Information and Computer Security CPIS 312 Lab 1

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science 101 Data Encryption And Computer Networks.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Cryptography Week-6.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Encryption on the Internet Eirik Albrigtsen. Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Web Tools for Classical Cryptology Tristan Beeble.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Web Security.
Teaching with Python Lukasz Ziarek SUNY Buffalo
Computer and Data Security 4th Class
Information and Computer Security CPIS 312 Lab 2
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
M3: Encryption r By Andrew Stringer.
Chapter 3:Cryptography (16M)
PART VII Security.
Encryption on the Internet
Simple Encryption- Lesson 5
Introduction to Cryptography I
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
Information and Computer Security CPIS 312 Lab 3
Presentation transcript:

Information and Computer Security CPIS 312 Lab 1 Classical Encryption TRIGUI Mohamed Salim

Lab Outlines Basics of encryption and decryption techniques will be discussed. Each student will try to write simple words on his notebook and encrypt them in some manner. Then he should ask his friend to know what the encrypted letters is. Students should know that there are many algorithms existing for encryption and decryption; we will cover number of them during the semester. Students should understand how Caesar encryption and decryption works, they should implement the algorithm using a suitable programming language.

Lab Objectives Students will learn how to work with Monoalphabetic encryption and decryption algorithm and they should select a suitable programming language to implement it.

Lab Outcomes In the end of this lab, each student should know what the importance of encryption and decryption techniques is. Students will also learn how to encrypt a plaintext using (Caesar) algorithm; they should build their own programs. Students will be able to work with Monoalphabetic encryption and decryption algorithm and they will be asked to implement it.

Traditional symmetric key ciphers

Definitions cipher = an algorithm to transform a normal message into one that is unrecognizable encrypt (encode) = to convert plaintext to ciphertext using a cipher and a key decrypt (decode) = to convert ciphertext back into plaintext using a cipher and a key Substitution cipher = replaces one symbol with another. It can be categorized as either monoalphabetic or polyalphabetic cipher. key = critical information used by the cipher, known only to the sender & receiver

Caesar cipher It is the simplest monoalphabetic cipher. Caesar cipher using the shift parameter as the key:

Caesar cipher Use the Caesar cipher with key=3 to encrypt the next message: Plaintext: the quick brown fox jumps over the lazy dog Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ

Caesar cipher Use the Caesar cipher with key=15 to encrypt the message “hello” Ciphertext: WTAAD

Caesar cipher Use the Caesar cipher with key=15 to decrypt the message “WTAAD” Ciphertext: hello

Example public class CaesarCipher { public static void main(String[] args) { String str = "CPIS 312"; int key = 3; String encrypted = encrypt(str, key); System.out.println(encrypted); String decrypted = decrypt(encrypted, key); System.out.println(decrypted); }

Example 1 public static String encrypt(String str, int key) { String encrypted = ""; for (int i = 0; i < str.length(); i++) { string c = str.charAt(i); if (Character.isUpperCase(c)) { c = c + (key % 26);} else if (Character.isLowerCase(c)) { c = c + (key % 26);} encrypted += (char) c;} return encrypted;}

Example 1 public static String decrypt(String str, int key){ String decrypted = ""; for(int i = 0; i < str.length(); i++) { string c = str.charAt(i); if (Character.isUpperCase(c)) { c = c - (key % 26);} else if (Character.isLowerCase(c)) { c = c - (key % 26);} decrypted += (char) c;} return decrypted;}}

Homework Q1. Find the plaintext and the key from the ciphertext: ow sjw klmvqafy afxgjeslagf sfv ugehmlwj kwumjalq