engineering
PDF
Dmppt 180312092027
PDF
Datatransferandmanipulation 180214044522
PDF
Filesharing 180214044607
PDF
B tree-180214044656
PPTX
Addressingmodes
PPTX
Managing,working with files
rotor machine
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
Cyper crime
Image compression standards
Language and Processors for Requirements Specification
Software Cost Factor
GUI components in Java
Designing Techniques in Software Engineering
Dmppt 180312092027
Datatransferandmanipulation 180214044522
Filesharing 180214044607
B tree-180214044656
Addressingmodes
Managing,working with files
Ad

Recently uploaded (20)

PDF
Lesson.-Reporting-and-Sharing-of-Findings.pdf
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PPTX
Going_to_Greece presentation Greek mythology
PPTX
IoT Lecture IoT Lecture IoT Lecture IoT Lecture
PDF
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
DOCX
Audio to Video AI Technology Revolutiona
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPTX
Introduction: Living in the IT ERA.pptx
PPTX
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
PPTX
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
Networking2-LECTURE2 this is our lessons
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PPTX
PORTFOLIO SAMPLE…….………………………………. …pptx
PPTX
Introduction to networking local area networking
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PDF
JuanConnect E-Wallet Guide for new users.pdf
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PDF
Paper: World Game (s) Great Redesign.pdf
Lesson.-Reporting-and-Sharing-of-Findings.pdf
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
Going_to_Greece presentation Greek mythology
IoT Lecture IoT Lecture IoT Lecture IoT Lecture
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
Audio to Video AI Technology Revolutiona
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
Introduction: Living in the IT ERA.pptx
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Networking2-LECTURE2 this is our lessons
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PORTFOLIO SAMPLE…….………………………………. …pptx
Introduction to networking local area networking
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
JuanConnect E-Wallet Guide for new users.pdf
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
Paper: World Game (s) Great Redesign.pdf

Rotor machine,subsitution technique

  • 2.  A rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting secret messages.  Rotor machines were the cryptographic state-of-the-art for a prominent period of history; they were in widespread use in the 1920s–1970s.  The most famous example is the German Enigma machine, whose messages were deciphered by the Allies during World War II, producing intelligence code-named Ultra.
  • 4.  Asubstitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext,  According to a fixed system; the "units" may be single letters pairs of letters, triplets of letters.