As we have already learnt about cryptography, let us learn more about substitution technique. Firstly, Substitution Techniques is a way of encrypting the message where characters or symbols replaces the original plaintext.
Let us study in detail about these techniques.
- Caesar Cipher
- Monoalphabetic Cipher
- Playfair Cipher
- Hill Cipher
- Polyalphabetic Cipher
- One Time Pad
Caesar Cipher ( First Substitution Technique)
Firstly, Caesar Cipher is the simplest substitution technique. Secondly, In this method to encrypt plaintext, each letter replaces itself by three places further it. And for decryption, it replaces itself by three places before it.
Formula is as follows:
Encryption, Cipher = (plaintext + 3) mod 26
Decryption, plaintext = (Cipher – 3) mod 26
For instance, plaintext = meet me, then ciphertext = phhw ph. So in this case, ‘m’ is replaced by ‘p’, ‘e’ by ‘h’ and so on.
Note : If ‘z’ is there, consider next letter after ‘z’ as ‘a’.
Monoalphabetic Cipher (Second Substitution Technique)
In monoalphabetic cipher, there is fix cipher text for each plaintext with some permutation.
For instance, for plaintext ‘a’, ‘b’, ‘c’…. and so on, resultant ciphertext is ‘y’, ‘n’, ‘l’ respectively, So here, ‘y’ can replace ‘a’, ‘n’ replaces ‘b’ respectively.
Playfair Cipher
This technique involves creating a 5×5 matrix from keyword.
Rules for generating ciphertext in Playfair Cipher:
- Firstly, create a 5×5 matrix from given keyword.
- Secondly, create pairs of alphabets, if same letters are there in pair, add ‘x’ in between.
- Thirdly, if pair appears in same row, shift the letter with immediate right letter.
- If pair appears in same column, replace it with the letter below it.
- In case pairs are in different rows and columns, replace it with the letters on corner of same row.
For instance, Keyword: OCCURENCE, Plaintext: TALL TREES. Here, resultant pair will be: TA LX LT RE ES. Keyword matrix is as follows:
O | C | U | R | E |
N | A | B | D | F |
G | H | I/J | K | L |
M | P | Q | S | T |
V | W | X | Y | Z |
Hence, here ‘TA’ are in different rows and columns, so replace it by ‘PF’. Thus, ciphertext = PF IZ TZ EO RT
Hill Cipher
Firstly, in hill cipher, we create a square matrix of key and we also form a matrix of plaintext. Secondly, the general equation is as follows:
Hence, for encryption, Cipher = PKmod26, here P = plaintext and K = Key.
Moreover, for decryption, Plaintext = CK-1 mod26. For instance, keyword = HILL and Plaintext = EXAM, we create a 2×2 matrix of HILL and 2×1 matrix of (EX) and (AM) respectively.
Similarly, for decryption we need to find inverse of K and then multiply it by cipher value. Lastly, we need to calculate mod 26.
Polyalphabetic Cipher
Firstly, Polyalphabetic cipher is more secure than monoalphabetic cipher. Monoalphabetic cipher maps one ciphertext with one plaintext. Comparatively, polyalphabetic cipher replaces plaintext with different ciphertext.
Summary for Substitution Techniques
In conclusion, we have learnt in brief about the various substitution techniques. We have also seen various examples for encryption of plaintext to get ciphertext.