Assignment 1 (Chapter 2) Prepared by Dr. Lamiaa Elshenawy 1.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Numbers on the Internet
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Introduction to Information Security Chapter II : Classical Ciphers.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
MAT 1000 Mathematics in Today's World Winter 2015.
CS110: Computers and the Internet Encryption and Certificates.
Computer Security coursework 2 Dr Alexei Vernitski.
1 Chapter 2 Plain Text Also called as clear text Language that we normally use Easily understood by everybody.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Symmetric-Key Cryptography
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Vernam Cipher Project Preliminaries CSC112 March 14, 2011 Oskars J. Rieksts Computer Science Department Kutztown University.
Encryption on the Internet Eirik Albrigtsen. Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Web Tools for Classical Cryptology Tristan Beeble.
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption CS110: Computer Science and the Internet.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Computer Security coursework 3 Dr Alexei Vernitski.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
Exercise 1.2 (Chapter 1) Prepared by Dr. Lamiaa Elshenawy
Lecture 1.2 (Chapter 1) Prepared by Dr. Lamiaa Elshenawy
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Computer Security CPIS 312 Lab 1
Exercises 1.2 (Chapter 1) Prepared by Dr. Lamiaa Elshenawy
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Substitution Ciphers.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Cryptography and Network Security
Computer and Data Security 4th Class
Information and Computer Security CPIS 312 Lab 2
Outline Some Basic Terminology Symmetric Encryption
CSEC 630 Innovative Education--snaptutorial.com
Cryptography Survey.
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Encryption on the Internet
Final Exam.
Cryptography Survey.
Cryptography “The Secret Code Language”
Unit 4: Lesson 6: Encryption With Keys and Passwords
Simple Encryption- Lesson 5
Cryptography Cryptography is derived from the Green word ‘kryptos’
Information Security IT423
Digital Communications
Traditional Symmetric-Key Ciphers
Unit 2: Cryptography & Cryptographic Algorithm
Introduction to Cryptography I
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Assignment 1 (Chapter 2) Prepared by Dr. Lamiaa Elshenawy 1

 Use Caesar cipher to encrypt this message “Our meeting on Monday at building BB in the morning”  Use Caesar cipher to decrypt this message “ZH ZLOO WUDYHO EB WUDLQ LQ WKH HYHQLQJ”

 Use Monoalphabetic and Vigenère ciphers to encrypt this message “Transfer money to me”  Encrypt word “BY” using Vernam cipher and then decrypt it again  ASCII code of B=  ASCII code of Y=

 Encrypt this message using Playfair cipher “save yourself”  Decrypt this message by Caesar cipher WKH HADP RI FRPSXWHU VHFXULWB WRGDB LQ WKH DIWHUQRRQ