Information and Computer Security CPIS 312 Lab 2

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Classical Cryptography
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Network Security Chapter
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 2 – Classical Encryption Techniques
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
13. BETTER SYMMETRIC CIPHER STREAM CIPHERS 1. SOME TRICKS FOR SUBSTITUTION CIPHER There are some tricks to make substitution cipher safer: Nulls: insert.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Classical Encryption techniques
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Web Tools for Classical Cryptology Tristan Beeble.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Computer Security (CS4800)
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Chapter Two: Classic Cryptography
Information and Computer Security CPIS 312 Lab 1
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
@Yuan Xue Quick Review.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
(Principles of Informatioan security)
Chapter 2 Basic Encryption and Decryption
Cryptography.
Affine Cipher.
Cesar & Vigenere Encryption
Asad Gondal Ali Haider Mansoor
Computer and Data Security 4th Class
History and Background Part 3: Polyalphabetic Ciphers
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Taehyung Kim HPC Lab. POSTECH
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
Cryptography Survey.
PART VII Security.
Cryptography Survey.
Classical Polyalphabetic Ciphers
Confusion and Diffusion
Cryptography: Cesar Cipher
Digital Communications
Introduction to Cryptography I
Double Transpositions
Homophonic Substitution Cipher
Types of Cryptanalysis attacks
Basics Of Symmetric Encryption
Information and Computer Security CPIS 312 Lab 4 & 5
Symmetric Encryption or conventional / private-key / single-key
Information and Computer Security CPIS 312 Lab 3
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Information and Computer Security CPIS 312 Lab 2 Classical Encryption TRIGUI Mohamed Salim

Lab Outlines Students should know that there are many algorithms existing for encryption and decryption; we will cover number of them during the semester. Students should understand how Vigenere encryption and decryption works, they should implement the algorithm using a suitable programming language. Students will learn how to adjust some parameters of Vigenere algorithm, changing encryption equation and notice the affects on the cipher text. Students will learn how to work with Monoalphabetic encryption and decryption algorithm and they should select a suitable programming language to implement it.

Lab Outcomes In the end of this lab, each student should know what the importance of encryption and decryption techniques is. Students will also learn how to encrypt a plaintext using (Vigenere) algorithm. At the end of this lab, students will be able to work with Vigenere algorithm by testing it practically during the lab. Students will be able to work with Monoalphabetic encryption and decryption algorithm and they will be asked to implement it.

Traditional symmetric key ciphers

Vigenere cipher It is the simplest polyalphabetic substitution cipher: Ci=Mi+Ki mod 26 Mi=Ci-Ki mod 26

Vigenere cipher Use the vigenere cipher with key=vector to encrypt the next message: Plaintext: this is an example of the vigenere cipher Ciphertext: OLKLWJVRGQODKPGHTKCIXBUVIITXQZKLGK

Vigenere cipher Use the Vigenere cipher with key=lemon to encrypt the message “attackatdawn” Plaintext: a= 00 Encryption (00+11) mod 26 Ciphertext: 11=L Plaintext: t=19 Encryption (19+4) mod 26 Ciphertext: 23=X Plaintext: t=19 Encryption (19+12) mod 26 Ciphertext: 5=F Plaintext: a=00 Encryption (00+14) mod 26 Ciphertext: 14=O Plaintext: c=02 Encryption (02+13) mod 26 Ciphertext: 15=P ……. Ciphertext: LXFOPVEFRNHR

Homework Q1. Encrypt the plaintext that you found from last homework using Vigenere Cipher and suppose the key is your first and family name.