Exercise 1: Let’s Communicate - Decrypt The message

Slides:



Advertisements
Similar presentations
Make it easier to change the pictures: Use the Selection Pane to temporarily hide a Picture Placeholder. (Home tab, Select, Selection Pane). Click the.
Advertisements

Viewing an Archived Session of Wimba Classroom Instructions for Students.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Using the Diagram It Template Copy this presentation to your hard drive. There are two sets of templates: Slides #3 & 4 for a flow chart Slides #5 & 6.
1 Blank PowerPoint Classic 6 This is a basic PowerPoint template with two master slides. It uses “Classic 6 – Plain” as the background and all the other.
1.Click and type in the text boxes on the next slide to add the names of your choice. 2.Click on File…Save As… and choose the.ppsx or.pps format (PowerPoint.
Use a picture of your animal for the background that you have saved to your folder. Go to Insert>Picture from File and find your picture. Then Right click.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Phonics and Fluency w w Word Knowledge Activity /ū/ spelled u /ū/ spelled _ew w.
Power Point Introduction to Computers. Opening and Viewing Presentations Click on the Start button (bottom-left of your screen). From the popup menu displayed.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Walter G. Byers Doughnuts for Dad November 19, 2015 NOTE: To change images on this slide, select a picture and delete it. Then click the Insert Picture.
Word Knowledge T T Word Knowledge Activity T What word is the antonym of the word “same”? Use this word in a sentence. The word formed has the /or/
To Change the background color of the slide, choose Format / Background, which will bring up the following dialog box: Choose Fill Effects. This will bring.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Aspen HomeCare Service, LLC
Quote It! Overview July 2011 Speak to slide /26/11 1.
Data Encryption Standard
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
When readers draw conclusions about a text.
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
Choice 1 Choice 2 Choice 3 Choice 4
2. Derivatives on the calculator
Cryptography Survey.
No Fear PowerPoint to Teach Screen Reader Users
Picture with Caption layout
Title Layout Subtitle.
PART VII Security.
Trivia Trivia is a very straightforward game that asks learners to access previously learned content. This is a very good tool to use as a refresher.
I Am Thankful For… by Name Right-click on the white part of the slide.
Text Each slide has a different corner that is the correct answer.
Title With Picture Layout
Cryptography Survey.
Title With Picture Layout
Title layout Subtitle.
Making Your “Who/What/Where Am I?” PowerPoint
Algorithm Types & Algorithm Modes
Security Of Wireless Sensor Networks
Wedding Hair and Make-Up
Symmetric-Key Encryption
Title with Picture Layout
Who Am I Really? Your Name Here.
numerals Number systems NOTE:
Section 2: Cryptography
Network Security.
Title with Picture Layout
Title with Picture Layout
Exercise 8: Securing Pretty Good Privacy
Security of Wireless Sensor Networks
Padding Oracle Attacks
Exercise: Hashing, Password security, And File Integrity
Presenter name and company
Picture with Caption layout
Teaching Strategies by Janet Yamaguchi
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
Getting to powerpoint. Go to your start menu. Go to all programs.
I Am Thankful For… by Name Right-click on the white part of the slide.
Album Title Subtitle NOTE:
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Review – Presentations with Graphics & Multimedia
Insert the title of your presentation here
Presentation transcript:

Exercise 1: Let’s Communicate - Decrypt The message NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Introduction to Cryptography

Background Objective of Exercise: Learners will understand: The concept of symmetric key cryptography One key is used to encrypt and decrypt messages Block Cipher modes and initiation vectors

Scenario You and I want to communicate securely using symmetric cryptography. I sent you this encrypted message: RTE+BgDoaLvq6RD4PN/2JMAzzryBitvUcM5N3DNpKrGOcOuqgK7UsQkBD0cpeeBO4cj Hnc97vKjd8S064KvpKQ== I called you and told you the secret key and initiation vector (IV): Secret Key: 37648902346578908374625123456789 The initiation vector (IV) is: 1234567890123456

Exercise Steps Steps: Go to https://www.devglan.com/online-tools/aes-encryption-decryption Scroll down to the “’AES Online Decryption” area of the website and copy the secret key in the “Enter text to be Decrypted” box. Keep the default “Input Text Format” of “Base 64” Select Mode: I picked the mode involves chaining and has an IV in the first block in the encryption process. What select mode did I choose? Select it. Key Size in Bits: I choose the key size that it would take 2^256 key combinations to crack. Which key size did I choose? Enter the secret key in the “Enter Secret Key” box

Exercise Steps Click Decrypt. If you answered all the question correctly you will be able to decrypt the message. Record the message. You will be later asked what the message is.