Encryption on the Internet

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Public Key Encryption Algorithm
Expert System for Analyzing Simple Ciphers: Properties of Cipher Texts Carolyn Rucci Advisor: Ralph Morelli 1 year project.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
MAT 1000 Mathematics in Today's World Winter 2015.
CS110: Computers and the Internet Encryption and Certificates.
Systems of Equations as Matrices and Hill Cipher.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Cryptography Lynn Ackler Southern Oregon University.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Encryption on the Internet Eirik Albrigtsen. Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption CS110: Computer Science and the Internet.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Assignment 1 (Chapter 2) Prepared by Dr. Lamiaa Elshenawy 1.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Computer Security CPIS 312 Lab 1
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Web Security.
Chapter 2 Basic Encryption and Decryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Practical Questions Theoretical Questions
Asad Gondal Ali Haider Mansoor
Teaching with Python Lukasz Ziarek SUNY Buffalo
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Public-Key Cryptography and RSA
Information and Computer Security CPIS 312 Lab 2
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Taehyung Kim HPC Lab. POSTECH
Synchronizing Text & Objects
Cryptography Survey.
Permutations and Ciphers
Five-minute starter task
Security through Encryption
Rivest, Shamir and Adleman
A1 Student Posters Posters Print Services  Robinson Library  University of Newcastle  phone: Introduction The.
<ELLIIT Project Name>
Presentation title.
Presentation title.
Cryptography Survey.
Poster Title Heading Heading Heading Heading Heading Heading
2016 REPORTING The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog.
Definición y tipos discriminación
Fun with Cryptography The Science of Secrecy.
A0 PowerPoint Poster Posters at Print Services Robinson Library, Newcastle University • • phone Introduction.
2016 REPORT.
Digital Communications
A1 Student Posters Posters at Print Services  Robinson Library  University of Newcastle  phone: Introduction.
Introduction to Cryptography I
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
T A R S E L I T L I S S T O TEMPLATE – SUBTITLE
201X REPORT.
目 录 The quick brown fox. 目 录 The quick brown fox.
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
Crypto for CTFs.
KEYBOARDING: SPEED & ACCURACY
NET 311D Information Security
2016 REPORT.
Presentation transcript:

Encryption on the Internet Eirik Albrigtsen

Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption method

Caesar’s cipher

Modular Arithmetic 18 = 6 mod 12 15 = 3 mod 12 26 = 2 mod 12, as 26 and 2 are 2*12 apart General mathematical statement: a = b mod N  a and b are a multiple of N apart

A=0, B=1, C=2, ... , Y=24, Z=25. To encrypt x: E(x) = x+3 mod 26 Caesar’s cipher A=0, B=1, C=2, ... , Y=24, Z=25. To encrypt x: E(x) = x+3 mod 26 Example: C = 2, E(2) = 2+3 mod 26 = 5 = F Y=24, E(24) = 24+3 mod 26 = 27 mod 26 = 1 = B

Caesar’s cipher the quick brown fox jumps over the lazy dog WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ

Security of Caesar’s cipher To decrypt x: D(x) = x-3 mod 26 K=3=shift factor Max 25 possible values of K.

Security of Caesar’s cipher

Vigenere Cipher Keyword K = ADHD = 0 3 7 3 (length 4) Encrypt separately each letter depending on its position in the message. If the position is of the form: 0+4n: shift by 0 1+4n: shift by 3 2+4n: shift by 7 3+4n: shift by 3 Example X = BOB BOB = 1 14 1 1 14 1 E(X) = BRI EOB = 1 17 8 4 14 4

security = published and attacked, security = secrecy security = published and attacked, but not broken.

Trust This