Topic 3: Data Encryption.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 2 – Classical Encryption Techniques
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Introduction to Cryptography
Section 3.6: An Introduction to Cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
MAT 1000 Mathematics in Today's World Winter 2015.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
LIS508 last lecture: Cryptography & Security Thomas Krichel
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
MAT 1000 Mathematics in Today's World Winter 2015.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Some of these PowerPoint pages were created by my friend Shawna Haider.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Encryption with Keys and Passwords
Substitution Ciphers.
TRANSPOSITION CYPHER.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Columnar Transposition
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
Cryptography and Network Security
Cryptography CS Principles January 19, 2017.
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
Networks Encryption.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Chapter 3:Cryptography (16M)
Transposition Ciphers
PART VII Security.
NET 311D Information Security
Encryption and Decryption
Cryptography and Network Security
Fundamentals of Data Representation
Simple Encryption- Lesson 5
Fun with Cryptography The Science of Secrecy.
Network and Data Security
Introduction to Cryptography I
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Topic 3: Data Encryption

Encryption Sometimes, we may want to keep our data hidden from unwanted attention Sending secret messages to someone Keeping private data secure Stopping people online seeing sensitive data (like bank account details or passwords) Turning data in its original form into something harder to understand is called encryption

Encryption In encryption, there are a few important terms to learn: Plaintext: the data in its original, easily understandable form Cipher text: the data in its encrypted, harder to understand form Cipher: the technique used to encrypt the data (plaintext  cipher text) There are lots of ciphers out there, each involving different steps

Encryption We will look at four ciphers in total Pigpen Cipher Caesar Cipher Vigenere Fence Rail Fence Cipher They each vary in terms of complexity Making some ciphers easier to use than others

Encryption: Pigpen Cipher First up we have the Pigpen Cipher Also known as the Freemasons Cipher Involves writing each letter in the alphabet in a series of grids They have to be written in the same order every time

Encryption: Pigpen Cipher To encrypt some plaintext, we replace each character with the area it’s in within the given grid To decrypt, we simple work backwards A  N  S  W 

ENCRYPTING THINGS IS FUN Encrypt the following phrases using the Pigpen Cipher HELLO WORLD THIS IS A MESSAGE ENCRYPTING THINGS IS FUN

Encryption: Caesar Cipher Let’s move over to the Caesar Cipher Also known as the shift cipher Involves moving individual letters so many spaces along Shifting them This creates the cipher text To decrypt, move the letters in the opposite direction Move the same number of spaces The shift used is called the key Take a look at this virtual Caesar Cipher wheel!

Encryption: Caesar Cipher Example Plaintext: TIM IS THE COOLEST Cipher Text: XMQ MW XLI GSSPIWX What shift was used here?

Using the keys listed in the table below, encrypt and decrypt the following texts Use the Caesar Cipher Task Key Text Encrypt 15 I AM GOING TO BE A SECRET 7 I WILL NEVER BE KNOWN 17 DOGS ARE CUTE I GUESS Decrypt 6 G RKBKR OY ZNK HKYZ 4 IRGVCTXMSR MW XSXEPPC JYR 10 S KW RKFSXQ DRO WYCD PEX

Encryption: Vigenere Cipher Now we’re on to the Vigenere Cipher Similar to the Caesar Cipher However, uses a phrase (not a key) This phrase acts as the key for encryption We calculate a number for every letter in the phrase Shift individual letters in the plaintext by that amount Loop back to start of phrase when reaching the end of it

Encryption: Vigenere Cipher Example Plaintext: WOW TIM IS COOL Key Phrase: GCSE Key Shifts = 6 (A  G), 2 (A  C), 18 (A  S), 4 (A  E) Plaintext with Key Shifts: Result: CQOXOOAWIQGP W O T I M S C L 6 2 18 4

ENCRYPTING THINGS IS FUN Use this passphrase to encrypt the following plaintext: IGCSE HELLO WORLD THIS IS A MESSAGE ENCRYPTING THINGS IS FUN

Encryption: Rail Fence Cipher The final cipher we’ll look at is the Rail Fence Cipher A transposition cipher like Caesar and Vigenere Involves writing the plaintext down/up rows The key is how many rows we use H O L E W R D

Encryption: Rail Fence Cipher Here we are encrypting the plaintext HELLO WORLD With a key of 3, we write the plaintext along three rows Moving on to a new row each time H O L E W R D

Encryption: Rail Fence Cipher To get the cipher text, we write the rows from top to bottom H O L E W R D Result: HOLELWRDLO

ENCRYPTING THINGS IS FUN Use a key of 4 (and the Rail Fence Cipher) to encrypt the following phrases: HELLO WORLD THIS IS A MESSAGE ENCRYPTING THINGS IS FUN