Cryptography.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CONTROLS & PROTECTION MECHANISMS Today’s Reference: Whitman & Mattord, Management of Information Security, 2 nd edition, 2008 Chapter 9.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Crytography Chapter 8.
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
Principles of Information Security, 2nd edition1 Cryptography.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Network Security Chapter
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
MAT 1000 Mathematics in Today's World Winter 2015.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
Cryptography By, Anthony Lonigro & Valentine Mbah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Web Tools for Classical Cryptology Tristan Beeble.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
CSCI-235 Micro-Computers in Science Privacy & Security.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
(Principles of Informatioan security)
Substitution Ciphers.
Identity Theft uses of Cryptography
Columnar Transposition
Cryptography and Network Security
Unit II – Communication Security
Information and Computer Security CPIS 312 Lab 2
History and Background Part 3: Polyalphabetic Ciphers
Computer and Data Security 4th Class
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Outline Some Basic Terminology Symmetric Encryption
Networks Encryption.
Cryptography Survey.
Cryptography Survey.
Cryptography and Network Security
Confusion and Diffusion
Digital Communications
Encryption Basics Types of ciphers Algorithms Modes Key Length
Double Transpositions
Computer Security Chapter Two
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Cryptography

What is cryptography? The process of writing or solving secret messages or codes.

dadada

An algorithm used to encrypt a message. What is a cipher? An algorithm used to encrypt a message.

Substitution Cipher One alphabet: Monoalphabetic substitution Initial alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ Substitution cipher: DEFGHIJKLMNOPQRSTUVWXYZABC Multiple alphabets: Polyalphabetic substitution Initial alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ Substitution cipher 1: DEFGHIJKLMNOPQRSTUVWXYZABC Substitution cipher 2: GHIJKLMNOPQRSTUVWXYZABCDEF Substitution cipher 3: JKLMNOPQRSTUVWXYZABCDEFGHI Substitution cipher 4: MNOPQRSTUVWXYZABCDEFGHIJKL “MOM” becomes… “PRP” “JOHN” becomes… “MUQZ”

Your turn… Initial alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ Substitution cipher 1: DEFGHIJKLMNOPQRSTUVWXYZABC Substitution cipher 2: GHIJKLMNOPQRSTUVWXYZABCDEF Substitution cipher 3: JKLMNOPQRSTUVWXYZABCDEFGHI Substitution cipher 4: MNOPQRSTUVWXYZABCDEFGHIJKL Ciphertext: ERDQ Plaintext: ??? Plaintext: BLUE BLUE

Vernam Cipher Plaintext: S P A R E N O O N E Plaintext value: 19 16 01 18 05 14 15 15 14 05 One-time pad text: E H T Z L A C D G J One-time pad value: 05 08 20 26 12 01 03 04 07 10 Sum of plaintext & pad: 24 24 21 44 17 15 18 19 21 15 After modulo subtraction: 18 Ciphertext: X X U R Q O R S U O

Your turn… Plaintext: M E E T A T S T A R B U C K S 13 05 05 20 01 20 19 20 01 18 02 21 03 11 19 Pad text: I M W L V Q N E Y B P A F R M 09 13 23 12 22 17 14 05 25 02 16 01 06 18 13 Sum: 22 18 28 32 23 37 33 25 26 20 18 22 09 29 32 Modulo subtraction: 02 06 11 07 03 06 Ciphertext: ??? Ciphertext: VRBFWKGYZTRVICF VRBFWKGYZTRVICF

Book Cipher 134, 8, 9; 23, 13, 6; 67, 7, 7; One word End of word Word Number (in line) Page Number Line Number (on page)

“Plague affected Michigan” Your turn… 166, 18, 6; 105, 28, 3; 61, 25, 5; Plaintext: Plague affected Michigan “Plague affected Michigan”

Encryption in everyday life From your survey results, 11% of your class uses Encryption to secure their files 89% of your class uses secure Wi-Fi 67% of your class has 11-20 online accounts … but only 20% have 10-20 different passwords (80% have 5 or less) 89% of your class is connects to Bluetooth

Relation to Business Human Resources Marketing Operations Finance/Accounting

Questions? Sources: http://www.androidauthority.com/encryption-gary-explains-712802/ https://www.khanacademy.org/search?referer=%2Fcomputing%2Fcomputer-science%2Fcryptography%2Fcrypt%2Fp%2Fcaesar-cipher-exploration&page_search_query=%22Computer+science%22+AND+vernam+cipher https://motherboard.vice.com/en_us/article/the-internet-of-things-is-making-oil-production-vulnerable-to-hacking Principles of Information Security, 5th Edition; Michael E. Whitman; Herbert J. Mattord