Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
CSCI 5857: Encoding and Encryption
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
MAT 1000 Mathematics in Today's World Winter 2015.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Computer Security (CS4800)
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Information and Computer Security CPIS 312 Lab 1
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
(Principles of Informatioan security)
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Information and Computer Security CPIS 312 Lab 2
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
Chapter 3:Cryptography (16M)
PART VII Security.
Simple Encryption- Lesson 5
Fun with Cryptography The Science of Secrecy.
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
Homophonic Substitution Cipher
Types of Cryptanalysis attacks
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Information Security CPIT 425 Instructor: Bashair Alrashed LAB1

 Discussed the Basics of encryption and decryption techniques  know there are many algorithms for encryption and decryption  Students will be divided into groups of 3 girls  Understand how additive (Caesar) encryption and decryption works  should implement the algorithm using a suitable programming language. OUTLINES:

 know the importance of encryption and decryption techniques  Learn how to encrypt a plaintext using (Caesar) algorithm. OUTCOMES:

TRADITIONAL SYMMETRIC ‐ KEY CIPHERS:

 Plaintext is read by the user, he wants to encrypt it in some manner. The hacker tries to decrypt the cipher text using different keys.  The hacker only sees the cipher text, he didn’t know the key and way in which the plain text is encrypted.  Encryption and decryption algorithms depend on the key itself. TRADITIONAL SYMMETRIC ‐ KEY CIPHERS:

 A substitution cipher replaces one symbol with another. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers.  In monoalphabetic substitution, the relationship between a symbol in the plaintext to a symbol in the cipher text is always one-to-one SUBSTITUTION CIPHERS

 mathematical nature. ALGORITHM 1: ADDITIVE CIPHER (CAESAR CIPHER)

 When the cipher is additive, the plaintext, cipher text, and key are integers in Z26. ALGORITHM 1: ADDITIVE CIPHER (CAESAR CIPHER)

 Example: Use the additive cipher with key = 15 to encrypt the message “hello”.  Quiz: Use the additive cipher with key = 15 to decrypt the message “WTAAD”. ALGORITHM 1: ADDITIVE CIPHER (CAESAR CIPHER)

-Read Plaintext (pt) -Enter key 0<Key≤ 25 -Encrypt (pt) -Show the cipher text (cp) -Decrypt cp -Show the original plain text ADDITIVE CIPHER (CAESAR CIPHER) ALGORITHM Encryption Method: For( int i=0; i < pt.length; i++) { Int emp= convert_to_number(pt,i); Int c= (temp + k ) mod 26; ct+= convert_to_letter(c); }

 Your program after implementing the above algorithm should be similar to the following program: ALGORITHM 1: ADDITIVE CIPHER (CAESAR CIPHER)

Implement (Caesar) algorithm using a suitable programming language. Note: The expected time to finish submitting next lab HOME WORK 1