Encryption.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Digital Signatures. Anononymity and the Internet.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Principles of Information Security, 2nd edition1 Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Welcome back! It’s spring…or supposed to be MAT199: Math Alive Cryptography Ian Griffiths Mathematical Institute, University of Oxford, Department of.
MAT 1000 Mathematics in Today's World Winter 2015.
Systems of Equations as Matrices and Hill Cipher.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption CS110: Computer Science and the Internet.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Encryption with Keys and Passwords
Digital Signatures.
Public Key Cryptography
Lesson 2-18 AP Computer Science Principles
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Attacks on Public Key Encryption Algorithms
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Theft uses of Cryptography
Security.
Whatcha doin'? Aims: To understand the Caesar Cipher.
Public-key Cryptography
Cryptography CS Principles January 19, 2017.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Cryptography Survey.
Cryptography and Advanced Ciphers
Public Key Cryptography
Campbell R. Harvey Duke University and NBER
User access levels, Passwords, Encryption, Cipher, Key
Big Data & Privacy Review - summary.
Security.
Cryptography Survey.
Cryptography “The Secret Code Language”
National Cipher Challenge
Cryptography and Network Security
Simple Encryption- Lesson 5
Cryptography Cryptography is derived from the Green word ‘kryptos’
Fun with Cryptography The Science of Secrecy.
Lesson 7: Simple Encryption
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Digital Communications
Chapter 29 Cryptography and Network Security
Public – Private Key Cryptography
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
CMPT 120 Lecture 9 – Unit 2 – Cryptography and Encryption –
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Encryption

Learning Objectives 3.4.1 Understand the need for data encryption 3.4.2 Understand how a Caesar cipher algorithm works

What is encryption? Any ideas? Encryption is the process of using a cryptographic algorithm to encrypt a message into a format so that it can not be read by anyone who intercepts it. The intended receiver then can decrypt the message back into a readable / useable format.

Why do we need encryption? The Internet allows data to be sent around the world at phenomenal speeds, in massive quantity. It is likely that some of this data you would want to keep private. Things like online banking Credit card details during a purchase Etc..

Symmetric or Asymmetric? Most encryption algorithms fall into the category of either Symmetric Key Encryption or Asymmetric. Symmetric encryption methods use the same key. The process used to encode the message is often simply reversed to decode the message. Key : method of encryption, cipher, algorithm.

The problem? How does the person at the other end know how to decipher the message? They need to know the key How are you going to tell that person the key? That would mean sending it “in the clear” Or meeting up with them in secret – not always possible if they are the other side of the world. You could encrypt the key…. But then how would they know to decode that?

Asymmetric Key Encryption This is often called 2 key Public / Private Key Encryption This uses 2 keys One to encode the message (public key) One to decode the message (private key) You can’t work out one key from the other, and you can’t use the wrong key to decode or encode the message. This solves the problem of having to tell the other person the encryption method you are using. (the Key) Example

Caesar Cipher A Caesar Cipher can also be called a shift cipher It takes a letter of the alphabet and shifts it along a set number of places. For example - A (0) B  (1) C  (2) D A (3) E F G H   Explanation Video

To decode – you reverse The message D O G  G R J (shift of +3) What about this message? B O Y  E R B Why does Y become B? It loops round when you hit the end of the alphabet. You are expected to be able to write a pseudo code algorithm for a Caesar shift.

Challenge Try to decrypt the following messages using your Caesar wheels Offset 5 JCUJWNJSHJ NX YMJ YJFHMJW TK FQQ YMNSLX. Offset 18 A USEW, A KSO, A UGFIMWJWV. Extension: Try to come up with your own encrypted message using an offset of 3

Dealing with the end of the alphabet. We need the following steps – For each character in the string find it’s numerical value. E.g. A  1 (you could use ASCII) Add the offset to the value. E.g. 1+3 =4 Deal with numbers greater than 26. Find out what letter is represented by the new number. E.g. – 4  D

2 methods… Use an IF function. Use Modulus operation. 7 % 2 = 3.5 IF new_value >26 Then new_value – 26 Use Modulus operation. 7 % 2 = 3.5 7 MOD 2 = 1 Why?

Another use of Modulo… Clock face maths… What about Mod? 14 MOD 12 = 2 Yay! What about 09:00… 9 MOD 12 = 9 Yipee! The time is 14:00. How do you know what that is in 12hrs? You could subtract 12. 14 – 12 = 2 12 That seems to work… 9 3 Let’s try it for 09:00… 9 – 12 = -3 Oops. 6 The advantage of the MOD function is that it works for negative numbers as well!

Activity – Plan a Caesar Shift In your books write Pseudo code or a flow chart for a Caesar Shift.

Activity – Make a Caesar Shift Open Python and implement the algorithm you have designed. Using an IF or MOD.

Plenary Why do we need encryption? What 2 categories do most encryption methods fall into? How does public key encryption work? How does a Caesar shift work? What is a key in cryptography? How does MOD work?