(Self Study) Lecture Slides for Week -3
(Self Study) Lecture Slides for Week -3
Key for
permutation
Transposition ciphers: ‘Keyless + Keyed’ combination
• First, the text is written into a table row by row.
• Second, the permutation is done by reordering
the columns.
• Third, the new table is read column by column.
• Called keyed columnar transposition ciphers or
just columnar transposition ciphers.
Ciphers
• Encryption and decryption are done one symbol at • group of plaintext symbols of size m (m > 1) are
a time encrypted together creating a group of ciphertext of
• We have a plaintext stream, a ciphertext stream, the same size
and a key stream
• Symmetric-key modern block cipher encrypts an n-bit block of plaintext or decrypts an n-bit block of
ciphertext.
• Encryption or decryption algorithm uses a k-bit key.
• Decryption algorithm must be the inverse of the encryption algorithm
• Both operations must use the same secret key
• Padding must be added to make the block n-bit.
Modern (Symmetric-key) Block Ciphers
• How many padding bits must be added to a message of 100 characters if 8-bit ASCII is used for
encoding and the block cipher accepts blocks of 64 bits?
• 32 bits -> total of 832 bits or thirteen 64-bit blocks.