playfair cipher and shift cipher -...

18
LOGO Playfair Cipher and Shift Cipher Kriptografi – 3 rd Week Aisyatul Karima, 2012

Upload: hoangdiep

Post on 17-May-2018

226 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

LOGO

“ Add your company slogan ”

Playfair Cipher andShift CipherKriptografi – 3rd Week

Aisyatul Karima, 2012

Page 2: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Standar kompetensi Pada akhir semester, mahasiswa menguasai

pengetahuan, pengertian, & pemahaman tentangteknik-teknik kriptografi. Selain itu mahasiswadiharapkan mampu mengimplementasikan salah satuteknik kriptografi untuk mengamankan informasi yang akan dikirimkan melalui jaringan.

Kompetensi dasar Mahasiswa menguasai teknik playfair cipher Mahasiswa menguasai teknik shift cipher

Page 3: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Contents

1 Play fair Cipher Method

2 Shift Cipher Method

Page 4: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method

Playfair cipher or Playfair square is symetricencryption technique that member of digraphsubstitution technique. This technique encrypt digraph or pair of

alphabet Based on the reason, this technique hard to

encode compare with the simple substitutiontechnique.

Page 5: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method

This technique foundby CharlesWheatstone onphysics he is founderof wheatstone bridgeon 1854. But, popularized by

Lord Playfair.

Charles Wheatstone

Lord Playfair

Page 6: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method

The process of playfair cipher : The key composed by 25 letters that arranged

in a square 5x5 by removing the letter J from alphabet.

S T A N DE R C H BK F G I LM O P Q UV W X Y Z

Page 7: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

?????

contoh kunci yang digunakan Jumlah kemungkinan kunci dari sistem ini

adalah :25!=15.511.210.043.330.985.984.000.000

Page 8: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method

The keys on square expanded by adding the6th column and the 6th row.

S T A N D SE R C H B EK F G I L KM O P Q U MV W X Y Z VS T A N D 6th row = 1st row

6th column = 1st column

Page 9: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method

The plaintext that hidden must be arrangedbefore encryption process :

• Change letter J with the letter I• Write the plaintext on pair of letters• There must be no same pair of letters, if there is

the same pair of letter, insert Z in the middle.• If the amount of letter is odd, add the letter Z at the

end

Page 10: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method

Example : plaintext

GOOD BROOMS SWEEP CLEAN

There is no letter J, so write the plaintext on letter pairs.GO OD BR OZ OM SZ SW EZ EP CL EA NZ

Ciphertext = … ???

Page 11: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method The encryption algorithm :

If there are two letters on the same key rows, then eachletter changed by the letter on the right side.

If there are two letters on the same key column, then eachletter changed by the letter on the bottom side.

If there are no two letter on the same row or the samecolumn, then the 1st letter changed by the letter on rowintersected by the 1st letter with the 2nd letter. The 2nd letterchanged by the letter on the 4th vertex of rectangle thatbuilt from 3 letters that used so far.

Page 12: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

plainteksGOOD BROOMS SWEEP CLEAN

Cipherteks:FP UT EC UW PO DV TV BV CM BG CS DY

Page 13: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Playfair Cipher Method plaintext

UNIVERSITAS DIAN NUSWANTORO

FAKULTAS ILMU KOMPUTER

DUMUNING INGSUN ANGRAKSO NEGORO

SEMARANG JAWA TENGAH

TEKNIK INFORMATIKA

LAWANG SEWU KERAMAT

Page 14: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Shift Cipher Method

Based on history, the shift cipher was ever beenused at the time of ancient roman on JuliusCaesar period. The method was very simple by moving each

letters of plaintext.

Page 15: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Shift Cipher Method

For the example, if X is the plaintext on the form of number : K is Key with 0 ≤ K ≤ 25 and Y is ciphertext on the form of number

The encryption process given by function : eK(x) = (x + K) mod 26 The decryption process given by function :

dK(y) = (y – K) mod 26.

Page 16: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Shift Cipher Method

For the key K = 3, shift cipher often calledby Caesar Cipher, For the Key K = 13 often called by Rot-13

cipher. Example : Define the ciphertext of plaintext “saya” using

K = 3 “…..” ???

Page 17: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

Shift Cipher Method

Contoh: Shift Cipher with 13 movement :

Plaintext :

MERWAN MINTA MAAF PADA MARWAN

Ciphertext = …. ???

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZM N O P Q R S T U V W X Y Z A B C D E F G H I J K L

Page 18: Playfair Cipher and Shift Cipher - DINUSdinus.ac.id/repository/docs/ajar/Kriptografi_-_Week3...Standar kompetensi Pada akhir semester, mahasiswa menguasai pengetahuan, pengertian,

LOGO

“ Add your company slogan ”