From the course: Symmetric Cryptography Essential Training
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Polyalphabetic substitution ciphers
From the course: Symmetric Cryptography Essential Training
Polyalphabetic substitution ciphers
- [Narrator] . Now, we're gonna talk about Polyalphabetic Substitution Ciphers. In the previous examples, we were only dealing with the single alphabet, that has every input letter corresponded to a single output letter. It was a pretty easy conversion from one letter to the next. In a Polyalphabetic cipher, we have many alphabets. There are many ways that an input letter can be converted to an output letter. And what we essentially have here is we have a combination of several substitution ciphers. And this can be done in a number of different ways. And the strength of these ciphers is based on the length of the period. And that really just means how often does the pattern of the alphabets repeat? So we'll start with the Vigenere Cipher. And then we choose a key, and each character or number of that key is used to select the alphabets. There's an insecure way of generating a key for the Vigenere Cipher. And that's to use a memorable word. So we might use a key like cipher, C I P H E…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Simple substitution ciphers5m
-
(Locked)
Polyalphabetic substitution ciphers6m 7s
-
(Locked)
Permutation and transposition ciphers2m 48s
-
(Locked)
Simple one-time pads with XOR2m 38s
-
(Locked)
S-Box and P-Box1m 44s
-
(Locked)
Feistel ciphers1m 55s
-
(Locked)
Linear-feedback shift registers (LFSRs)2m 22s
-
-
-
-