Lecture – 0
Introduction of Cryptography
(Encryption Basics & Classical Ciphers)
Course Instructor: Hina Alam
(hina.alam@ucp.edu.pk)
Shape Ciphers
Agenda
▪ 4 Triangles Cipher
▪ 3 Squares Cipher
▪ Pigpen / Masonic Cipher
4 Triangles Cipher
(Geometric substitution cipher)
4 Triangles Cipher uses combination of 4 triangles and dots to encrypt the
message.
● The orientation of the triangle and the placement of the dot is specific for each
letter.
● The challenge this time is that each letter is randomly allocated, which makes it
harder to decipher.
1
2
3
4
p m j
Activity
Encrypt:
Hello World
Key word: Help
3 Squares Cipher
3 Squares Cipher uses combination of triangles and dots to
encrypt the message.
● The orientation of the triangle and the placement of the dot
is specific for each letter.
Activity
Key word: Help
Activity
Solution
Pigpen / Masonic Cipher
The Pigpen Cipher is another example of a substitution cipher, but rather than
replacing each letter with another letter, the letters are replaced by symbols.
▪ Encryption
The encryption process is fairly straightforward, replacing each occurrence of a letter with the designated symbol.
The symbols are assigned to the letters using the key shown below, where the letter shown is replaced by the part of the image in which it is located.
▪ Decryption
The decryption process is just the reverse of the encryption process.
Using the same key (the grid above), you locate the image depicted in the ciphertext, and replace it with the letter given by that part of the grid.
Activity
Decrypt:
Activity
Solution
Plain Text:
Badges of Baseball
Activity
02
Decrypt the text using the keyword :
HELLO