Key words: Cryptography | Binary | Cipher

Slides:



Advertisements
Similar presentations
By Sunny Mahesh and Andy Yuwen. Cryptography = Secret Messages = Cool Stuff Ciphers Difference between plaintext and ciphertext Enciphering and Deciphering.
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Encryption: A Brief History Author: Margery Waldron.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Section 2.5 Polyaphabetic Substitutions
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Understanding Binary Understanding Computers. Understanding Computers L3 – Understanding Binary Learning Objectives All will Understand why all data is.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Secret Key Cryptography
Web Security.
Cryptography – Test Review
Understanding binary Understanding Computers.
Key words: Prototype | Blueprint | Valve
Key words: Intercept | Decipher | Translate
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
CIT 380: Securing Computer Systems
Binary 1 Basic conversions.
Key words: Apprentice | Invention | Colossus
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography & Security
CAP Cryptographic Analysis Program
Chapter-2 Classical Encryption Techniques.
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Presented by: Dr. Munam Ali Shah
M3: Encryption r By Andrew Stringer.
Security through Encryption
PART VII Security.
Security.
Cryptography: Basics (2)
Cryptography “The Secret Code Language”
Binary Data representation
Cryptography and Network Security
Chapter Nine: Data Transmission
Outline Using cryptography in networks IPSec SSL and TLS.
Network and Data Security
Cryptography and Cryptanalysis
Enigma Cipher Machine By: Amber Churchwell.
Chapter 29 Cryptography and Network Security
Public – Private Key Cryptography
Electronic Memory.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Computer Security Chapter Two
Operating Systems Concepts
Modern Cryptography.
Basics Of Symmetric Encryption
Chapter Goals Define cryptography
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Key words: Cryptography | Binary | Cipher 04 – Cryptic Messages Key words: Cryptography | Binary | Cipher

Second World War communication Both sides of the conflict used teleprinters to communicate over long distances. Hitler, the German leader, was using the Lorenz machine (the Tunny) to send secret messages to his generals. Teachers’ Notes: The Image shows Hitler and the German Lorenz machine which the British nicknamed the Tunny. The Lorenz machine converted messages into top secret code. The messages helped to plan their attack and defence.

Key word: Cryptography Cryptography is the process of creating or solving secret messages. A key is a system used to convert a messages into a secret code and back again. Cryptographers work to solve the key and understand the message.

Key word: Binary Binary is a number scheme where the only value is 0 or 1. Computers still work in binary today. Each letter has a five digit code made up of 0’s and 1’s Example: A is 11000, B is 10011, C is 01110 Tapes punched with holes were a way of reading and writing binary. Teachers’ Notes German messages sent in the war were based on binary. Tapes with holes punched in were a way of reading and writing the binary code. 1 = a punched hole 0 = no hole Please note, the smaller holes down the centre of the tape are the registration holes which secure the tape to the machine.

Key word: Cipher GMTCMJ A = F B S C T D U E M L G V H I J K P O N = H X P Y Q I R C S G T J U V W Z D Cipher Key A cipher is way of writing a word or message in a secret code. A letter is represented by a different letter, symbol or character. A cipher key enables a word to be disguised. Can you decrypt this enciphered word? Use the key to help. GMTCMJ   Teachers’ Notes The plaintext letters are on the left columns, the ciphered letters are on the right columns The enciphered word is SECRET

Making secret messages We’re going to make our own cipher process based on some elements of the Tunny. By using a key we’ll examine how words can be disguised! The images show a tape-punching device and the wheel settings of a Lorenz cipher machine (the Tunny).