Explain transposition ciphers and substitution cipher, Computer Network Security

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads.

The messages which are intended to transmit secretly and securely with full protection are subjected to the process of encryption and decryption in order to provide the desired security. The original message which is to be encrypted is called plain text. This plain text is transformed by a function with the encryption key (K) as parameter. The plain text after the transformation that is the output of the encryption process is called as cipher text. And this cipher text or the encrypted message with key is actually transmitted.

Although an intruder listens to this message/cipher text by catching the communication channel still he cannot decrypt the cipher text because he doesn't know key. Even though he doesn't know the key still he is able to break that cipher text at times and that art of breaking ciphers is known as cryptanalysis.

The art of devising and breaking ciphers is collectively called as cryptology. The encryption methods/techniques are, divided into the following two categories,

1. Substitution Ciphers

2. Transposition Ciphers.

1. Substitution Ciphers:

In this cipher, each letter or the group of letters is replaced by another group of letters. Good instance of substitution cipher is Caesar cipher. In this cipher, a becomes D, and b becomes E and so on and the Z becomes C.

An Example is written below:

An Attack becomes DWWDFN

This general system is called the mono alphabetic substitution.

In substitution ciphers, order of letters is similar to that of plain text but just disguises them.

2. Transposition Ciphers

In contrast to the substitution ciphers, transposition ciphers read the letters but do not disguise them. The key of this cipher is a word, having no repeated letters. An instance of a transposition cipher text is given below.


The main purpose of the key is to number the columns. The plain text is in rows and cipher text is prepared by assembly letters in columns.

Onetime Pads is defined below:

There is a simple way of constructing an unbreakable cipher. The procedure is initiated with the choice of a random bit string as key. Converting plaintext into a bit string and computhexc1usjve OR operation for these two strings This method/technique is known as Onetime Pad.

Posted Date: 7/20/2012 6:10:35 AM | Location : United States

Your posts are moderated
Related Questions
The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

In broadcast topology there are further two types 1) SATELLITE\RADIO 2) RING TOPOLOGY In a radio or satellite topology every computers are connected to each other via radio o

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Question (a) For the bit stream 010011, show the waveforms for each of the code indicated. Consider that the signal level for NRZ-L for mark is positive; the signal level for t

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr