Cryptography CS Principles January 19, 2017.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Cryptography & Encryption Secret Codes & The Advance of Technology.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Introduction to Information Security Chapter II : Classical Ciphers.
CS110: Computers and the Internet Encryption and Certificates.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Lec. 5 : History of Cryptologic Research II
LIS508 last lecture: Cryptography & Security Thomas Krichel
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CS 150 – Computing: From Ada to the Web Cryptography.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Computer Security (CS4800)
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Secret Key Cryptography
Cryptography – Test Review
A Summary in Fifteen Minutes mas y menos
Encryption: Image Representation Privacy/Cryptography
CIT 380: Securing Computer Systems
Introduction CS 303 Algorithmic Number Theory and Cryptography
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Identity Theft uses of Cryptography
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
What is network security?
Big Numbers: Mathematics and Internet Commerce
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
M3: Encryption r By Andrew Stringer.
Cis 4930 Introduction to cryptography
History of Cryptography
Chapter 3:Cryptography (16M)
Security through Encryption
PART VII Security.
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
By: Arash Habibi Lashkari
Cryptography and Network Security
Simple Encryption- Lesson 5
Cryptography a Presentation Prepared by Vytautas Kondratas.
Digital Communications
By Sean O’Mahoney from the Computing Society at Futures Friday
Fluency with Information Technology Lawrence Snyder
Modern Cryptography.
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography CS Principles January 19, 2017

Needs for Privacy What are some specific needs for privacy when using the internet?

Information Security for… Defending against external/internal hackers Defending against industrial espionage Securing E-commerce Securing bank accounts/electronic transfers Securing intellectual property Avoiding liability Pervasiveness of email/networks Online storage of sensitive information Insecure technologies (e.g. wireless) Trend towards paperless society Weak legal protection of email privacy

Sharing secrets activity Find out the average GPA of THE PEOPLE in your group without anyone telling their GPA

History 50 B.C. Julius Caesar uses cryptographic technique 400 A.D. Kama Sutra in India mentions cryptographic techniques 1250 British monk Roger Bacon describes simple ciphers 1466 Leon Alberti develops a cipher disk 1861 Union forces use a cipher during Civil War

History 1914 World War I – British, French, and German forces use encryption technology 1917 William Friedman, Father of U.S. encryption efforts starts a school for teaching cryptanalysis in Illinois 1917 AT&T employee Gilbert Vernam invents polyalphabetic cipher 1919 Germans develop the Engima machine for encryption

History 1937 Japanese design the Purple machine for encryption 1942 Navajo windtalkers help with secure communication during World War II 1948 Claude Shannon develops statistical methods for encryption/decryption 1976 IBM develops DES 1976 Diffie – Hellman develop public key / private key cryptography 1977 Rivest – Shamir – Adleman develop the RSA algorithm for public key / private key

50 B.C. Julius Caesar uses cryptographic technique Make your cipher wheel

Practice encoding and decoding HELP (ROT 6) -> NKRV Encoding NKRV -> HELP Decoding Decide on a encoding (ROTx) and encode a 2 word message. Exchange messages with someone at a different table and decode.

Substitution Cipher HAPPY wednesday What does this mean? LETTC AIHRIWHEC Is this easier? JCRRA YGFPGUFCA HAPPY wednesday

Caesar Cipher A substitution cipher where each plaintext letters is replaced by some letter a fixed number spaces down in the alphabet

ROT13 Network data encryption / decryption using ROT13 algorithm Rotates characters by 13 places ‘A’  ‘N’, ‘M’  ‘Z’, ‘a’  ‘n’, ‘m’  ‘z’ Encryption Example: ‘Hello World’ encrypts to ‘Uryyb Jbeyq’ Decryption Example: ‘Uryyb Jbeyq’ decrypts to ‘Hello World’

Implementing ROT13 Consider the following four cases IF (ch >= ‘A’) && (ch <= ‘M’) Rotate “Right” ch by 13 characters IF (ch >= ‘N’) && (ch <= ‘Z’) Rotate “Left” ch by 13 characters IF (ch >= ‘a’) && (ch <= ‘m’) IF (ch >= ‘n’) && (ch <= ‘z’)

1919 Germans develop the Engima machine for encryption Enigma video Enigma simulator

Alice 3 Assignment Implement a caesar cipher in alice 3 Have a character say something in code and then decode it later in the animation Make it interactive allowing the user to input text and encode/decode the text Anything else

Interactivity in alice 3 Create events in “Edit Code” mode