Documente Academic
Documente Profesional
Documente Cultură
ONTUGAS UTS4
TEKNOLOGI DAN SISTEM
KOMUNIKASI
ARDIA
OVIDIUS
191321045
1. ENCRYPTION USING BLOCKING
METHOD
PLAIN TEXT TO ENCRYPT : ARDIAOVIDIUSCOR
RULE: 5 CHARACTERS EACH BLOCK
CHIPERTEXT process:
a
A R D I A OV I D I US C OR
Block of 5 Char
Read the text horizontally
to produce chipertext.
CHIPERTEXT: AIVICRAIUODODSR
2. ENCRYPTION USING PERMUTATION
PLAIN TEXT TO ENCRYPT : AIVICRAIUODODSR
METHOD
RULE:
1 2 3 4 5
1 2 3 4 5
PERMUTATION PROCESS
A I V I C R A I U O D O D S R
CHIPERTEXT: CIVIAOUIARRSDOD
3. ENCRYPTION USING HILLCHIPER
METHOD
PLAIN TEXT TO ENCRYPT : CIVIAOUIARRSDOD
SUBTITUTION TABLE:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
1. 1 1
18 = S
1 2 2
2 5 = 8 8 Mod 26 =
8
4 4 18 = S
4 4
2. 3 3
11 = L
1 2 2
2 5
1 = 7 7 Mod 26 =
8
8 8 4 =E
2 2
3. 0 2 2
2 =C
1 2
2 5 14
= 8 8 Mod 26 =
7 7 18 = S
0 0
ENCRYPTION USING HILLCHIPER METHOD (continued..)
4. 20 3 3
10 = K
1 2
2 5 8
= 6 6 Mod 26 =
8 8 2 =C
0 0
5. 0 3 3
8 = I
1 2
2 5 1
= 4 4 Mod 26 =
7
8 8 7 =H
5 5
6. 53 53
1 =B
1 2 1
2 5
7 = Mod 26 =
12 12
1
8
4 4 20 = U
7. 31 31
5 =F
1 2 3
2 5 1
= Mod 26 =
76 76
4
24 = Y
ENCRYPTION USING HILLCHIPER METHOD (continued..)
8. 3 4 4
23 = X
1 2
2 5 23
= 9 9 Mod 26 =
1 1 17 = R
2 2
1 1
CHIPERTEXT: SSLECSKCIHBUFYXR
4. ENCRYPTION USING CAESAR CHIPER
PLAIN TEXT TO ENCRYPT : SSLECSKCIHBUFYXR
SUBTITUTION TABLE:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
ENCRYPTION:
Defined: K1=8, K2=20, K3=18
CHIPERTEXT:
COMMFYWMEWCBVOZSRLVID
6. ENCRYPTION USING COMPRESSION
METHOD
PLAIN TEXT TO ENCRYPT : COMMFYWMEWCBVOZSRLVID
KEY: Hide character at even position, combine the hidden character with
special character ‘@’
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
C O M M F Y W M E W C B V O Z S R L V I D
C M F W E C V Z R V D
CMFWECVZRVD
COMPRESSED CHAR:
HIDDEN CHAR: OMYMWBOSLI
CHIPERTEXT: CMFWECVZRVD@OMYMWBOSLI
7. DECRYPTION USING COMPRESSION
METHOD
CHIPER TEXT TO DECRYPT :
CMFWECVZRVD@OMYMWBOSLI
KEY: Hidden character will be placed after each compressed character,
connector character is ‘@’
CMFWECVZRVD @
COMPRESSED HIDDEN
OMYMWBOSLI
CONNECTOR
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
C M F W E C V Z R V D
O M Y M W B O S L I
PLAIN TEXT:
MMFYWMEWCBVOZSRL
9. DECRYPTION USING CAESAR CHIPER
CHIPER TEXT TO DECRYPT : MMFYWMEWCBVOZSRL
SUBTITUTION TABLE:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
DECRYPTION:
Defined: K1=18, K2=20, K3=8
1 5 -2
KEY, Matrix Ordo Matrix
2 -2 1
2x2: 2 Adjoint:
5
STEP 1. Convert the text using substitution
table. S S L E C S K C I H B U F Y X R
18 18 11 4 2 18 10 2 8 7 1 20 5 24 23 17
2. 5 1
18
47
18
47 21 = V
-2 -2 1 = Mod 26 =
1 -18 -18
4 8 =I
3. 5 2 -26 -26 0 =A
-2 -2 = 14 14
Mod 26 =
1
1
8 14 = O
DECRYPTION USING HILLCHIPER METHOD (continued..)
4. 5 1 46 46 20 = U
-2 -2
0 = -18 -18
Mod 26 =
1 2 8 =I
5. 5 8 26 26 0 =A
-2 -2 = -9 -9
Mod 26 =
7
1
17 = R
6. 5 1 -35 1
17 = R
-2 -2 = 18
7 Mod 26 =
20
1 1
8
18 = S
7. 5 5 -23 3 3 =D
-2 -2 = 14 1
Mod 26 =
24
1 4
14 = O
DECRYPTION USING HILLCHIPER METHOD (continued..)
8. 5 23 81 3 3 =D
-2 -2 = -29 23
Mod 26 =
17
1
23 = X
Character X should be
TEXT: CIVIAOUIARRSDODX deleted.
PLAIN TEXT:
CIVIAOUIARRSDOD
11. DECRYPTION USING PERMUTATION
CHIPER TEXT TO DECRYPT : CIVIAOUIARRSDOD
METHOD
RULE:
1 2 3 4 5
1 2 3 4 5
PERMUTATION PROCESS
C I V I A O U I A R R S D O D
A I V I C R A I U O D O D S R
PLAINTEXT: AIVICRAIUODODSR
12. DECRYPTION USING BLOCKING
METHOD
CHIPER TEXT TO DECRYPT : AIVICRAIUODODSR
RULE: 5 CHARACTERS EACH BLOCK
CHIPERTEXT process:
a
A R D I A OV I D I US C OR
Block of 5 Char
Read the text vertically to
produce plaintext.
PLAIN TEXT:
ARDIAOVIDIUSCOR
SUMMAR
Y
PLAIN TEXT :
ARDIAOVIDIUSCOR
ENCRYPTED USING 6 DIFFERENT METHOD:
CMFWECVZRVD@OMYMWBOSLI
SUCCESSFULLY DECRYPTED TO IT’S ORIGINAL…
TUGAS UTS4
..WASSALAMUALAIKU
M..