 Plain Text : The original message (text, image,video,… etc.  Cipher Key : Encryption works by running the data (represented as numbers) through a special.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Cryptography Ch-1 prepared by: Diwan.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Chaos Theory and Encryption
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography, Authentication and Digital Signatures
Lec. 5 : History of Cryptologic Research II
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Chapter-2 Classical Encryption Techniques.
Encryption
Data Compression and Encryption
Chapter 3:Cryptography (16M)
Chaos Theory and Encryption
Simple Encryption- Lesson 5
Digital Communications
Computer Security Chapter Two
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

 Plain Text : The original message (text, image,video,… etc.  Cipher Key : Encryption works by running the data (represented as numbers) through a special encryption formula (called a key). Both the sender and the receiver know this key  Cipher text: Combination of plain text and the secret key  Decryption: Recovering information from cipher text

1- Communication Security: In this type the 3 rd party can receive information but cannot know the information or change it 2- Transmission Security: In this type the 3rd party don’t know there is a communication or know but hasn't reception ability to listen

1.Substitutions: the Letters of plain text are replaced by other symbols, numbers, … etc. 2.Transposition: rearranging the order of the elements of the plaintext according to a proposed algorithm. 3.Polyalphabetic Ciphers :polyalphabetic cipher is a cipher where different substitution alphabets are used for various parts of the plaintext. 4.Running Key Ciphers: polyalphabetic substitution, where the secret key is repeated along the length of plaintext/ciphertext

The word chaos has been derived from the Greek, which refers to unpredictability which is a mathematically physic which was developed by Edward Lorenz There exist two approaches of designing chaos-based cryptography 1- analog Which are secure communication schemes designed for noisy channels based on the technique of chaos synchronization 2-Digital Are designed where one or more chaotic maps are implemented in finite commuting precision to encrypt the plain- messages in a number of ways

A linear process is one in which, if a change in any variable at some initial time produces a change in the same or some other variable at some later time.

1- Deterministic Which means that the chaotic systems have some mathematical equations ruling their behavior 2- Sensitivity These system is sensitive to initial conditions and parameters which make them change quickly 3- topological transitivity Is the tendency of the system to quickly scramble up small portions of the state space into intricate a network of filaments.

1- Confusion This process refers to substitutions which intend to make the relation ship between the key and the cipher text as complex as possible 1- Diffusion This process refers to rearranging or spreading out the bit of the message, to obtain new values which can be obtained again by the receiver

1- Baboon Cryptography Original Image Encrypted ImageDecrypted Image

2- Girl Cryptography Original Image Encrypted ImageDecrypted Image

2- Flower Cryptography Original Image Encrypted Image Decrypted Image

1- Eng. Ibrahim Fathy El-Ashry “Digital Image Encryption”, Menofia University Faculty of Electronic Engineering Dept. of Electronics and Electrical Communications Engineering, 18, No. 3, pp. 1-14, Afnan Sameer Yaseen Al-Ali Eng. “Chaos Encryption Methods for Partial Encryption of Wavelet-based Images,”, University of Basrah Yaobin Mao1 and Guanrong Chen2” Chaos-Based Image Encryption” 1 Nanjing University of Science and Technology 2 City University of Hong Kong 4- Sunil Pandey, Praveen Kaushik, Dr. S.C. Shrivastava” Rossler Nonlinear Dynamical Machine For Cryptography Applications” 5- Pianhui awu “ research on digital image Watermarking based on Hyper Chaos ” University of Derby, May Edward N. Lorenz ”Deterministic Non-Periodic Flow” 7jenuary, Gonzalo Alvarez1 and Shujun Li2” Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems ” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp , 2006.