Lesson 4-5 AP Computer Science Principles

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science 101 Data Encryption And Computer Networks.
Principles of Information Security, 2nd edition1 Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Encryption with Keys and Passwords
Lesson 2-18 AP Computer Science Principles
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Routers and Redundancy
Identity Theft uses of Cryptography
Network Security.
Security.
Basic Encryption Methods
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Networks Encryption.
Sending Bits on the Internet
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Cryptography Survey.
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Chapter 3:Cryptography (16M)
PART VII Security.
Encryption with Keys and Passwords
Encryption NSA – used to be able to crack most codes, technology has changed that. Now other methods are applied by NSA to access transmissions (see 2013.
Encryption and Decryption
Security.
Cryptography Survey.
Cryptography and Network Security
Simple Encryption- Lesson 5
Encryption with Keys and Passwords
Network Security.
Lesson 7: Simple Encryption
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Digital Communications
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Lesson 4-5 AP Computer Science Principles Simple Encryption Lesson 4-5 AP Computer Science Principles

Objectives Students will be able to: Explain why encryption is an important need for everyday life on the Internet. Students will be able to: Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget Crack a message encrypted with random substitution using Frequency Analysis Explain the weaknesses and security flaws of substitution ciphers

Journal In your daily life what things do you or other people rely on keeping a secret? Who are these secrets being kept from? How are these things kept secret?

Internet Security Secrecy is a critical part of our lives, in ways big and small. As our lives increasingly are conducted on the Internet, we want to be sure we can maintain the privacy of our information and control who has access to privileged information. Digital commerce, business, government operations, and even social networks all rely on our ability to keep information from falling into the wrong hands.

Internet Security As we saw with our activities on the Internet Simulator, the Internet is not inherently secure. Packets traveling across the Internet move through many routers, each of which could be owned by different people or organizations. These people, whether out of malice or curiosity, can easily read the traffic as it makes its way from sender to receiver.

Internet Security We need a way to send secret messages…

Classic Encryption - The Caesar Cipher Many of the ideas we use to keep secrets in the digital age are far older than the Internet. The process of encoding a plain text message in some secret way is called Encryption For example in Roman times Julius Caesar is reported to have encrypted messages to his soldiers and generals by using a simple alphabetic shift - every character was encrypted by substituting it with a character that was some fixed number of letters away in the alphabet. As a result an alphabetic shift is often referred to as the Caesar Cipher.

serr cvmmn va gur pnsrgrevn The Caesar Cipher This message was encrypted using a Caesar Cipher (an “alphabetic shift”). Let’s see how long it takes you to decode this message (remember it’s just a shifting of the alphabet): serr cvmmn va gur pnsrgrevn

The Caesar Cipher With this simple encryption technique it only took a few minutes to decode a small message. What if the message were longer BUT you had a computational tool to help you?!

Crack a Caesar Cipher Goal: Select a message encrypted with a caesar cipher and use the provided widget to “crack” it. Complete Stage 5 Step 2 Experiment with the tool - Click things, poke around, figure out what it’s doing. Choose one of the messages from the pull down menu and try to crack it using the tool. If you want to, enter you own message, encrypt it, and have a friend decrypt it.

Pause and Recap Recap terminology: Encryption - a process of encoding messages to keep them secret, so only "authorized" parties can read it. Recap terminology: Decryption - a process that reverses encryption, taking a secret message and reproducing the original plain text Cipher - the generic term for a technique (or algorithm) that performs encryption

Pause and Recap Recap terminology: Caesar's Cipher - a technique for encryption that shifts the alphabet by some number of characters. Recap terminology: Cracking encryption - When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

Crack a Random Substitution Cipher Cracking a Caesar cipher is easy…trivial with a computational tool like the one we used. The next step is to make the encryption slightly harder…

Crack a Random Substitution Cipher What if instead of shifting the whole alphabet, we mapped every letter of the alphabet to a random different letter of the alphabet? This is called a random substitution cipher. The new version of the widget you’ll see is a more sophisticated version of the encryption tool that shows you lots of different stuff. But what it does is bit of a mystery! Let’s check it out…

Crack a Random Substitution Cipher What if instead of shifting the whole alphabet, we mapped every letter of the alphabet to a random different letter of the alphabet? This is called a random substitution cipher. The new version of the widget you’ll see is a more sophisticated version of the encryption tool that shows you lots of different stuff. But what it does is bit of a mystery! Let’s check it out…

Crack a Random Substitution Cipher Complete Stage 5 Step 5

Wrap Up How much easier is it to crack a caesar cipher than a random substitution cipher? Can you put a number on it? Was it difficult to crack a Random Substitution cipher? Did it take longer than you thought? shorter? Why?

Wrap Up Any encryption cipher is an algorithm for transforming plaintext into ciphertext. What about the other way around? Can you write out an algorithm for cracking a Ceasar cipher? What about a random substitution cipher?

Wrap Up Recall that in RFC 3271, “The Internet is for Everyone” Vint Cerf wrote the following. Internet is for everyone - but it won’t be if its users cannot protect their privacy and the confidentiality of transactions conducted on the network. Let us dedicate ourselves to the proposition that cryptographic technology sufficient to protect privacy from unauthorized disclosure should be freely available, applicable and exportable. What did he mean by “cryptographic technology?” What does it mean to you now?

Stage 5 You will need to find time to complete Stage 5.