Sunteți pe pagina 1din 25

ENCRYPTI

ONTUGAS UTS4
TEKNOLOGI DAN SISTEM
KOMUNIKASI

ARDIA
OVIDIUS
191321045
1. ENCRYPTION USING BLOCKING
METHOD
PLAIN TEXT TO ENCRYPT : ARDIAOVIDIUSCOR
 RULE: 5 CHARACTERS EACH BLOCK

CHIPERTEXT process:
a
A R D I A OV I D I US C OR
Block of 5 Char
Read the text horizontally
to produce chipertext.

CHIPERTEXT: AIVICRAIUODODSR
2. ENCRYPTION USING PERMUTATION
 PLAIN TEXT TO ENCRYPT : AIVICRAIUODODSR
METHOD
 RULE:
1 2 3 4 5

1 2 3 4 5

PERMUTATION PROCESS
A I V I C R A I U O D O D S R

CHIPERTEXT: CIVIAOUIARRSDOD
3. ENCRYPTION USING HILLCHIPER
METHOD
 PLAIN TEXT TO ENCRYPT : CIVIAOUIARRSDOD
 SUBTITUTION TABLE:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

 KEY, Matrix Ordo 1


2
2x2:
2
5
STEP 1. Convert the text using substitution
table. C I V I A O U I A R R S D O D X
Adding character X to
2 8 21 8 0 14 20 8 0 17 17 18 3 14 3 23 complete the conversion
table. Will be eliminate after
decryption.
STEP 2. Plaintext will be presented as two pair
subtitution
2 2 0 2 0 1 3 3
1 0 7
8 1 1 1 23
8 4 8 7 1 4
ENCRYPTION USING HILLCHIPER METHOD (continued..)

STEP 3. Multiply the substituted vector with key matrix


2 2 0 20 0 1 3 3
1
 KEY  VECTOR 1 7
2 8 14 8 1 1 23
2 8 7 1 4
8
5

1. 1 1
18 = S
1 2 2
2 5 = 8 8 Mod 26 =
8
4 4 18 = S
4 4

2. 3 3
11 = L
1 2 2

2 5
1 = 7 7 Mod 26 =
8
8 8 4 =E
2 2

3. 0 2 2
2 =C
1 2
2 5 14
= 8 8 Mod 26 =

7 7 18 = S
0 0
ENCRYPTION USING HILLCHIPER METHOD (continued..)

4. 20 3 3
10 = K
1 2
2 5 8
= 6 6 Mod 26 =

8 8 2 =C
0 0

5. 0 3 3
8 = I
1 2
2 5 1
= 4 4 Mod 26 =
7
8 8 7 =H
5 5

6. 53 53
1 =B
1 2 1

2 5
7 = Mod 26 =
12 12
1
8
4 4 20 = U

7. 31 31
5 =F
1 2 3

2 5 1
= Mod 26 =
76 76
4
24 = Y
ENCRYPTION USING HILLCHIPER METHOD (continued..)

8. 3 4 4
23 = X
1 2
2 5 23
= 9 9 Mod 26 =

1 1 17 = R
2 2
1 1

CHIPERTEXT: SSLECSKCIHBUFYXR
4. ENCRYPTION USING CAESAR CHIPER
 PLAIN TEXT TO ENCRYPT : SSLECSKCIHBUFYXR
 SUBTITUTION TABLE:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

 KEY, last 3 name characters: IUS


 (8,20,18)
FORMULA : C1 = E(Pi ) = (Pi + K1) mod 26
C2 = E(C1) = (C1 + K2) mod 26
Cfinal = E(C2) = (C2 + K3) mod 26

ENCRYPTION:
Defined: K1=8, K2=20, K3=18

1. S : C1 = (Pi + K1) mod 26 = (18+8) mod 26


= 0 C2 = (C1 + K2) mod 26 = (0+20) mod 26 = 20
Cfinal = (C2 + K3) mod 26 = (20+18) mod 26 =
12 = M
ENCRYPTION USING CAESAR CHIPER (continued..)

2. S: C1 = (18+8) mod 26 = 0 6. S : C1 = (18+8) mod 26


C2 = (0+20) mod 26 = 20 = 0 C2 = (0+20) mod 26 =
Cfinal = (20+18) mod 26 = Cfinal = (20+18) mod 26 =
20
12 = M 12 = M
3. L : C1 = (11+8) mod 26 = 19 7. K : C1 = (10+8) mod 26
C2 = (19+20) mod 26 = 13 = 18 C2 = (18+20) mod 26
Cfinal = (13+18) mod 26 = Cfinal
= 12 = (12+18) mod 26 = 4
5=F =E
4. E : C1 = (4+8) mod 26 = 12 8. C: C1 = (2+8) mod 26 = 10
C2 = (12+20) mod 26 = 6 C2 = (10+20) mod 26 = 4
Cfinal = (6+18) mod 26 = Cfinal = (4+18) mod 26 =
24 = Y 22 = W
5. C : C1 = (2+8) mod 26 = 10 9. I : C1 = (8+8) mod 26 = 16
C2 = (10+20) mod 26 = 4 C2 = (16+20) mod 26 = 10
Cfinal = (4+18) mod 26 = Cfinal = (10+18) mod 26 =
22 = W 2= C
ENCRYPTION USING CAESAR CHIPER (continued..)

10. H: C1 = (7+8) mod 26 = 15 14. Y : C1 = (24+8) mod


C2 = (15+20) mod 26 = 9 C2 = (6+20) mod 26 =
26 = 6
Cfinal = (9+18) mod 26 = 1 = 0Cfinal = (0+18) mod 26 = 18
B =S
11. B: C1 = (1+8) mod 26 = 9 15. X : C1 = (23+8) mod 26 = 5
C2 = (9+20) mod 26 = 3 C2 = (5+20) mod 26 = 25
Cfinal = (3+18) mod 26 = Cfinal = (25+18) mod 26 =
21= V 17 = R
12. U : C1 = (20+8) mod 26 = 2 16. R: C1 = (17+8) mod 26 = 25
C2 = (2+20) mod 26 = 22 C2 = (25+20) mod 26 = 19
Cfinal = (22+18) mod 26 = Cfinal = (19+18) mod 26 =
14 = 0 11 = L
13. F : C1 = (5+8) mod 26 = 13
C2 = (13+20) mod 26 = 7 CHIPERTEXT:
Cfinal = (7+18) mod 26 =
25 = Z MMFYWMEWCBVOZ
SRL
5. ENCRYPTION USING EXPANSION
METHOD
 PLAIN TEXT TO ENCRYPT : MMFYWMEWCBVOZSRL
 KEY: Adding CO before first character and adding VID after the last
character

CHIPERTEXT:
COMMFYWMEWCBVOZSRLVID
6. ENCRYPTION USING COMPRESSION
METHOD
 PLAIN TEXT TO ENCRYPT : COMMFYWMEWCBVOZSRLVID
 KEY: Hide character at even position, combine the hidden character with
special character ‘@’

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

C O M M F Y W M E W C B V O Z S R L V I D
C M F W E C V Z R V D

CMFWECVZRVD
 COMPRESSED CHAR:
 HIDDEN CHAR: OMYMWBOSLI

CHIPERTEXT: CMFWECVZRVD@OMYMWBOSLI
7. DECRYPTION USING COMPRESSION
METHOD
 CHIPER TEXT TO DECRYPT :
CMFWECVZRVD@OMYMWBOSLI
 KEY: Hidden character will be placed after each compressed character,
connector character is ‘@’
CMFWECVZRVD @
COMPRESSED HIDDEN
OMYMWBOSLI
CONNECTOR

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

C M F W E C V Z R V D
O M Y M W B O S L I

PLAIN TEXT: COMMFYWMEWCBVOZSRLVID


8. DECRYPTION USING EXPANSION
METHOD
 CHIPER TEXT TO DECRYPT :
COMMFYWMEWCBVOZSRLVID
 KEY: Remove CO before first character and remove VID after the last
character

PLAIN TEXT:
MMFYWMEWCBVOZSRL
9. DECRYPTION USING CAESAR CHIPER
 CHIPER TEXT TO DECRYPT : MMFYWMEWCBVOZSRL
 SUBTITUTION TABLE:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

 KEY FOR ENCRYPT last 3 name characters IUS (8,20,18)


 FORMULA : C1 = E(Pi ) = (Pi - K1) mod 26
C2 = E(C1) = (C1 - K2) mod 26
Cfinal = E(C2) = (C2 - K3) mod 26

DECRYPTION:
Defined: K1=18, K2=20, K3=8

1. M : C1 = (Pi - K1) mod 26 = (12- 18) mod


26 = C2
4 = (C1 - K2) mod 26 = (4-20) mod 26 = 10
Cfinal = (C2 - K3) mod 26 = (10-8) mod 26 = 18
= S
DECRYPTION USING CAESAR CHIPER (continued..)
 PLAIN TEXT TO ENCRYPT : PLAIN TEXT:
SSLECSKCIHBUFY
MMFYWMEWCBVOZSRL
XR
2. M : C1 = (12-18) mod 26 6. M : C1 = (12-18) mod 26
= 4 C2 = (4-20) mod 26 = = 4 C2 = (4-20) mod 26 =
Cfinal = (10-8) mod 26 = 18
10 Cfinal = (10-8) mod 26 = 18
10
=S =S
3. F : C1 = (5-18) mod 26 = 7. E : C1 = (4-18) mod 26 =
13 C2 = (13-20) mod 26 = 12 C2 = (12-20) mod 26 =
Cfinal = (19-8) mod 26 = 11
19 Cfinal = (18-8) mod 26 = 10
18
=L =K
4. Y : C1 = (24-18) mod 26 8. W : C1 = (22-18) mod 26
= 6 C2 = (6-20) mod 26 = = 4 C2 = (4-20) mod 26 =
Cfinal = (12-8) mod 26 = 4
12 Cfinal = (10-8) mod 26 = 2
10
=E =C
5. W : C1 = (22-18) mod 26 9. C : C1 = (2-18) mod 26 =
= 4 C2 = (4-20) mod 26 = 10 C2 = (10-20) mod 26 =
Cfinal = (10-8) mod 26 = 2
10 Cfinal = (16-8) mod 26 = 8
16
=C =I
DECRYPTION USING CAESAR CHIPER (continued..)

10. B : C1 = (1-18) mod 26 14. S : C1 = (18-18) mod 26


=9 C2 = (9-20) mod 26 = =0 C2 = (0-20) mod 26 = 6
C
15final = (15-8) mod 26 = 7 Cfinal = (6-8) mod 26 = 24
=H = Y
11. V : C1 = (21-18) mod 26 15. R : C1 = (17-18) mod 26
=3 C2 = (3-20) mod 26 = 9 = 25 C2 = (25-20) mod 26 =
Cfinal = (9-8) mod 26 = 1 = C
5 final = (5-8) mod 26 = 23
B =X
12. O : C1 = (14-18) mod 26 16. L : C1 = (11-18) mod 26
= 22 C2 = (22-20) mod 26 = = 19 C2 = (19-20) mod 26 =
Cfinal = (2-8) mod 26 = 20 C
25final = (25-8) mod 26 = 17
2
=U =R
13. Z : C1 = (25-18) mod 26
=7 C2 = (7-20) mod 26 =
C
13final = (13-8) mod 26 = 5
=F
PLAIN TEXT: SSLECSKCIHBUFYXR
10. DECRYPTION USING HILLCHIPER METHOD
 CHIPER TEXT TO DECRYPT : SSLECSKCIHBUFYXR
 SUBTITUTION TABLE:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

1 5 -2
 KEY, Matrix Ordo Matrix
2 -2 1
2x2: 2 Adjoint:
5
STEP 1. Convert the text using substitution
table. S S L E C S K C I H B U F Y X R
18 18 11 4 2 18 10 2 8 7 1 20 5 24 23 17

STEP 2. Chiper text will be presented as two pair


subtitution
1 1 2 1 8 1 5 23
8 1 0
1 7 20 24 17
1 4 8 2
DECRYPTION USING HILLCHIPER METHOD (continued..)

STEP 3. Multiply the substituted vector with key matrix


5
1 1 2 1 8 1 5 23
 KEY -2 -2  VECTOR 8 1 0
1 1 7 20 24 17
1 4 8 2
1. 5 18
8 2 =C
-2 -2 = 54 54 Mod 26 =
18
1
8 =I

2. 5 1
18
47
18
47 21 = V
-2 -2 1 = Mod 26 =
1 -18 -18
4 8 =I

3. 5 2 -26 -26 0 =A
-2 -2 = 14 14
Mod 26 =
1
1
8 14 = O
DECRYPTION USING HILLCHIPER METHOD (continued..)

4. 5 1 46 46 20 = U
-2 -2
0 = -18 -18
Mod 26 =
1 2 8 =I

5. 5 8 26 26 0 =A
-2 -2 = -9 -9
Mod 26 =
7
1
17 = R

6. 5 1 -35 1
17 = R
-2 -2 = 18
7 Mod 26 =
20
1 1
8
18 = S

7. 5 5 -23 3 3 =D
-2 -2 = 14 1
Mod 26 =
24
1 4
14 = O
DECRYPTION USING HILLCHIPER METHOD (continued..)

8. 5 23 81 3 3 =D
-2 -2 = -29 23
Mod 26 =
17
1
23 = X
Character X should be
TEXT: CIVIAOUIARRSDODX deleted.

PLAIN TEXT:
CIVIAOUIARRSDOD
11. DECRYPTION USING PERMUTATION
 CHIPER TEXT TO DECRYPT : CIVIAOUIARRSDOD
METHOD
 RULE:
1 2 3 4 5

1 2 3 4 5

PERMUTATION PROCESS
C I V I A O U I A R R S D O D

A I V I C R A I U O D O D S R

PLAINTEXT: AIVICRAIUODODSR
12. DECRYPTION USING BLOCKING
METHOD
CHIPER TEXT TO DECRYPT : AIVICRAIUODODSR
RULE: 5 CHARACTERS EACH BLOCK

CHIPERTEXT process:
a
A R D I A OV I D I US C OR
Block of 5 Char
Read the text vertically to
produce plaintext.

PLAIN TEXT:
ARDIAOVIDIUSCOR
SUMMAR
Y
PLAIN TEXT :
ARDIAOVIDIUSCOR
ENCRYPTED USING 6 DIFFERENT METHOD:
CMFWECVZRVD@OMYMWBOSLI
SUCCESSFULLY DECRYPTED TO IT’S ORIGINAL…

TUGAS UTS4
..WASSALAMUALAIKU
M..

S-ar putea să vă placă și